Solved

Cisco 2950 Changing VLAN IP address

Posted on 2004-08-24
6
23,004 Views
Last Modified: 2012-06-27
Hello -
I'm looking for some guidance on configuring VLANs and assigning addresses to them...I'm using a Catalyst 2950, with IOS version 12.0 (a little old, I know...)

The switch is configured with 3 VLANs, and VLAN1 has an ip address assigned to it 192.168.2.100. This address is incorrect - it should actually be an address in 192.168.4.x, and it should be assigned to VLAN2.

I did this:
en
conf t
interface VLAN1
no ip address
interface VLAN2
ip address 192.168.4.100 255.255.255.0

no ip default-gateway 192.168.2.1
ip default-gateway 192.168.4.1

exit
write mem

So - now, when I do 'show config', it still shows interface VLAN1 there with 'no ip address', and interface VLAN2 isn't there at all.
When I do 'show interfaces', it shows interface VLAN1 is up, line protocol is up (but with no IP address) and it shows interface VLAN2 is deleted, line protocol is down. VLAN2 has the correct address, and the default gateway is also changed.

Any ideas what I missed? I really want to have VLAN2 up with the new address, and I don't really care about the VLAN1 interface anymore.

thanks
0
Comment
Question by:JammyPak
  • 3
  • 3
6 Comments
 
LVL 16

Author Comment

by:JammyPak
Comment Utility
note: I haven't rebooted the switch, but I don't want to do that unless I need to....
0
 
LVL 15

Expert Comment

by:scampgb
Comment Utility
Hi JammyPak,

You shouldn't have to reboot - it's one of the nice things about Cisco kit :-)

I can't think of any problems with having the IP address on VLAN2.

It's a shame you wrote the config back.  Can you please post the full running config?

0
 
LVL 16

Author Comment

by:JammyPak
Comment Utility
Here's the running config - you can see it doesn't show VLAN2 interface at all (I only see it with 'show interfaces'). I've posted part of the previous config below.
Unfortunately, I didn't setup this switch myself, so I'm not sure what some of the reasons were for using rootguard and portfast on some interfaces and not on others. This could be setup in an inefficient way since the VLANs aren't being used for the same function as the person who set it up intended.
VLAN2 is connected to the internal LAN. VLAN3 is the DMZ, and VLAN1 connects to the upstream router on the public internet.
cheers

*Running Config*
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname 2950pubdmz
!
enable secret 5 $1$Vp7.$y87D5GP1Wnp8L7Ts4NhU80
!
ip subnet-zero
!
interface FastEthernet0/1
 description Cisco 1605R
switchport access vlan 2
 spanning-tree portfast
!
interface FastEthernet0/2
 description Cisco VPN 3005 private
 switchport access vlan 2
 spanning-tree portfast
!
interface FastEthernet0/3
 description Cisco PIX Ethernet 1 private
 switchport access vlan 2
 spanning-tree portfast
!
interface FastEthernet0/4
 switchport access vlan 2
 spanning-tree portfast
!
interface FastEthernet0/5
 switchport access vlan 2
 spanning-tree portfast
!
interface FastEthernet0/6
 switchport access vlan 2
spanning-tree portfast
!
interface FastEthernet0/7
 switchport access vlan 2
 spanning-tree portfast
!
interface FastEthernet0/8
 switchport access vlan 2
 spanning-tree portfast
!
interface FastEthernet0/9
 switchport access vlan 3
 spanning-tree portfast
!
interface FastEthernet0/10
 switchport access vlan 3
 spanning-tree portfast
!
interface FastEthernet0/11
 switchport access vlan 3
 spanning-tree portfast
 spanning-tree rootguard
!
interface FastEthernet0/12
 switchport access vlan 3
 spanning-tree portfast
 spanning-tree rootguard
!
interface FastEthernet0/13
 switchport access vlan 3
 spanning-tree portfast
 spanning-tree rootguard
!
interface FastEthernet0/14
 switchport access vlan 3
 spanning-tree portfast
 spanning-tree rootguard
!
interface FastEthernet0/15
 switchport access vlan 3
 spanning-tree portfast
 spanning-tree rootguard
!
interface FastEthernet0/16
 description Cisco PIX DMZ Ethernet 2
switchport access vlan 3
 spanning-tree portfast
 spanning-tree rootguard
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
 description Cisco VPN 3005 public
!
interface FastEthernet0/23
 description Cisco PIX Ethernet 0 public
!
interface FastEthernet0/24
 description Inet uplink
!
interface VLAN1
 no ip address
 no ip directed-broadcast
 no ip route-cache
!
ip default-gateway 192.168.4.1
snmp-server engineID local 0000000902000008A445AE00
snmp-server community private RW
snmp-server community public RO
banner login - Unauthorized use is Prohibited !!!
*************************************************************
!
line con 0
 transport input none
 stopbits 1
end

*Previous Config*
I won't post the entire previous config, since it was virtually identical, except for these lines:
interface VLAN1
 ip address 192.168.2.248 255.255.255.0
 no ip directed-broadcast
 no ip route-cache
!
ip default-gateway 192.168.2.1
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 15

Accepted Solution

by:
scampgb earned 500 total points
Comment Utility
That all looks pretty sensible to me.

What happens if you do the following?

conf t
ip default-gateway 192.168.4.1
interface VLAN1
ip address 192.168.4.100 255.255.255.0
no shut
interface VLAN3
no ip address
no shut
0
 
LVL 16

Author Comment

by:JammyPak
Comment Utility
OK, that's the problem...

I just needed to do this:

conf t
interface VLAN1
shutdown
interface VLAN2
no shutdown

- now the old VLAN interface is inactive, and the new one's working.

thanks!
0
 
LVL 15

Expert Comment

by:scampgb
Comment Utility
Sorry, I didn't realise you actually wanted VLAN1 shut down.  I just thought you wanted to move the IP.

Glad I could help  - thanks for the "A".
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now