Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

VLAN confusion and questions


  • Please log in to reply
13 replies to this topic

#1 chaospinhead

chaospinhead

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:38 AM

Posted 04 June 2015 - 07:54 AM

I am new to setting up a VLAN.  I have done a lot of reading and testing in the environment that I have to get this working on.  But it still is only partially working and I can't figure out why.

 

I have a Watchguard XTM 330 at the head of the network with a Cisco Catalyst switch behind it and another Catalyst Fiber switch spreading fiber to many HPV1910 switches around the facility.  Vlan works fine on the Watchguard, works fine on the 2 cisco boxes and works fine on 1 HPV1910 switch.  I have 2 switches jumpered to the first V1910 and the VLANs do not work on the other two switches.  I have the ports set as Trunk ports that jumper them together with Vlan 1 untagged (data) and vlan 172 tagged (phone) but still it doesn't work.  The phones will not pull an IP from their Vlan.  All the switches have identical configuration with the exception of the jumper ports connecting them being different but they are all trunk ports anyway.  The only difference is that the first switch the connection comes from Fiber from the Cisco across the building.

 

Any idea what my mistake might be here?  All the fiber connections are trunk ports on both sides.

 

If two switches are being jumpered together with a standard cat cable both ports need to be trunk ports with untagged and tagged vlan correct otherwise the vlan information will not be passed between them?


Edited by chaospinhead, 04 June 2015 - 07:59 AM.


BC AdBot (Login to Remove)

 


#2 CaveDweller2

CaveDweller2

  • Members
  • 2,629 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 04 June 2015 - 09:33 AM

We need to see the configuration.


Hope this helps thumbup.gif

Associate in Applied Science - Network Systems Management - Trident Technical College


#3 Wand3r3r

Wand3r3r

  • Members
  • 2,027 posts
  • OFFLINE
  •  
  • Local time:11:38 PM

Posted 04 June 2015 - 01:51 PM

usually trunks are tagged and ports are untagged.  Sounds like you have too many switches in series which is a bad network design.



#4 chaospinhead

chaospinhead
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:38 AM

Posted 04 June 2015 - 02:23 PM

Only ports that connect switches are configured as trunk ports. The rest are configured as Hybrid which is an HP thing and I'm told that's what they are supposed to be. And like I said it works on the first of 3 switches that the fiber comes into just not the two below it. I'll see if I can get a diagram put together to post. As for too many switches there is 3 24 port switches in that closet and 60 plus pets in use how can you have too many switches? It's a junction point to most of the companies phones/pcs :). I didn't design it anyway I just have to make it work and soon.

Edited by chaospinhead, 04 June 2015 - 02:26 PM.


#5 Wand3r3r

Wand3r3r

  • Members
  • 2,027 posts
  • OFFLINE
  •  
  • Local time:11:38 PM

Posted 04 June 2015 - 02:38 PM

" switches in series"

 

Cisco Catalyst<>Catalyst Fiber<>many HPV1910<ok to this point>2 switches jumpered to the first V1910 <-not ok at this point.  These should be cabled to the Catalyst Fiber.  Just saying.

 

My networks go Backbone switch<> all other switches

 

In your described situation you would have bought stackable switches which turn multiple switches into one switch or a single backbone switch with enough ports.  This is a design consideration and doesn't/shouldn't relate to your vlan issue.  Farther down in series you go the more traffic contention you have since instead of being handled on the switches backplane its handled at the port level.

 

you may want to, as a test, cable either of these two HPs to the fiber switch and see if the vlans work.



#6 technonymous

technonymous

  • Members
  • 2,499 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:38 PM

Posted 05 June 2015 - 06:36 PM

I agree with the others you got so many switches in the mix. Maybe you have devices that don't support 802.1q trunk tagging? If that is the case then you need to setup a vlan trunk for native. Also, be aware native defaults to vlan 1 so you need to change that.



#7 chaospinhead

chaospinhead
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:38 AM

Posted 05 June 2015 - 07:11 PM

My switches all support 802.1q

Here is a basic network diagram

amfn1j.jpg

10.5.0.22 and 10.5.0.24 in the owner's closet are the two where the Vlan doesn't work.  I haven't even checked the one in Assembly yet either.

Here is the basic config for .22 and .24  Any port with Orange (gigabit) line going to it is designated trunk.

 

This is in format:

Port | Untagged | Tagged | Type | PVID

GE1/0/1 1 172 Trunk 1     GE1/0/3 1 172 Hybrid 1     GE1/0/5 1 172 Hybrid 1     GE1/0/7 1 172 Hybrid 1     GE1/0/9 1 172 Hybrid 1     GE1/0/11 1 172 Hybrid 1     GE1/0/13 1 172 Hybrid 1     GE1/0/15 1 172 Hybrid 1     GE1/0/17 1 172 Hybrid 1     GE1/0/19 1 172 Hybrid 1     GE1/0/21 1 172 Hybrid 1     GE1/0/23 1 172 Hybrid 1     GE1/0/2 1 172 Trunk 1     GE1/0/4 1 172 Hybrid 1     GE1/0/6 1 172 Hybrid 1     GE1/0/8 1 172 Hybrid 1     GE1/0/10 1 172 Hybrid 1     GE1/0/12 1 172 Hybrid 1     GE1/0/14 1 172 Hybrid 1     GE1/0/16 1 172 Hybrid 1     GE1/0/18 1 172 Hybrid 1     GE1/0/20 1 172 Hybrid 1     GE1/0/22 1 172 Hybrid 1     GE1/0/24 1 172 Hybrid 1     GE1/0/25 1 172 Trunk 1     GE1/0/26 1 172 Trunk 1     GE1/0/27 1 172 Trunk 1     GE1/0/28 1 172 Trunk 1

 

I'm going in tomorrow to try some stuff.  As a two man outfit with 90+ clients finding time to "test and troubleshoot" is not the easiest.  Most of this network was setup prior to me being in the picture.  The HP switches we put in replaced unmanaged linksys switches.  The network was half setup for VLAN when we arrived and we are trying to finish it.  But this is literally my first run in with VLANs so I'm learning as I go.

 

You will notice two connections from the 3550 going into the HP.  This is because I had no idea when I plugged them in where they came from lol.  Since mapping the network I have figured that out.  I will be moving one of those to one of the other two switches in an effort to get a second switch up.  Then I plan to if I have the parts on hand to jumped the 2nd and 3rd switch using the GBIC ports rather than a regular port to see if the 3rd one + the Ward Closet switch get VLAN working as well.

 

I will be testing the Warehouse office and the Assembly tomorrow as well.  Can't do any of this during the work day which has made it difficult to test much, so I wanted to post prior to doing it to get any ideas and maybe save me some time.


Edited by chaospinhead, 05 June 2015 - 08:44 PM.


#8 technonymous

technonymous

  • Members
  • 2,499 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:38 PM

Posted 05 June 2015 - 10:15 PM

Seem's like you just need to go over the trunking and do some ping checks across there between the Owners closet and the 3550. Maybe go over the Owners Closet as well. Furthermore, Not sure if that is a typo or not, but in your diagram the 3550's ip is 10.0.5.25 ?? That would definitely kill traffic deader than door nail right there.



#9 chaospinhead

chaospinhead
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:38 AM

Posted 06 June 2015 - 12:14 AM

You are correct, it's a typo.  My bad.  I just made the diagram today in Visio, first one I've ever made.  I will post back tomorrow after I take a look and do some testing.  Hopefully with good results.



#10 CaveDweller2

CaveDweller2

  • Members
  • 2,629 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 06 June 2015 - 12:24 AM

So do we get to see a config file or are we supposed to guess at it?


Hope this helps thumbup.gif

Associate in Applied Science - Network Systems Management - Trident Technical College


#11 chaospinhead

chaospinhead
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:38 AM

Posted 06 June 2015 - 12:34 AM

I will try to get a config from the HP switches tomorrow.  I set them up through the web interface.  Just to be clear what do you want to see the config of?  I am new to Cisco as well.  This whole project is learning for me.  But I have all the login credentials for everything.  So if you would kindly tell me what exactly you want me to type on which switch, I will do so.

 

Thanks,



#12 CaveDweller2

CaveDweller2

  • Members
  • 2,629 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 06 June 2015 - 01:06 AM

On Cisco from privileged mode ( aka enable ) - show run

 

On HP from privileged mode ( not sure how to get there tho) - show config 

 

Then copy everything between those commands and when the prompt pops back up. On the Cisco you have to hit the spacebar a few times to get it all to show. Not sure on the HP.


Hope this helps thumbup.gif

Associate in Applied Science - Network Systems Management - Trident Technical College


#13 chaospinhead

chaospinhead
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:38 AM

Posted 08 June 2015 - 08:22 AM

I tried pulling a config on the HP switches this morning, no can do.  The CLI is very minimal on these switches as they are meant to be configured from the web interface.  There is only 9 commands I can use and none of them give me the info you want.

 

Edit:
Found it, if I backup the config I can open the config file and see the actual config.  Here it is.
 
#
 version 5.20, Release 1513P62
#
 sysname HP-V1910-24
#
 domain default enable system 
#
 telnet server enable 
#
 ip ttl-expires enable
#
 cluster enable 
 stack ip-pool 192.168.1.5 255.255.255.0
#
 password-recovery enable
#
vlan 1
#
vlan 172
#
domain system 
 access-limit disable 
 state active 
 idle-cut disable 
 self-service-url disable 
#
user-group system
#
local-user admin
 password cipher $c$3$OjhGrNW+Q5TQP7kydL2dxdaQ7FWkGDh52HCBnw==
 authorization-attribute level 3
 service-type ssh telnet terminal
 service-type web
#
 stp mode rstp
 stp enable
#
interface NULL0
#
interface Vlan-interface1
 ip address 10.5.0.24 255.255.0.0 
#
interface GigabitEthernet1/0/1
 port link-type trunk
 port trunk permit vlan 1 172
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/2
 port link-type trunk
 port trunk permit vlan 1 172
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/3
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/4
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/5
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/6
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/7
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/8
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/9
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/10
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/11
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/12
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/13
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/14
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/15
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/16
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/17
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/18
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/19
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/20
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/21
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/22
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/23
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/24
 port link-type hybrid
 port hybrid vlan 172 tagged
 port hybrid vlan 1 untagged
 undo voice vlan mode auto
 voice vlan 172 enable
 poe enable
 stp edged-port enable
#
interface GigabitEthernet1/0/25
 port link-type trunk
 port trunk permit vlan 1 172
 undo voice vlan mode auto
 voice vlan 172 enable
 stp edged-port enable
#
interface GigabitEthernet1/0/26
 port link-type trunk
 port trunk permit vlan 1 172
 undo voice vlan mode auto
 voice vlan 172 enable
 stp edged-port enable
#
interface GigabitEthernet1/0/27
 port link-type trunk
 port trunk permit vlan 1 172
 undo voice vlan mode auto
 voice vlan 172 enable
 stp edged-port enable
#
interface GigabitEthernet1/0/28
 port link-type trunk
 port trunk permit vlan 1 172
 undo voice vlan mode auto
 voice vlan 172 enable
 stp edged-port enable
#
 ip route-static 0.0.0.0 0.0.0.0 Vlan-interface1 10.5.0.1
#
 snmp-agent
 snmp-agent local-engineid 8000000B03784859AAA6D0
 snmp-agent community read public@cm1 
 snmp-agent community read public@cm2 
 snmp-agent community read public@cm3 
 snmp-agent community read public@cm4 
 snmp-agent community write private@cm1 
 snmp-agent community write private@cm2 
 snmp-agent community write private@cm3 
 snmp-agent community write private@cm4 
 snmp-agent sys-info contact Bob Dear
 snmp-agent sys-info location Machine Room
 snmp-agent sys-info version all
 undo snmp-agent trap enable standard
#
user-interface aux 0
 authentication-mode scheme
user-interface vty 0 15
 authentication-mode scheme
#
return

 



#14 chaospinhead

chaospinhead
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:38 AM

Posted 08 June 2015 - 08:31 AM

Oh my gosh, I may have just found the problem.  The one switch I posted the config too is the one in the chain that doesn't work.  I notice on this switch the Voice-Vlan is enabled, its disabled on all the other switches because we couldn't get it to work.  I must have forgot to save the config.  I am going to remove that and test the phones and see if the Vlan now works through the whole place.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users