Solved

HP V1910 Switches - VLAN across multiple switches

Posted on 2014-09-03
4
560 Views
Last Modified: 2014-09-14
I have 2 HP V1910G switches and I have setup two VLANs on both.

SW1: downstairs - VLAN 1 IP 10.1.3.201, VLAN 2 IP 192.168.2.201
SW2: upstairs - VLAN 1 IP 10.1.3.202, VLAN 2 IP 192.168.2.202
Router X0 10.1.2.25 (normal LAN gateway)
Router X3 192.168.2.25 (accounting dept gateway)

VLAN 1 (default VLAN): normal LAN, 10.1.x.x subnets
VLAN 2: accounting department, 192.168.2.x subnet


The VLANs all work perfectly fine within the same switch.  But I am having trouble getting the traffic to go from one switch to the other.

Everything works fine on VLAN 1 (default) between the two switches and all the traffic can reach the router.  This was basically plug and play.

For VLAN 2, on the SW1 I can ping the router from the switch and the switch from the router, but I cannot ping SW2 or the client PC.

On the SW2 I can ping the client PC from the switch and the switch from the client PC, but I cannot ping SW1 or the router.


Here are the port configs:

SW1 port 2 (physical connection to router)
Type: Access
Untagged Membership: VLAN 2
PVID: 2

SW1 port 47 (physical connection to SW2)
Type: Hybrid
Untagged Membership: VLAN 1
Tagged Membership:  VLAN 2
PVID: 1

SW2 port 47 (physical connection to SW1)
Type: Hybrid
Untagged Membership: VLAN 1
Tagged Membership:  VLAN 2
PVID: 1

SW2 port 45 (physical connection to client PC)
Type: Access
Untagged Membership: VLAN 2
PVID: 2



What piece of the configuration am I missing in order to get the traffic on VLAN 2 to pass between the two switches?  I have been working at this for 2-3 days and have exhausted my own limited knowledge.

What other information do you need from me?

Thank you.
0
Comment
Question by:yuggol
  • 3
4 Comments
 
LVL 2

Expert Comment

by:Matty-CT
ID: 40301334
For VLAN2 what's your subnet masking? Check the masking and TCP/IP settings again. Post them if you can.

Telnet into SW1 and SW2 and do the command:

show mac-address port 47

(I think that's the syntax) which should show you the connected devices with learned MAC addresses, just in case you have some IP issue. Your tagging looks correct at first glance.

Matt
0
 

Author Comment

by:yuggol
ID: 40301416
Matt,

VLAN2 subnet masking is as follows:

On SW1, 192.168.2.201 mask 255.255.255.0
On SW2, 192.168.2.202 mask 255.255.255.0
On router X3, 192.168.2.25 mask 255.255.255.0
On client PC, 192.168.2.101 mask 255.255.255.0


When I telnet into the switches to run that command, I can't get anywhere:
<stack_0.SW1>show mac-address port 47
             ^
 % Unrecognized command found at '^' position.

Open in new window



I assume this shows the same thing as ARP Management in the GUI.  Here are the results - as you can see there is nothing on VLAN 2 at all.


From SW1

IP ADDRESS     MAC Address         VLAN   PORT                            Type
10.1.3.11              0026-736d-67cb      1      GigabitEthernet1/0/47      Dynamic      
10.1.3.203      4431-9259-2079      1      GigabitEthernet1/0/47      Dynamic      
10.1.3.204      4431-9253-b617      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.1              68b5-99ef-d039      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.3              6431-5037-307d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.4              d8d1-cb85-ac61      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.5              6431-5037-3072      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.10         6431-5037-30e2      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.14       6431-50a3-88f0      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.16       7446-a0b4-3e6d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.19              9c04-ebaf-f1f4      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.20              0021-5c2b-2569      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.21              b034-9520-2167      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.23              6431-5037-6728      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.25              7446-a0be-08be      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.31              9cb6-549f-537d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.40              000f-fec7-a28f      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.44              001b-0031-e6ce      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.50              e411-5b56-b0f4      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.54              6431-50a3-f634      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.59              2c44-fd1a-efc9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.61         a0d3-c19c-a458      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.62              7446-a0be-0871      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.65              8000-6edd-c7f0      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.66              c4d9-8798-c966      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.69              8000-6eaa-d07a      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.73              2cb4-3a74-38e5      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.81              6431-5037-307c      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.83              a0ed-cdbf-1743      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.85              68b5-99f1-cf99      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.87              b4f0-ab7f-b5d9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.88              2cbe-0815-dec5      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.91              1499-e259-f9cf      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.92          000f-fec7-a167      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.97              5c8d-4e65-f9b9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.101      6431-5037-2fd3      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.107      000f-fec7-a295      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.109      000f-fefc-e29e      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.207      6c62-6de4-9bab      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.224      a886-dd55-a778      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.235      8c29-3709-571f      1      GigabitEthernet1/0/47      Dynamic


From SW2

IP ADDRESS     MAC Address         VLAN   PORT                            Type
10.1.5.4              d8d1-cb85-ac61      1      GigabitEthernet1/0/47      Dynamic
10.1.5.19              9c04-ebaf-f1f4      1      GigabitEthernet1/0/47      Dynamic
10.1.5.21              b034-9520-2167      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.65              8000-6edd-c7f0      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.68              e48b-7fc3-aa8d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.73              2cb4-3a74-38e5      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.87              b4f0-ab7f-b5d9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.224      a886-dd55-a778      1      GigabitEthernet1/0/47

0
 

Accepted Solution

by:
yuggol earned 0 total points
ID: 40311867
Problem is solved.  It had nothing to do with the switches' config - it was a simple cabling issue.
 
 
Actually it was the lack of documentation by those who installed the wiring in this building.  We had SW2 port 47 connected to the port in the patch panel which we THOUGHT was the physical connection to SW1 downstairs.  Turns out it wasn't at all; the actual run was punched to port 11, not port 48 so that's why VLAN1 would pass through but not any of the other VLANs.
0
 

Author Closing Comment

by:yuggol
ID: 40321523
Self solved
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL is a very common protocol used these days when browsing the web.  The purpose is to provide security to communication, but how does it do it?  There are several pieces at work that have to be setup before SSL will even work and it requires both …
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question