Solved

Layer 2 Connectivity Issue.

Posted on 2009-05-13
7
203 Views
Last Modified: 2012-05-06
I have a switch which won't allow me ping a management station.   This computer worked perfectly well before it was removed for a virus cleanup. Nothing has changed on the switch or switches!  It is a 3750 switch and both the management station the unreachable computer are all on the same vlan but on different switches across the network. The computer can reach the server with no problems. Port security was on but I had long removed it from the port, moved the computer to a different port, cleared port security from the port as well.  A different computer was used and still same results! When the computer is connected to some other location on the network(on a different access switch), it functions just fine!   I have done all but reset the switch. Does anyone have any idea of what I can possibly be looking at?
0
Comment
Question by:oliverwari
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 21

Expert Comment

by:from_exp
ID: 24374327
please provide running config from that switch
please also triple check ip settings of that pc (incorrect subnet mask?)
please also check mac address table of that particular port.
0
 

Author Comment

by:oliverwari
ID: 24374735
Subnet mask is correct.

Connectivity-Issues.pdf
0
 
LVL 21

Expert Comment

by:from_exp
ID: 24375100
1/0/49 and 1/0/50 do have different vlans allowed (no 340 vlan on one of them)
I suppose those ports are used for uplinks/downlinks, so please check, that remote destination you are trying to reach is not behind that particular uplink port
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 

Author Comment

by:oliverwari
ID: 24375213
was trying to sanitize the configuration...it is vlan 340 for trunks. The access switch has redundant connections to the distribution layer.
0
 
LVL 21

Accepted Solution

by:
from_exp earned 500 total points
ID: 24375289
how do you archive redundancy? spanning-tree?
if yes, please try to ping from that pc your mgm station and try to search active down link port of the upper switch for that particular mac 552b
0
 

Author Comment

by:oliverwari
ID: 24375610
Thanks, you pointed me towards the right direction.
It was port security. Some dude had taken that computer and connected to a different switch and then brought it back...so I had the mac address glued to a port on the management station switch.  I have cleared the port and everything is back to normal.
0
 

Author Closing Comment

by:oliverwari
ID: 31580913
I searched the mac and found it glued to a non trunk port on a different switch. Cleared and all is back up.. You are good.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to Create Separate Guest WiFi VLAN on Netgear R8000 19 143
Bitlocker request key after every windows update 11 105
VLAN access port question 3 51
NFS v4 7 76
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question