Solved

INter VLAN routing issue of Cisco 3750 in stacking mode between two locations.

Posted on 2009-04-08
10
1,507 Views
Last Modified: 2012-05-06
Dear All,
I am having two office locations eg: LOC A and LOC B. These two location have been connected with pair of Cisco 3750 switches in stack with each other. In each location the respective VLAN's have been created . Now the VLANs created at both ends are not reachable. I have created a one VLAN only that VLAN is communicating
LOC A - TWO switches in STACK
clock timezone UTC 5 30
switch 1 provision ws-c3750g-24ts
switch 2 provision ws-c3750g-24ts
ip subnet-zero
ip routing
ip cef load-sharing algorithm universal 6593F51E
!
!
mls qos
!
!
no file verify auto
!
spanning-tree mode pvst
spanning-tree extend system-id
spanning-tree uplinkfast
spanning-tree backbonefast
!
!
vlan access-map SecWiz_Vlan3 10
 action forward
 match ip address SecWiz_Gi1_0_6_in_ip
vlan access-map SecWiz_Vlan9 10
 action forward
 match ip address SecWiz_Gi1_0_23_out_ip
vlan filter SecWiz_Vlan3 vlan-list 3
vlan filter SecWiz_Vlan9 vlan-list 9
vlan internal allocation policy ascending
!
interface Port-channel1
 switchport access vlan 2
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
!
interface GigabitEthernet1/0/1
 switchport access vlan 2
!
interface GigabitEthernet1/0/2
 switchport access vlan 2
!
interface GigabitEthernet1/0/3
 switchport access vlan 2
!
interface GigabitEthernet1/0/4
 switchport access vlan 2
 switchport mode access
!
interface GigabitEthernet1/0/5
 switchport access vlan 2
 switchport mode access
 mls qos cos 5
!
interface GigabitEthernet1/0/6
 switchport access vlan 3
!
interface GigabitEthernet1/0/7
 switchport access vlan 3
!
interface GigabitEthernet1/0/8
 switchport access vlan 3
!
interface GigabitEthernet1/0/9
 switchport access vlan 4
!
interface GigabitEthernet1/0/10
 switchport access vlan 4
!
interface GigabitEthernet1/0/11
 switchport access vlan 4
!
interface GigabitEthernet1/0/12
 switchport access vlan 4
!
interface GigabitEthernet1/0/13
 switchport access vlan 408
!
interface GigabitEthernet1/0/14
 switchport access vlan 4
!
interface GigabitEthernet1/0/15
 switchport access vlan 5
!
interface GigabitEthernet1/0/16
 switchport access vlan 5
!
interface GigabitEthernet1/0/17
 switchport access vlan 5
!
interface GigabitEthernet1/0/18
 switchport access vlan 7
 switchport mode access
!
interface GigabitEthernet1/0/19
 switchport access vlan 7
!
interface GigabitEthernet1/0/20
 switchport access vlan 7
!
interface GigabitEthernet1/0/21
 switchport access vlan 6
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
 switchport access vlan 9
 switchport mode access
!
interface GigabitEthernet1/0/24
 switchport access vlan 2
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
 channel-group 1 mode on
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface GigabitEthernet2/0/1
 switchport access vlan 2
!
interface GigabitEthernet2/0/2
 switchport access vlan 2
!
interface GigabitEthernet2/0/3
 switchport access vlan 2
!
interface GigabitEthernet2/0/4
 switchport access vlan 2
 switchport mode access
!
interface GigabitEthernet2/0/5
 switchport access vlan 2
 switchport mode access
!
interface GigabitEthernet2/0/6
 switchport access vlan 3
!
interface GigabitEthernet2/0/7
 switchport access vlan 3
!
interface GigabitEthernet2/0/8
 switchport access vlan 3
!
interface GigabitEthernet2/0/9
 switchport access vlan 4
!
interface GigabitEthernet2/0/10
 switchport access vlan 4
!
interface GigabitEthernet2/0/11
 switchport access vlan 4
!
interface GigabitEthernet2/0/12
 switchport access vlan 4
!
interface GigabitEthernet2/0/13
!
interface GigabitEthernet2/0/14
 switchport access vlan 4
!
interface GigabitEthernet2/0/15
 switchport access vlan 5
!
interface GigabitEthernet2/0/16
 switchport access vlan 5
!
interface GigabitEthernet2/0/17
 switchport access vlan 5
!
interface GigabitEthernet2/0/18
 switchport access vlan 7
 switchport mode access
!
interface GigabitEthernet2/0/19
 switchport access vlan 7
!
interface GigabitEthernet2/0/20
 switchport access vlan 7
!
interface GigabitEthernet2/0/21
 switchport access vlan 6
!
interface GigabitEthernet2/0/22
 no cdp enable
!
interface GigabitEthernet2/0/23
 switchport access vlan 9
 switchport mode access
!
interface GigabitEthernet2/0/24
 switchport access vlan 2
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
 no cdp enable
 channel-group 1 mode on
!
interface GigabitEthernet2/0/25
!
interface GigabitEthernet2/0/26
!
interface GigabitEthernet2/0/27
!
interface GigabitEthernet2/0/28
!
interface Vlan1
 no ip address
 shutdown
!
interface Vlan2
 ip address 192.168.155.252 255.255.255.0
!
interface Vlan3
 ip address 192.168.70.254 255.255.255.0
 ip helper-address 192.168.155.1
 ip helper-address 192.168.155.2
 ip helper-address 192.168.155.20
 ip helper-address 192.168.155.38
!
interface Vlan4
 ip address 192.168.50.254 255.255.255.0
 ip helper-address 192.168.155.1
 ip helper-address 192.168.155.2
 ip helper-address 192.168.155.20
 ip helper-address 192.168.155.38
!
interface Vlan5
 ip address 192.168.80.254 255.255.255.0
 ip helper-address 192.168.155.1
 ip helper-address 192.168.155.2
 ip helper-address 192.168.155.20
 ip helper-address 192.168.155.38
!
interface Vlan6
 ip address 192.168.42.254 255.255.255.0
 ip helper-address 192.168.155.1
 ip helper-address 192.168.155.2
 ip helper-address 192.168.155.20
 ip helper-address 192.168.155.38
!
interface Vlan7
 ip address 192.168.30.254 255.255.255.0
 ip helper-address 192.168.155.1
 ip helper-address 192.168.155.2
 ip helper-address 192.168.155.20
 ip helper-address 192.168.155.38
!
interface Vlan8
 ip address 192.168.53.254 255.255.255.0
!
interface Vlan9
 ip address 172.168.1.254 255.255.0.0
!
interface Vlan56
 no ip address
!
interface Vlan408
 ip address 172.26.128.12 255.255.192.0
!
ip default-gateway 192.168.155.252
ip classless
ip http server
!
ip access-list extended SecWiz_Gi1_0_6_in_ip
 deny   ip any host 192.168.155.25
 permit ip any any
!
snmp-server community spiceho/RO RO
snmp-server community spiceho RO
snmp-server location Spice Tower
!
control-plane
!
!
line con 0
 password 7 072C285F4D065A43525B
 login
line vty 0 4
 password 7 022A0B4F1E152F01096E
 login
line vty 5 15
 password 7 04481B0F0C241B165F
 login
!
end
 
SP-SPT-2F-STCK2#

Open in new window

0
Comment
Question by:vkraaman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
10 Comments
 
LVL 10

Expert Comment

by:atlas_shuddered
ID: 24103863
This may be over simplistic but:

vlan 1 is shutdown, do you have an alternate default vlan set?  Is it defined on both sides of your trunk?
0
 

Author Comment

by:vkraaman
ID: 24105682
Hi herewith attching the configuration of B end.

Only from vlan2 which consists of 192.168.155. series are communicating with the other loaction switches.

Other IP in VLAN' are not communicating with the LOC B switch.


 
LOC B - TWO switches in STACK
switch 1 provision ws-c3750g-24ts
switch 2 provision ws-c3750g-24ts
ip subnet-zero
ip routing
!
!
mls qos
!
!
no file verify auto
!
spanning-tree mode pvst
spanning-tree extend system-id
spanning-tree uplinkfast
spanning-tree backbonefast
!
vlan internal allocation policy ascending
!         
interface Port-channel1
 switchport access vlan 2
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
!
interface Port-channel2
 switchport access vlan 21
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
!
interface GigabitEthernet1/0/1
 switchport access vlan 2
!
interface GigabitEthernet1/0/2
 switchport access vlan 2
!
interface GigabitEthernet1/0/3
 switchport access vlan 2
!
interface GigabitEthernet1/0/4
 switchport access vlan 2
!
interface GigabitEthernet1/0/5
 switchport access vlan 2
!
interface GigabitEthernet1/0/6
 switchport access vlan 2
!
interface GigabitEthernet1/0/7
 switchport access vlan 2
!
interface GigabitEthernet1/0/8
 switchport access vlan 2
!
interface GigabitEthernet1/0/9
 switchport access vlan 2
!
interface GigabitEthernet1/0/10
 switchport access vlan 2
!
interface GigabitEthernet1/0/11
 switchport access vlan 2
!
interface GigabitEthernet1/0/12
 switchport access vlan 2
!
interface GigabitEthernet1/0/13
 switchport access vlan 408
!
interface GigabitEthernet1/0/14
 switchport access vlan 2
!
interface GigabitEthernet1/0/15
 switchport access vlan 2
!
interface GigabitEthernet1/0/16
 switchport access vlan 2
!
interface GigabitEthernet1/0/17
 switchport access vlan 2
!
interface GigabitEthernet1/0/18
 switchport access vlan 2
!
interface GigabitEthernet1/0/19
 switchport access vlan 2
!
interface GigabitEthernet1/0/20
 switchport access vlan 2
!
interface GigabitEthernet1/0/21
 switchport access vlan 408
!
interface GigabitEthernet1/0/22
 switchport access vlan 3
!
interface GigabitEthernet1/0/23
 switchport access vlan 2
!
interface GigabitEthernet1/0/24
 switchport access vlan 2
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
 no cdp enable
 channel-group 1 mode on
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface GigabitEthernet2/0/1
 switchport access vlan 2
!
interface GigabitEthernet2/0/2
 switchport access vlan 2
!
interface GigabitEthernet2/0/3
 switchport access vlan 2
!
interface GigabitEthernet2/0/4
 switchport access vlan 2
!
interface GigabitEthernet2/0/5
 switchport access vlan 2
!
interface GigabitEthernet2/0/6
 switchport access vlan 2
!
interface GigabitEthernet2/0/7
 switchport access vlan 2
!
interface GigabitEthernet2/0/8
 switchport access vlan 2
!
interface GigabitEthernet2/0/9
 switchport access vlan 2
!
interface GigabitEthernet2/0/10
 switchport access vlan 2
!
interface GigabitEthernet2/0/11
 switchport access vlan 2
!
interface GigabitEthernet2/0/12
 switchport access vlan 2
!
interface GigabitEthernet2/0/13
 switchport access vlan 408
!
interface GigabitEthernet2/0/14
 switchport access vlan 2
!
interface GigabitEthernet2/0/15
 switchport access vlan 2
!
interface GigabitEthernet2/0/16
 switchport access vlan 2
!
interface GigabitEthernet2/0/17
 switchport access vlan 2
!
interface GigabitEthernet2/0/18
 switchport access vlan 2
!
interface GigabitEthernet2/0/19
 switchport access vlan 2
!
interface GigabitEthernet2/0/20
 switchport access vlan 2
!
interface GigabitEthernet2/0/21
 switchport access vlan 408
!
interface GigabitEthernet2/0/22
 switchport access vlan 3
!
interface GigabitEthernet2/0/23
 switchport access vlan 2
!
interface GigabitEthernet2/0/24
 switchport access vlan 2
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
 channel-group 1 mode on
!
interface GigabitEthernet2/0/25
!
interface GigabitEthernet2/0/26
!
interface GigabitEthernet2/0/27
!
interface GigabitEthernet2/0/28
!
interface Vlan1
 no ip address
!         
interface Vlan2
 ip address 192.168.155.254 255.255.255.0
 ip helper-address 192.168.155.20
 ip helper-address 192.168.155.38
!
interface Vlan3
 ip address 192.168.151.254 255.255.255.0
 ip helper-address 192.168.155.1
 ip helper-address 192.168.155.2
 ip helper-address 192.168.155.20
 ip helper-address 192.168.155.38
!
interface Vlan408
 ip address 172.126.128.13 255.255.192.0
!
ip default-gateway 192.168.155.254
ip classless

Open in new window

0
 
LVL 10

Expert Comment

by:atlas_shuddered
ID: 24107849
Okay

Switch A

interface gig 1/0/24
no switchport access vlan 2
switchport mode trunk
sw trunk encap dot1q
sw mode dot1q-tun
channel-group 1 mode on


interface gig 2/0/24
no sw acce vlan 2
sw mode trunk
sw trunk encap dot1q
sw mode dot1q-tunn
no cdp ena
channel-group 1 mode on



On SW B

interface gig 1/0/24
no switchport access vlan 2
switchport mode trunk
sw trunk encap dot1q
sw mode dot1q-tun
no cdp ena
channel-group 1 mode on


interface gig 2/0/24
no switchport access vlan 2
switchport mode trunk
sw trunk encap dot1q
sw mode dot1q-tun
channel-group 1 mode on


The current configs on these trunks are only allowing for access to vlan 2.


As you have vlan 1 shutdown you will need to be sure and define an alternate vlan as the default or no shut vlan 1 as well.
0
SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

 

Author Comment

by:vkraaman
ID: 24113517
Thanks
Is the port channel conf ok. Also i am going to implement is live network , hence the following questions:
Requirement;
Both the Fibre links should be in tunnel mode with redundancy with each other.
The VLAN's should communicate within the both switches

Dependencies.
Will down time be required. If so duration
I could not understand "As you have vlan 1 shutdown you will need to be sure and define an alternate vlan as the default or no shut vlan 1 as well"
Kindly provide what should be configured.

 Proposed Conf:
interface Port-channel1
 switchport access vlan 2
 switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel

Switch A

interface gig 1/0/24
no switchport access vlan 2
switchport mode trunk
sw trunk encap dot1q
sw mode dot1q-tun
channel-group 1 mode on


interface gig 2/0/24
no sw acce vlan 2
sw mode trunk
sw trunk encap dot1q
sw mode dot1q-tunn
no cdp ena
channel-group 1 mode on



On SW B

interface gig 1/0/24
no switchport access vlan 2
switchport mode trunk
sw trunk encap dot1q
sw mode dot1q-tun
no cdp ena
channel-group 1 mode on

interface gig 2/0/24
no switchport access vlan 2
switchport mode trunk
sw trunk encap dot1q
sw mode dot1q-tun
channel-group 1 mode on

Also attaching the draw diagram of my requirement
VLAN-3750.jpg
0
 
LVL 10

Expert Comment

by:atlas_shuddered
ID: 24116854
To answer the dependencies questions - Any down time would be minimal (on the order of minutes if you have a plan going in).  I'd schedule your change for after hours nonetheless just in case there is a snag but it shouldn't take you hours to complete.  Issue the reload xx command before you begin or don't copy run start until after everything is input and verified.  This way, you can at least revert to what you have running now and don't complicate your build further.

In reference to "As you have vlan 1 shutdown you will need to be sure and define an alternate vlan as the default or no shut vlan 1 as well" -  A port cannot be both a trunk and an access port at the same time.  Your ports are configured to access vlan 2 only at present,  this means that any and all traffic on these ports is being tagged for vlan 2 and they will only pass traffic tagged for vlan 2.  The changes to the config are posted in my prior post.  

Using your proposed config above I would alter it as follows for what you have requested:

Switch A

interface gig 1/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena



interface gig 2/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena




On SW B

interface gig 1/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena


interface gig 2/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena
0
 
LVL 10

Expert Comment

by:atlas_shuddered
ID: 24131031
Did this work out for you?
0
 

Author Comment

by:vkraaman
ID: 24132031
Expecting down time. Will post the results once finished. Thanx in advance.
0
 

Author Comment

by:vkraaman
ID: 24132078
Hi as per your configuration Using your proposed config above I would alter it as follows for what you have requested:

Switch A

interface gig 1/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena



interface gig 2/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena




On SW B

interface gig 1/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena


interface gig 2/0/24
channel-group 1 mode on
switchport mode trunk
sw trunk encap dot1q
no cdp ena

Does the configuration for Port-Channel1 remains the same.
interface Port-channel1
  switchport trunk encapsulation dot1q
 switchport mode dot1q-tunnel
!
0
 
LVL 10

Accepted Solution

by:
atlas_shuddered earned 500 total points
ID: 24132206
Don't configure the port-channel as a seperate entity.  When you configure the gig and fe interfaces as outlined above, the channel group will be configured automatically in the back end.
0
 

Author Closing Comment

by:vkraaman
ID: 31567954
Thanks for the support proved. The link is working fine
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question