Link to home
Start Free TrialLog in
Avatar of rvdsabu4life
rvdsabu4life

asked on

Cisco VLANS not quite seeing each other

I have 2 VLANS on a Cisco 881 and a Sonicwall TZ210.

Vlan A is 10.0.7.0

VLAN B is 10.0.8.0

Cisco 881:

VLAN A: 10.0.7.10

VLAN B: 10.0.8.11

Sonicwall

VLAN A: 10.0.7.249

VLAN B: 10.0.8.249

In between is 2950 Switches.  Both routers are configured as Trunks on the Switch.

Both subnets can ping each other usign all four IPs as gateways.

However, on both VLANS, we have a few webservers.  When connected to VLAN A as gateway (either the Sonicwall or Cisco) we can see everything we need to only on VLAN A but nothing on VLAN B.  I can ping VLAN B without any issue.

When I try VNC, RDP, or HTTP from VLAN A to B, I get timeout.  It works the same from VLAN B to VLAN A.

I think I may have an ACL issue, but I am not sure.

Thoughts on this?
Avatar of Soulja
Soulja
Flag of United States of America image

If you think it may be an acl issues. Please post a sanitized version so we can see, or remove it from the interfaces you have it applied to and see if you get communication. If so, then we know for sure it's the ACL. If not, then it is another configuration issue.
Avatar of rvdsabu4life
rvdsabu4life

ASKER


!
!
!
!
!
!
interface FastEthernet0
 !
!
interface FastEthernet1
 !
!
interface FastEthernet2
 !
!
interface FastEthernet3
 switchport mode trunk
 !        
!
interface FastEthernet4
 description $ES_WAN$$ETH-WAN$
 ip address XXXWAN
 ip access-group 102 out
 ip nat outside
 ip virtual-reassembly
 duplex auto
 speed auto
 !
!
interface Vlan1
 description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$
 ip address 10.0.7.10 255.255.255.0
 ip nat inside
 ip virtual-reassembly
 ip tcp adjust-mss 1452
 !
!
interface Vlan2
 ip address 10.0.8.11 255.255.255.0
 ip nat inside
 ip virtual-reassembly
 !
!
ip default-gateway XXXWAN GATEWAY
no ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source list 1 interface FastEthernet4 overload
ip route 0.0.0.0 0.0.0.0 FastEthernet4
!
access-list 1 permit 10.0.7.0 0.0.0.255
access-list 2 permit 10.0.8.0 0.0.0.255
access-list 102 remark CCP_ACL Category=1
access-list 102 permit ip any any
no cdp run

ASKER CERTIFIED SOLUTION
Avatar of Soulja
Soulja
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
OK that worked from the Cisco gateway to the Sonicwall gateway.  

How do I configure the above in the Sonicwall?