cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6712
Views
10
Helpful
19
Replies

Not Able ping Management port for 5520

Hi

in core switch in create vlan 94 int vllan 94 192.168.50.254

and assign wlc management port 192.168.50.252

i make untagged vlan 94 at time WLC installation

with service port i can access WLC GUI

with Management port i am not able to login with out switch also when i directly connect to lan Port also

 

19 Replies 19

Run the command show port summary and check the port status of it. If its disabled run the command config port adminmode 1 enable , then check.

 

As of now your switch and WLC configuration is seems to be appropriate.

Regards,
Sathiyanarayanan Ravindran

Please rate the post and accept as solution, if my response satisfied your question:)

ewells1492
Level 1
Level 1

Hello

 

I also have this problem

 

Here is the port config on the 3850 switch: (NOT tagged also No native vlan setting on the switch port, configured as trunk)

interface TenGigabitEthernet1/1/2
description WLAN 5520 Controller

switchport
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
end

 

The WLC Management setup:

IP Address: 192.168.2.9

Mask: 255.255.255.0

GW: 192.168.2.1

VLAN: 20 (Tagged on the WLC Management, but not the Switch)

 

Connected to Port #1 of the 5520 WLC

Both interfaces configured for 10gbit

 

Restarted the WLC as well.. Still cannot ping the Management interface.

Is there something other than the initial confiruration on the WLC that nees to be done? 

 

Any help would be greatly appreciated.

 

Here is the config of the switch:

SNI510SW001#sh run
Building configuration...

Current configuration : 13390 bytes
!
! Last configuration change at 17:28:31 UTC Tue Jun 2 2020 by Admin
!
version 16.6
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
no platform punt-keepalive disable-kernel-core
!
hostname SNI510SW001
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable password Cisco
!
no aaa new-model
boot system switch all flash:cat3k_caa-universalk9.16.06.08.SPA.bin
clock timezone UTC -4 0
switch 1 provision ws-c3850-24xu
!
!
!
!
!
!
ip nbar http-services
!
ip name-server 192.168.1.100 71.242.0.12 71.250.0.12
ip domain name specializednet.com
!
!
!
login on-success log
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-3989262710
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3989262710
revocation-check none
rsakeypair TP-self-signed-3989262710
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
!
crypto pki certificate chain TP-self-signed-3989262710
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33393839 32363237 3130301E 170D3139 30323032 31373432
31315A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 39383932
36323731 30308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100A98F 2B860EA8 B1B6A133 E043C5E9 3B3C38E7 69F515F8 88E4556B
78E2310C 2C8C37A5 C4D3425F F1ADDB87 9FE0F4AE EFD2235C CC928C53 24234219
AFFC377D 1EF8A707 2D602D4C 442975F5 4052FF5A A152AEDD FCE887CF EF6342C0
F474C9D8 C1D64DB1 E109A37F BF7C5581 68EEA67E 6616EE85 ADD8E151 242C4B2D
149980D6 43DEBC41 8164217F 0A60B85E 66F83F59 AC50FF60 830A24A9 60EBDBB5
DA03C022 5010EE39 CE58168B FC123285 B92194AA D9E7FF72 3A0CB1B4 0B19A699
27332074 9CA7E315 42EAC9FB 504C76C1 12E3B480 FDDF75C6 E3F5B504 84C53E39
350E51CB BF0E9F8A EC1BD9FC A2CBD6AE CA8EA499 2C60A009 3138956E DA59CE4B
9ED473E4 E8E30203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 14974E41 E3C68E60 8F82959C FDF54A16 E25038F6
C5301D06 03551D0E 04160414 974E41E3 C68E608F 82959CFD F54A16E2 5038F6C5
300D0609 2A864886 F70D0101 05050003 82010100 27FDA36A 94155C1C 65810A40
BC553EF2 4C14F269 6283F017 7A8A3AD9 823C4926 F07CD7B8 A10AE3D5 19B60755
6A61DD1D 6F423A7F AAE05B56 017366A0 621C9834 9B499790 7AA9225C 1D0517FD
4D20E298 0AFB3A49 37900CBF 0197A834 330E3D9B 1D96CCA4 F648A860 9F36117C
7A7CC23E 060462C9 9A6F38E6 7ABC8257 0404D064 FBED1DDB 247CF807 507923BD
14925CE1 D32B550C B9D07331 4EAB14A6 6A571953 DB26C8F4 CACB5FED 1101921A
9C70C383 AB3C8F25 81585764 766C16AA F9CF11E9 9E60EB2B 562EF49B 79F0E117
55307621 A0056008 6CEBFA1E 79A40241 B1DB5CB3 80F79FF3 7A8EBCF1 3BBB084A
3E0AABBD FB521568 8C719469 3E2B27F7 9895A6A8
quit
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
!
port-channel load-balance src-dst-ip
system mtu 9000
!
!
diagnostic bootup level minimal
spanning-tree mode rapid-pvst
spanning-tree extend system-id
memory free low-watermark processor 79502
!
username Admin privilege 15 password 0 Cisco
!
redundancy
mode sso
!
!
transceiver type all
monitoring
lldp run
no cdp advertise-v2
!
!
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data, LOGGING
class-map match-any system-cpp-default
description DHCP Snooping, EWLC control, EWCL data
class-map match-any system-cpp-police-sys-data
description Learning cache ovfl, Crypto Control, Exception, EGR Exception, NFL SAMPLED DATA, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-multicast
description Transit Traffic and MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-system-critical
description System Critical and Gold
!
policy-map system-cpp-policy
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface Port-channel1
description Port-Channel to ASR 1002-F Router
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
!
interface Port-channel3
description Synology NAS Port-Channel
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
switchport nonegotiate
!
interface Port-channel4
description WLAN Port-Channel
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
no ip route-cache
negotiation auto
!
interface TenGigabitEthernet1/0/1
description Synology NAS
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
switchport nonegotiate
channel-group 3 mode on
!
interface TenGigabitEthernet1/0/2
description Synology NAS
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
switchport nonegotiate
channel-group 3 mode on
!
interface TenGigabitEthernet1/0/3
description Synology NAS
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
switchport nonegotiate
channel-group 3 mode on
!
interface TenGigabitEthernet1/0/4
description Synology NAS
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
switchport nonegotiate
channel-group 3 mode on
!
interface TenGigabitEthernet1/0/5
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/6
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/7
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/8
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/9
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/10
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/11
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/12
description WLAN Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 4 mode on
!
interface TenGigabitEthernet1/0/13
description WLAN Access Point
switchport access vlan 40
switchport mode access
!
interface TenGigabitEthernet1/0/14
description WLAN Access Point
switchport access vlan 40
switchport mode access
speed 5000
!
interface TenGigabitEthernet1/0/15
description WLAN Access Point
switchport access vlan 40
switchport mode access
speed 5000
!
interface TenGigabitEthernet1/0/16
description WLAN Access Point
switchport access vlan 40
switchport mode access
!
interface TenGigabitEthernet1/0/17
!
interface TenGigabitEthernet1/0/18
!
interface TenGigabitEthernet1/0/19
!
interface TenGigabitEthernet1/0/20
!
interface TenGigabitEthernet1/0/21
!
interface TenGigabitEthernet1/0/22
!
interface TenGigabitEthernet1/0/23
!
interface TenGigabitEthernet1/0/24
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
description Trunk to 3750 Secondary SW
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
!
interface TenGigabitEthernet1/1/2
description WLAN 5520 Controller
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/5
!
interface TenGigabitEthernet1/1/6
!
interface TenGigabitEthernet1/1/7
description VMHost
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
!
interface TenGigabitEthernet1/1/8
description Port-Channel to ASR 1002F
switchport trunk allowed vlan 1,20,30,40,50,60
switchport mode trunk
channel-group 1 mode active
!
interface FortyGigabitEthernet1/1/1
!
interface FortyGigabitEthernet1/1/2
!
interface Vlan1
description Native-VLAN-1
ip address 192.168.1.2 255.255.255.0
ip helper-address 192.168.1.1
ip helper-address 192.168.1.100
no ip route-cache
!
interface Vlan20
description WLAN-Management-VLAN-20
ip address 192.168.2.2 255.255.255.0
ip helper-address 192.168.2.1
ip helper-address 192.168.1.1
ip helper-address 192.168.1.100
no ip route-cache
!
interface Vlan30
description WLAN-Laptop-VLAN-30
ip address 192.168.3.2 255.255.255.0
ip helper-address 192.168.3.1
ip helper-address 192.168.1.1
ip helper-address 192.168.1.100
no ip route-cache
!
interface Vlan40
description WLAN-Mobility-VLAN-40
ip address 192.168.4.2 255.255.255.0
ip helper-address 192.168.4.1
ip helper-address 192.168.1.1
ip helper-address 192.168.1.100
no ip route-cache
!
interface Vlan50
description WLAN-Guest-VLAN-50
ip address 192.168.5.2 255.255.255.0
ip helper-address 192.168.5.1
ip helper-address 192.168.1.1
ip helper-address 192.168.1.100
no ip route-cache
!
interface Vlan60
description LAN-VIDSecurity-VLAN-60
ip address 192.168.6.2 255.255.255.0
ip helper-address 192.168.6.1
ip helper-address 192.168.1.1
ip helper-address 192.168.1.100
no ip route-cache
!
ip default-gateway 192.168.1.1
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip ftp username ewells
ip ftp password W2kAdmin111
ip tftp blocksize 512
!
!
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
stopbits 1
speed 115200
line aux 0
stopbits 1
line vty 0 4
password Cisco
login local
length 0
transport input telnet ssh
line vty 5 15
password Cisco
login
length 0
!
ntp server ip SNI510RR001.specializednet.com prefer source TenGigabitEthernet1/1/8
!
!
!
!
!
!
end

Hi,

 

Please create a new thread on cisco community.

 

Regards

Dont forget to arte helpful posts

Hello

 

In troubleshooting the issue further, I found the issue. For anyone else which experience this problem.

I needed to untag the management vlan on the 5520 wlc. Then just create a trunk port on the switch.

e.g. on the switch:

interface TenGigabitEthernet1/1/1

description WLAN 5520 Controller
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20,30
switchport mode trunk
end

 

Hope this helps others

Cheers

 

With any controller model, you can tag or leave it untagged. I personally alway tag the management interface.
-Scott
*** Please rate helpful posts ***
Review Cisco Networking for a $25 gift card