Winsoup
asked on
Uplinking a Cisco 3560 Switch
I am fairly new to switching so I am just doing this in a test environment to teach myself some things. I am trying to uplink a cisco 3560 switch from another 3560 switch. I have it linked and I can plug in a laptop to the switch and get out to the internet but I am unable to ping the switch, telnet, or ping from the switch. It shows that VLAN2 is down but I am not sure why. I have VLAN1 administratively down and should be using VLAN2. What am I missing with the setup? Please let me know what other configurations you need.
The uplink port is configured like this:
switchport trunk encapsulation dot1q
switchport mode trunk
srr-queue bandwidth share 10 10 60 20
srr-queue bandwidth shape 10 0 0 0
queue-set 2
mls qos trust cos
auto qos voip trust
The port that it is being uplinked from is configured like this:
switchport trunk encapsulation dot1q
switchport mode trunk
Thank you!
The uplink port is configured like this:
switchport trunk encapsulation dot1q
switchport mode trunk
srr-queue bandwidth share 10 10 60 20
srr-queue bandwidth shape 10 0 0 0
queue-set 2
mls qos trust cos
auto qos voip trust
The port that it is being uplinked from is configured like this:
switchport trunk encapsulation dot1q
switchport mode trunk
Thank you!
ASKER
Yes.
can you post "sh run"?
ASKER
CORP_IDF_SPARE3#sh run
Building configuration...
Current configuration : 6252 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname CORP_IDF_SPARE3
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$02gN$jgoEEPcpWNw4jDqU67 VKX/
enable password
!
no aaa new-model
system mtu routing 1500
ip subnet-zero
ip name-server 10.10.4.56
ip name-server 10.10.4.57
!
!
!
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue input bandwidth 90 10
mls qos srr-queue input threshold 1 8 16
mls qos srr-queue input threshold 2 34 66
mls qos srr-queue input buffers 67 33
mls qos srr-queue input cos-map queue 1 threshold 2 1
mls qos srr-queue input cos-map queue 1 threshold 3 0
mls qos srr-queue input cos-map queue 2 threshold 1 2
mls qos srr-queue input cos-map queue 2 threshold 2 4 6 7
mls qos srr-queue input cos-map queue 2 threshold 3 3 5
mls qos srr-queue input dscp-map queue 1 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue input dscp-map queue 1 threshold 3 32
mls qos srr-queue input dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue input dscp-map queue 2 threshold 2 33 34 35 36 37 38 39 48
mls qos srr-queue input dscp-map queue 2 threshold 2 49 50 51 52 53 54 55 56
mls qos srr-queue input dscp-map queue 2 threshold 2 57 58 59 60 61 62 63
mls qos srr-queue input dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue input dscp-map queue 2 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output cos-map queue 1 threshold 3 5
mls qos srr-queue output cos-map queue 2 threshold 3 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 2 4
mls qos srr-queue output cos-map queue 4 threshold 2 1
mls qos srr-queue output cos-map queue 4 threshold 3 0
mls qos srr-queue output dscp-map queue 1 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 3 threshold 3 32 33 34 35 36 37 38 39
mls qos srr-queue output dscp-map queue 4 threshold 1 8
mls qos srr-queue output dscp-map queue 4 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue output dscp-map queue 4 threshold 3 0 1 2 3 4 5 6 7
mls qos queue-set output 1 threshold 1 138 138 92 138
mls qos queue-set output 1 threshold 2 138 138 92 400
mls qos queue-set output 1 threshold 3 36 77 100 318
mls qos queue-set output 1 threshold 4 20 50 67 400
mls qos queue-set output 2 threshold 1 149 149 100 149
mls qos queue-set output 2 threshold 2 118 118 100 235
mls qos queue-set output 2 threshold 3 41 68 100 272
mls qos queue-set output 2 threshold 4 42 72 100 242
mls qos queue-set output 1 buffers 10 10 26 54
mls qos queue-set output 2 buffers 16 6 17 61
mls qos
!
crypto pki trustpoint TP-self-signed-1932881024
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certifi cate-19328 81024
revocation-check none
rsakeypair TP-self-signed-1932881024
!
!
crypto pki certificate chain TP-self-signed-1932881024
certificate self-signed 01
30820248 308201B1 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31393332 38383130 3234301E 170D3933 30333031 30303031
31305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 39333238
38313032 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100CB2F 7216007F BC77CF7B 878982F3 D83C699F 6AB94482 AC1D56FF CF8ED65B
0BCBEE73 A053EAD8 CB74944F C5E38DF1 B4582F6A D292F33D 1A2CB7C9 4DB7D530
6ACD1CCC 69C507DB E102F181 AFC02CEE 6A79497C 4836AFC1 AFA51824 F9BD5809
74863C3E D61A23D4 C70DA069 530948B0 97AECF7E F4D75D39 FE9744C7 FE0C7131
99CB0203 010001A3 70306E30 0F060355 1D130101 FF040530 030101FF 301B0603
551D1104 14301282 10434F52 505F4944 465F5350 41524533 2E301F06 03551D23
04183016 80148B00 6F295D36 A196DB6D 6E3E4E6E 1A54F82F 0EF7301D 0603551D
0E041604 148B006F 295D36A1 96DB6D6E 3E4E6E1A 54F82F0E F7300D06 092A8648
86F70D01 01040500 03818100 570B953D 5E41D1C4 1102860B B3E8E100 D0FCEDB0
C0D04BD6 F1C83005 57524628 6AF7054A 8BD4C854 F52C6554 39BA94A6 DA4EC2AD
9BA393A8 212ED02B F8DFACE0 B989E929 5D3AD5A3 D20D496E 40CE8D89 B5FCEBA0
8B19F0F3 298A99C6 550C5C10 D1F18C94 AFDCA895 A5B49456 24B4024F C2074FCA
D89E396A 7D829C6D EC3C62BA
quit
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0/1
switchport trunk encapsulation dot1q
switchport trunk native vlan 5
switchport mode trunk
mls qos trust dscp
spanning-tree portfast
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
srr-queue bandwidth share 10 10 60 20
srr-queue bandwidth shape 10 0 0 0
queue-set 2
mls qos trust cos
auto qos voip trust
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
no ip route-cache
no ip mroute-cache
shutdown
!
interface Vlan2
ip address 10.10.2.29 255.255.255.0
no ip route-cache
no ip mroute-cache
!
ip default-gateway 10.10.2.1
ip classless
ip http server
ip http secure-server
!
!
control-plane
!
!
line con 0
line vty 0 4
password
login
length 0
line vty 5 15
password
login
length 0
!
end
CORP_IDF_SPARE3#
Building configuration...
Current configuration : 6252 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname CORP_IDF_SPARE3
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$02gN$jgoEEPcpWNw4jDqU67
enable password
!
no aaa new-model
system mtu routing 1500
ip subnet-zero
ip name-server 10.10.4.56
ip name-server 10.10.4.57
!
!
!
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue input bandwidth 90 10
mls qos srr-queue input threshold 1 8 16
mls qos srr-queue input threshold 2 34 66
mls qos srr-queue input buffers 67 33
mls qos srr-queue input cos-map queue 1 threshold 2 1
mls qos srr-queue input cos-map queue 1 threshold 3 0
mls qos srr-queue input cos-map queue 2 threshold 1 2
mls qos srr-queue input cos-map queue 2 threshold 2 4 6 7
mls qos srr-queue input cos-map queue 2 threshold 3 3 5
mls qos srr-queue input dscp-map queue 1 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue input dscp-map queue 1 threshold 3 32
mls qos srr-queue input dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue input dscp-map queue 2 threshold 2 33 34 35 36 37 38 39 48
mls qos srr-queue input dscp-map queue 2 threshold 2 49 50 51 52 53 54 55 56
mls qos srr-queue input dscp-map queue 2 threshold 2 57 58 59 60 61 62 63
mls qos srr-queue input dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue input dscp-map queue 2 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output cos-map queue 1 threshold 3 5
mls qos srr-queue output cos-map queue 2 threshold 3 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 2 4
mls qos srr-queue output cos-map queue 4 threshold 2 1
mls qos srr-queue output cos-map queue 4 threshold 3 0
mls qos srr-queue output dscp-map queue 1 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 3 threshold 3 32 33 34 35 36 37 38 39
mls qos srr-queue output dscp-map queue 4 threshold 1 8
mls qos srr-queue output dscp-map queue 4 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue output dscp-map queue 4 threshold 3 0 1 2 3 4 5 6 7
mls qos queue-set output 1 threshold 1 138 138 92 138
mls qos queue-set output 1 threshold 2 138 138 92 400
mls qos queue-set output 1 threshold 3 36 77 100 318
mls qos queue-set output 1 threshold 4 20 50 67 400
mls qos queue-set output 2 threshold 1 149 149 100 149
mls qos queue-set output 2 threshold 2 118 118 100 235
mls qos queue-set output 2 threshold 3 41 68 100 272
mls qos queue-set output 2 threshold 4 42 72 100 242
mls qos queue-set output 1 buffers 10 10 26 54
mls qos queue-set output 2 buffers 16 6 17 61
mls qos
!
crypto pki trustpoint TP-self-signed-1932881024
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certifi
revocation-check none
rsakeypair TP-self-signed-1932881024
!
!
crypto pki certificate chain TP-self-signed-1932881024
certificate self-signed 01
30820248 308201B1 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31393332 38383130 3234301E 170D3933 30333031 30303031
31305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 39333238
38313032 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100CB2F 7216007F BC77CF7B 878982F3 D83C699F 6AB94482 AC1D56FF CF8ED65B
0BCBEE73 A053EAD8 CB74944F C5E38DF1 B4582F6A D292F33D 1A2CB7C9 4DB7D530
6ACD1CCC 69C507DB E102F181 AFC02CEE 6A79497C 4836AFC1 AFA51824 F9BD5809
74863C3E D61A23D4 C70DA069 530948B0 97AECF7E F4D75D39 FE9744C7 FE0C7131
99CB0203 010001A3 70306E30 0F060355 1D130101 FF040530 030101FF 301B0603
551D1104 14301282 10434F52 505F4944 465F5350 41524533 2E301F06 03551D23
04183016 80148B00 6F295D36 A196DB6D 6E3E4E6E 1A54F82F 0EF7301D 0603551D
0E041604 148B006F 295D36A1 96DB6D6E 3E4E6E1A 54F82F0E F7300D06 092A8648
86F70D01 01040500 03818100 570B953D 5E41D1C4 1102860B B3E8E100 D0FCEDB0
C0D04BD6 F1C83005 57524628 6AF7054A 8BD4C854 F52C6554 39BA94A6 DA4EC2AD
9BA393A8 212ED02B F8DFACE0 B989E929 5D3AD5A3 D20D496E 40CE8D89 B5FCEBA0
8B19F0F3 298A99C6 550C5C10 D1F18C94 AFDCA895 A5B49456 24B4024F C2074FCA
D89E396A 7D829C6D EC3C62BA
quit
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0/1
switchport trunk encapsulation dot1q
switchport trunk native vlan 5
switchport mode trunk
mls qos trust dscp
spanning-tree portfast
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
srr-queue bandwidth share 10 10 60 20
srr-queue bandwidth shape 10 0 0 0
queue-set 2
mls qos trust cos
auto qos voip trust
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
no ip route-cache
no ip mroute-cache
shutdown
!
interface Vlan2
ip address 10.10.2.29 255.255.255.0
no ip route-cache
no ip mroute-cache
!
ip default-gateway 10.10.2.1
ip classless
ip http server
ip http secure-server
!
!
control-plane
!
!
line con 0
line vty 0 4
password
login
length 0
line vty 5 15
password
login
length 0
!
end
CORP_IDF_SPARE3#
According to your output, you are uplinking this interface :
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
srr-queue bandwidth share 10 10 60 20
srr-queue bandwidth shape 10 0 0 0
queue-set 2
mls qos trust cos
auto qos voip trust
The interface on the other should be configured the same as well.
Can you also do "sh vtp status" from both switches and also "sh vlan brief" from both switches?
You also need to assign any interface to vlan 2 in order to bring the vlan up.
interface fa0/10
switchport access vlan 2
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
srr-queue bandwidth share 10 10 60 20
srr-queue bandwidth shape 10 0 0 0
queue-set 2
mls qos trust cos
auto qos voip trust
The interface on the other should be configured the same as well.
Can you also do "sh vtp status" from both switches and also "sh vlan brief" from both switches?
You also need to assign any interface to vlan 2 in order to bring the vlan up.
interface fa0/10
switchport access vlan 2
ASKER
Main Switch
sh vtp status
VTP Version : 2
Configuration Revision : 0
Maximum VLANs supported locally : 1005
Number of existing VLANs : 25
VTP Operating Mode : Server
VTP Domain Name : domain.local
VTP Pruning Mode : Enabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x62 0x62 0x7B 0xFD 0x96 0x27 0x8E 0xC4
Configuration last modified by 10.11.254.251 at 11-28-11 17:57:44
Local updater ID is 10.10.2.27 on interface Vl2 (lowest numbered VLAN interface found)
Switch Being Uplinked
CORP_IDF_SPARE3#sh vtp status
VTP Version : running VTP1 (VTP2 capable)
Configuration Revision : 7
Maximum VLANs supported locally : 1005
Number of existing VLANs : 6
VTP Operating Mode : Client
VTP Domain Name : domain.local
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x4D 0xD7 0x7F 0xBB 0xCD 0x75 0xD0 0x65
Configuration last modified by 0.0.0.0 at 3-1-93 00:06:08
Main Switch
CORP__IDF_SPARE#sh vlan brief
VLAN Name Status Ports
---- -------------------------- ------ --------- -------------------------- -----
1 default active Fa0/2, Fa0/3, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13
Fa0/14, Fa0/15, Fa0/16, Fa0/17
Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Gi0/1, Gi0/2
2 Management_VLAN active
4 Server_VLAN active
5 RIS_VLAN active Fa0/1
10 VLAN0010 active
20 Corp_VoIP_VLAN active
21 Corp_Office_VLAN active
22 Apple-Corp active
24 corp_wireless active
30 DC_VoIP_VLAN active
31 DC_Office_VLAN active
32 DC_Factory_VLAN active
40 East_VoIP_VLAN active
41 East_Office_VLAN active
42 East_Factory_VLAN active
--More--
VLAN Name Status Ports
---- -------------------------- ------ --------- -------------------------- -----
50 West_VoIP_VLAN active
51 West_Office_VLAN active
52 West_Factory_VLAN active
60 vmware active
70 VLAN0070 active
71 VLAN0071 active
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
CORP__IDF_SPARE#
Switch Being Uplinked
CORP_IDF_SPARE3#sh vlan brief
VLAN Name Status Ports
---- -------------------------- ------ --------- -------------------------- -----
1 default active Fa0/2, Fa0/3, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13
Fa0/14, Fa0/15, Fa0/16, Fa0/17
Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Fa0/23, Fa0/24, Gi0/2
5 VLAN0005 active
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
CORP_IDF_SPARE3#
sh vtp status
VTP Version : 2
Configuration Revision : 0
Maximum VLANs supported locally : 1005
Number of existing VLANs : 25
VTP Operating Mode : Server
VTP Domain Name : domain.local
VTP Pruning Mode : Enabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x62 0x62 0x7B 0xFD 0x96 0x27 0x8E 0xC4
Configuration last modified by 10.11.254.251 at 11-28-11 17:57:44
Local updater ID is 10.10.2.27 on interface Vl2 (lowest numbered VLAN interface found)
Switch Being Uplinked
CORP_IDF_SPARE3#sh vtp status
VTP Version : running VTP1 (VTP2 capable)
Configuration Revision : 7
Maximum VLANs supported locally : 1005
Number of existing VLANs : 6
VTP Operating Mode : Client
VTP Domain Name : domain.local
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x4D 0xD7 0x7F 0xBB 0xCD 0x75 0xD0 0x65
Configuration last modified by 0.0.0.0 at 3-1-93 00:06:08
Main Switch
CORP__IDF_SPARE#sh vlan brief
VLAN Name Status Ports
---- --------------------------
1 default active Fa0/2, Fa0/3, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13
Fa0/14, Fa0/15, Fa0/16, Fa0/17
Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Gi0/1, Gi0/2
2 Management_VLAN active
4 Server_VLAN active
5 RIS_VLAN active Fa0/1
10 VLAN0010 active
20 Corp_VoIP_VLAN active
21 Corp_Office_VLAN active
22 Apple-Corp active
24 corp_wireless active
30 DC_VoIP_VLAN active
31 DC_Office_VLAN active
32 DC_Factory_VLAN active
40 East_VoIP_VLAN active
41 East_Office_VLAN active
42 East_Factory_VLAN active
--More--
VLAN Name Status Ports
---- --------------------------
50 West_VoIP_VLAN active
51 West_Office_VLAN active
52 West_Factory_VLAN active
60 vmware active
70 VLAN0070 active
71 VLAN0071 active
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
CORP__IDF_SPARE#
Switch Being Uplinked
CORP_IDF_SPARE3#sh vlan brief
VLAN Name Status Ports
---- --------------------------
1 default active Fa0/2, Fa0/3, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13
Fa0/14, Fa0/15, Fa0/16, Fa0/17
Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Fa0/23, Fa0/24, Gi0/2
5 VLAN0005 active
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
CORP_IDF_SPARE3#
I would change the spare switch VTP to transparent and make it to client again mainly because it has higher revision number.
You should run "sh vtp password" to make sure you have set the same password on the spare switch.
Also change the VTP version to 2 on the spare switch.
You should run "sh vtp password" to make sure you have set the same password on the spare switch.
Also change the VTP version to 2 on the spare switch.
ASKER
I have them both named as spare switches for testing. Can you specify which one you're referring to.
The switch I am trying to uplink is spare3 and the main switch is just spare.
The switch I am trying to uplink is spare3 and the main switch is just spare.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
No worries.
You da man, there was a password set on the main switch but not on the other one. As soon as I changed it then vlan2 came up and I was able to ping to and from the switch.
Thank you very much.
You da man, there was a password set on the main switch but not on the other one. As soon as I changed it then vlan2 came up and I was able to ping to and from the switch.
Thank you very much.
Glad it worked out.
The main switch should be the VTP server and the second switch should be the VTP client.
If they are on VTP transparent mode, then you need the same VLANs on each switch.
sh vtp status will tell you.