Solved

HP V1910 Switches - VLAN across multiple switches

Posted on 2014-09-03
4
553 Views
Last Modified: 2014-09-14
I have 2 HP V1910G switches and I have setup two VLANs on both.

SW1: downstairs - VLAN 1 IP 10.1.3.201, VLAN 2 IP 192.168.2.201
SW2: upstairs - VLAN 1 IP 10.1.3.202, VLAN 2 IP 192.168.2.202
Router X0 10.1.2.25 (normal LAN gateway)
Router X3 192.168.2.25 (accounting dept gateway)

VLAN 1 (default VLAN): normal LAN, 10.1.x.x subnets
VLAN 2: accounting department, 192.168.2.x subnet


The VLANs all work perfectly fine within the same switch.  But I am having trouble getting the traffic to go from one switch to the other.

Everything works fine on VLAN 1 (default) between the two switches and all the traffic can reach the router.  This was basically plug and play.

For VLAN 2, on the SW1 I can ping the router from the switch and the switch from the router, but I cannot ping SW2 or the client PC.

On the SW2 I can ping the client PC from the switch and the switch from the client PC, but I cannot ping SW1 or the router.


Here are the port configs:

SW1 port 2 (physical connection to router)
Type: Access
Untagged Membership: VLAN 2
PVID: 2

SW1 port 47 (physical connection to SW2)
Type: Hybrid
Untagged Membership: VLAN 1
Tagged Membership:  VLAN 2
PVID: 1

SW2 port 47 (physical connection to SW1)
Type: Hybrid
Untagged Membership: VLAN 1
Tagged Membership:  VLAN 2
PVID: 1

SW2 port 45 (physical connection to client PC)
Type: Access
Untagged Membership: VLAN 2
PVID: 2



What piece of the configuration am I missing in order to get the traffic on VLAN 2 to pass between the two switches?  I have been working at this for 2-3 days and have exhausted my own limited knowledge.

What other information do you need from me?

Thank you.
0
Comment
Question by:yuggol
  • 3
4 Comments
 
LVL 2

Expert Comment

by:Matty-CT
Comment Utility
For VLAN2 what's your subnet masking? Check the masking and TCP/IP settings again. Post them if you can.

Telnet into SW1 and SW2 and do the command:

show mac-address port 47

(I think that's the syntax) which should show you the connected devices with learned MAC addresses, just in case you have some IP issue. Your tagging looks correct at first glance.

Matt
0
 

Author Comment

by:yuggol
Comment Utility
Matt,

VLAN2 subnet masking is as follows:

On SW1, 192.168.2.201 mask 255.255.255.0
On SW2, 192.168.2.202 mask 255.255.255.0
On router X3, 192.168.2.25 mask 255.255.255.0
On client PC, 192.168.2.101 mask 255.255.255.0


When I telnet into the switches to run that command, I can't get anywhere:
<stack_0.SW1>show mac-address port 47
             ^
 % Unrecognized command found at '^' position.

Open in new window



I assume this shows the same thing as ARP Management in the GUI.  Here are the results - as you can see there is nothing on VLAN 2 at all.


From SW1

IP ADDRESS     MAC Address         VLAN   PORT                            Type
10.1.3.11              0026-736d-67cb      1      GigabitEthernet1/0/47      Dynamic      
10.1.3.203      4431-9259-2079      1      GigabitEthernet1/0/47      Dynamic      
10.1.3.204      4431-9253-b617      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.1              68b5-99ef-d039      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.3              6431-5037-307d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.4              d8d1-cb85-ac61      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.5              6431-5037-3072      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.10         6431-5037-30e2      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.14       6431-50a3-88f0      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.16       7446-a0b4-3e6d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.19              9c04-ebaf-f1f4      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.20              0021-5c2b-2569      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.21              b034-9520-2167      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.23              6431-5037-6728      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.25              7446-a0be-08be      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.31              9cb6-549f-537d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.40              000f-fec7-a28f      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.44              001b-0031-e6ce      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.50              e411-5b56-b0f4      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.54              6431-50a3-f634      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.59              2c44-fd1a-efc9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.61         a0d3-c19c-a458      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.62              7446-a0be-0871      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.65              8000-6edd-c7f0      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.66              c4d9-8798-c966      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.69              8000-6eaa-d07a      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.73              2cb4-3a74-38e5      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.81              6431-5037-307c      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.83              a0ed-cdbf-1743      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.85              68b5-99f1-cf99      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.87              b4f0-ab7f-b5d9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.88              2cbe-0815-dec5      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.91              1499-e259-f9cf      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.92          000f-fec7-a167      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.97              5c8d-4e65-f9b9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.101      6431-5037-2fd3      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.107      000f-fec7-a295      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.109      000f-fefc-e29e      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.207      6c62-6de4-9bab      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.224      a886-dd55-a778      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.235      8c29-3709-571f      1      GigabitEthernet1/0/47      Dynamic


From SW2

IP ADDRESS     MAC Address         VLAN   PORT                            Type
10.1.5.4              d8d1-cb85-ac61      1      GigabitEthernet1/0/47      Dynamic
10.1.5.19              9c04-ebaf-f1f4      1      GigabitEthernet1/0/47      Dynamic
10.1.5.21              b034-9520-2167      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.65              8000-6edd-c7f0      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.68              e48b-7fc3-aa8d      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.73              2cb4-3a74-38e5      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.87              b4f0-ab7f-b5d9      1      GigabitEthernet1/0/47      Dynamic      
10.1.5.224      a886-dd55-a778      1      GigabitEthernet1/0/47

0
 

Accepted Solution

by:
yuggol earned 0 total points
Comment Utility
Problem is solved.  It had nothing to do with the switches' config - it was a simple cabling issue.
 
 
Actually it was the lack of documentation by those who installed the wiring in this building.  We had SW2 port 47 connected to the port in the patch panel which we THOUGHT was the physical connection to SW1 downstairs.  Turns out it wasn't at all; the actual run was punched to port 11, not port 48 so that's why VLAN1 would pass through but not any of the other VLANs.
0
 

Author Closing Comment

by:yuggol
Comment Utility
Self solved
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

The article explains the protocols and technology which is involved when two computers on different TCP/IP networks communicate with each other. In the diagram, a router is used to segregate two networks. The networks are 192.168.1.0/24 and 192…
Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now