Unsolved
This post is more than 5 years old
4 Posts
0
5937
PC6248 not allowing cisco inter vlan routing
Hello folks,
I have a PC6248 as a core switch doing my routing. Due to a failure of my past counter part, the entire network was left on vlan 1 with no trunks. Concerns have been raised that require me to turn 3 new cisco 2960 L2 switches into trunks off of the 6248. Currently I have one port (as a test) configured to trunk between the two. I am able to ping the dell interface from a pc connected off of the cisco switch, but I am unable to route through to vlan 1. There are critical devices that are running on vlan 1 that prevents me from moving them to another vlan. The plan is move all users off of vlan 1 while allowing the critical devices to continue to being used with little downtown for the transition. There are a couple of other vlans that are on the switch that are working, but both are used as access links and not trunks. Not sure what I am missing to have this work. Below are the configs for both the dell and the cisco switch minus proprietary information. The route table is also posted.
Dell6248_Dist#show run
!Current Configuration:
!System Description "Dell 48 Port Gigabit Ethernet, 2.1.1.4, VxWorks5.5.1"
!System Software Version 2.1.1.4
!
configure
vlan protocol group "Test"
vlan protocol group add protocol 1 ip
vlan database
vlan 5,12,14,20-31
protocol group 1 20
exit
snmp-server location "Rm 50"
snmp-server contact "Daniel"
hostname "Dell6248_Dist"
clock summer-time recurring Usa
clock timezone -5 minutes 0 zone "1"
stack
member 1 2
exit
ip address 192.168.0.1 255.255.255.0
ip address vlan 2
no ip domain-lookup
ip domain-name jmhny.org
ip name-server 192.168.10.24
ip name-server 192.168.10.250
ipv6 router ospf
no enable
exit
ip routing
ip route 192.168.13.0 255.255.255.0 192.168.10.101
ip route 192.168.30.0 255.255.255.0 192.168.10.100
ip route 192.168.15.0 255.255.255.0 192.168.10.10
ip route 172.18.9.160 255.255.255.240 192.168.10.10
ip route 172.28.16.0 255.255.240.0 192.168.10.50
ip route 172.28.8.0 255.255.248.0 192.168.10.50
ip route 172.30.0.0 255.255.0.0 192.168.10.50
ip route 206.28.216.0 255.255.255.240 192.168.10.10
ip route 10.1.100.8 255.255.255.248 192.168.10.10
ip route 10.48.239.0 255.255.255.0 192.168.10.10
ip route 198.92.118.0 255.255.255.0 192.168.10.10
ip route 192.168.51.0 255.255.255.0 192.168.10.101
ip route 192.168.17.0 255.255.255.0 192.168.10.10
ip route 192.168.50.0 255.255.255.0 192.168.10.101
ip route 192.168.35.0 255.255.255.0 192.168.10.100
ip route 192.168.16.0 255.255.255.0 192.168.10.10
ip route 192.168.1.0 255.255.255.0 192.168.10.10
ip route 206.145.29.0 255.255.255.0 192.168.10.50
ip route 206.145.30.0 255.255.254.0 192.168.10.50
ip route 0.0.0.0 0.0.0.0 192.168.10.1
ip route 192.168.99.1 255.255.255.255 192.168.10.10
ip route 192.168.70.0 255.255.255.0 192.168.10.10
ip route 208.79.194.0 255.255.255.0 192.168.10.10
router rip
no enable
exit
interface vlan 1
routing
ip address 192.168.10.254 255.255.254.0
ipv6 nd suppress-ra
ipv6 ospf
ipv6 ospf mtu-ignore
exit
interface vlan 12
name "Main Street Medical"
routing
ip address 192.168.12.1 255.255.255.0
ipv6 nd suppress-ra
ipv6 ospf
ipv6 ospf mtu-ignore
no ip proxy-arp
exit
interface vlan 14
name "Street"
routing
ip address 192.168.14.1 255.255.255.0
ipv6 nd suppress-ra
ipv6 ospf
ipv6 ospf mtu-ignore
no ip proxy-arp
exit
interface vlan 20
name "Vlan_Test"
routing
ip address 10.10.10.1 255.255.255.240
exit
ip ssh pubkey-auth
no spanning-tree
spanning-tree bpdu filtering
spanning-tree bpdu-protection
bridge multicast filtering
!
interface ethernet 1/g1
storm-control broadcast
spanning-tree disable
spanning-tree root-protection
exit
!
interface ethernet 1/g2
storm-control broadcast
spanning-tree disable
spanning-tree root-protection
exit
!
interface ethernet 1/g3
storm-control broadcast
spanning-tree disable
spanning-tree root-protection
exit
!
interface ethernet 1/g4
storm-control broadcast
exit
!
interface ethernet 1/g5
storm-control broadcast
shutdown
exit
!
interface ethernet 1/g6
storm-control broadcast
shutdown
exit
!
interface ethernet 1/g7
storm-control broadcast
exit
!
interface ethernet 1/g8
storm-control broadcast
shutdown
exit
!
interface ethernet 1/g9
storm-control broadcast
exit
!
interface ethernet 1/g10
storm-control broadcast
exit
!
interface ethernet 1/g11
storm-control broadcast
exit
!
interface ethernet 1/g12
storm-control broadcast
switchport access vlan 12
exit
!
interface ethernet 1/g13
storm-control broadcast
exit
!
interface ethernet 1/g14
storm-control broadcast
switchport access vlan 14
exit
!
interface ethernet 1/g15
storm-control broadcast
exit
!
interface ethernet 1/g16
storm-control broadcast
exit
!
interface ethernet 1/g17
storm-control broadcast
exit
!
interface ethernet 1/g18
storm-control broadcast
exit
!
interface ethernet 1/g19
storm-control broadcast
switchport access vlan 20
exit
!
interface ethernet 1/g20
storm-control broadcast
spanning-tree disable
switchport mode general
no switchport general acceptable-frame-type tagged-only
switchport general allowed vlan add 20
exit
!
interface ethernet 1/g21
storm-control broadcast
exit
!
interface ethernet 1/g22
storm-control broadcast
shutdown
exit
!
interface ethernet 1/g23
storm-control broadcast
exit
!
interface ethernet 1/g24
storm-control broadcast
exit
!
interface ethernet 1/g25
storm-control broadcast
exit
!
interface ethernet 1/g26
storm-control broadcast
exit
!
interface ethernet 1/g27
storm-control broadcast
exit
!
interface ethernet 1/g28
storm-control broadcast
exit
!
interface ethernet 1/g29
storm-control broadcast
exit
!
interface ethernet 1/g30
storm-control broadcast
exit
!
interface ethernet 1/g31
storm-control broadcast
exit
!
interface ethernet 1/g32
storm-control broadcast
exit
!
interface ethernet 1/g33
storm-control broadcast
exit
!
interface ethernet 1/g34
storm-control broadcast
exit
!
interface ethernet 1/g35
storm-control broadcast
exit
!
interface ethernet 1/g36
storm-control broadcast
exit
!
interface ethernet 1/g37
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g38
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g39
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g40
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g41
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g42
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g43
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g44
channel-group 4 mode on
storm-control broadcast
exit
!
interface ethernet 1/g45
channel-group 5 mode on
storm-control broadcast
exit
!
interface ethernet 1/g46
channel-group 5 mode on
storm-control broadcast
exit
!
interface ethernet 1/g47
channel-group 5 mode on
storm-control broadcast
exit
!
interface ethernet 1/g48
channel-group 5 mode on
storm-control broadcast
exit
#################
#################
S 0.0.0.0/0 [1/0] via 192.168.10.1, vlan 1
C 10.10.10.0/28 [0/0] directly connected vlan 20
S 10.1.100.8/29 [1/0] via 192.168.10.10, vlan 1
S 10.48.239.0/24 [1/0] via 192.168.10.10, vlan 1
S 192.168.1.0/24 [1/0] via 192.168.10.10, vlan 1
C 192.168.10.0/23 [0/0] directly connected, vlan 1
C 192.168.12.0/24 [0/0] directly connected, vlan 12
S 192.168.13.0/24 [1/0] via 192.168.10.101, vlan 1
C 192.168.14.0/24 [0/0] directly connected, vlan 14
S 192.168.15.0/24 [1/0] via 192.168.10.10, vlan 1
S 192.168.16.0/24 [1/0] via 192.168.10.10, vlan 1
S 192.168.17.0/24 [1/0] via 192.168.10.10, vlan 1
S 192.168.30.0/24 [1/0] via 192.168.10.100, vlan 1
S 192.168.35.0/24 [1/0] via 192.168.10.100, vlan 1
S 192.168.50.0/24 [1/0] via 192.168.10.101, vlan 1
S 192.168.51.0/24 [1/0] via 192.168.10.101, vlan 1
S 192.168.60.0/24 [1/0] via 192.168.10.100, vlan 1
S 192.168.70.0/24 [1/0] via 192.168.10.10, vlan 1
S 192.168.99.1/32 [1/0] via 192.168.10.10, vlan 1
dutchsoccer
4 Posts
0
November 1st, 2010 13:00
Figured this out.