cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
521
Views
0
Helpful
8
Replies

Core to access switch ping working and access to core is not pinging

ziyadps
Level 1
Level 1

Hi,

we are facinf and issue with ping from access to core

core management vlan 98 192.168.98.1 255.255.255.0

vlan 103 192.168.103.1 255.255.255.0

trunk port enabled for vlan 103

able to ping access switch

Access switch management vlan 192.168.103.137 255.255.255.0

uplink trunk port enabled allowed vlan 103

unfortynatley core is not pinging from access switch

 

host getting ip address and host can ping access switch

1 Accepted Solution

Accepted Solutions

Richard Pidcock
Level 1
Level 1

I didn't see it in the config of your access switch.  Doe it have a default gateway statement.  (i.e. ip default-gateway x.x.x.x)

Richard W. Pidcock

View solution in original post

8 Replies 8

balaji.bandi
Hall of Fame
Hall of Fame
unfortynatley core is not pinging from access switch

you able to ping Access to Core - what IP address ?

you are not able to ping CORE to Access switch - may be using default ip to ping try using source vlan 103 ?

how is your routing configured on Core and Access switch ?

Look for me Access switch do not aware the IP coming from Core switch to reach back. so make sure Access switch aware routing setup correctly using ip route command.

good to post both the device config ( show run, show ip route and show cdp neigh )

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Able to ping from core to access

core 192.168.98.1 access 192.168.103.137

access to core is not pinging

ziyadps
Level 1
Level 1

access switch configuration

file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink none
unit-type-control-end
!
vlan database
vlan 98,100,102-105
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone
voice vlan oui-table add 00036b Cisco_phone
voice vlan oui-table add 00096e Avaya
voice vlan oui-table add 000fe2 H3C_Aolynk
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone
voice vlan oui-table add 00e075 Polycom/Veritel_phone
voice vlan oui-table add 00e0bb 3Com_phone
bonjour interface range vlan 1
hostname ASNIC-SPARE-SW
username admin password encrypted $15$zV/FEYyNRN4a4H9k$veOWaXNRaxTgzx2v0nL9zl9nQKNhE8skFYdLcam5Qp3gcW/U9PgCfs5PMx26dcNswXDjKYFfVRsNl8EAKKsXbg== privilege 15
ip ssh server
snmp-server server
snmp-server engineID local 800000090310a829b68655
snmp-server group fortinac v3 auth
encrypted snmp-server user forinacuser fortinac v3 auth md5 6QAlmTJhgku5jKfpW7s9HAVxHGT9ja0aQ3A2bJtg6IEM04wa2j/mwLAGzaX5vOGR
ip telnet server
!
interface vlan 103
ip address 192.168.103.137 255.255.255.0
!
interface GigabitEthernet1
switchport access vlan 103
!
interface GigabitEthernet2
switchport access vlan 103
!
interface GigabitEthernet3
switchport access vlan 103
!
interface GigabitEthernet4
switchport access vlan 103
!
interface GigabitEthernet5
switchport access vlan 103
!
interface GigabitEthernet6
switchport access vlan 103
!
interface GigabitEthernet7
switchport access vlan 103
!
interface GigabitEthernet8
switchport access vlan 103
!
interface GigabitEthernet9
spanning-tree link-type point-to-point
switchport mode trunk
switchport trunk allowed vlan 98,100,102-105
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
exit

 

core switch configuration 

service nagle
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime
service password-encryption
service sequence-numbers
service counters max age 5
service call-home
platform punt-keepalive disable-kernel-core
!
hostname ALSAGR-HQ-CORE-SW01
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
logging buffered warnings
logging console critical
enable secret 9 $9$/9MRbhj5ihKVWE$tt686HdToRzkZKeZ5aog9wAP9Ctl/XWLswjzaEgJoaM
enable password 7 047C090B5B284E4343
!
no aaa new-model
clock timezone UAE 4 0
switch 1 provision c9300-24t
switch 2 provision c9300-24t
!
!
!
!
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
no destination transport-method email
no ip source-route
ip routing
!
!
!
!
!
no ip domain lookup
ip domain name alsagrdxb.ae
ip dhcp excluded-address 10.170.0.1 10.170.0.5
ip dhcp excluded-address 192.168.13.189
!
ip dhcp pool WIFI-VLAN
network 10.170.0.0 255.255.254.0
default-router 10.170.0.1
dns-server 192.168.100.9 8.8.8.8
lease 0 0 30
!
!
!
ip dhcp snooping
login on-success log
!
!
!
!
!
!
!
vtp domain alsagrdxb.ad
vtp mode transparent
udld enable

udld message time 7

no device-tracking logging theft
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-899698078
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-899698078
revocation-check none
rsakeypair TP-self-signed-899698078
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-899698078
certificate self-signed 01
3082032E 30820216 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 38393936 39383037 38301E17 0D323130 33323030 38353935
325A170D 33303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3839 39363938
30373830 82012230 0D06092A 864886F7 0D010101 05000382 010F0030 82010A02
82010100 B420D2B7 2775CD07 DADE13B2 66D9FD78 8A75B388 5B3D6328 BE62B159
919078C6 CB34FAED F2555018 41AC4DAD 8F187026 E7072E15 D6B8A082 9B8CD83D
E6909AF0 13CD7E58 66BF3F91 1002C74E 7F7C66C9 C89F6AA7 0D25FBE0 82D340E3
E3AC472E 4C1B58EC 82EAAC54 1D4431D7 AB793A75 C0C3A653 D79871DC BBBF36B0
90494E00 35D8DC92 E041B231 89E63244 83556CAA 8EB6CA6E 9A61B399 AEC056EB
87D4E17B B9E02A88 EC31209D 77B131AA 3BCD5A1A 97EA3218 097B57AE 1CB3DB5A
9A1628B2 FD1A90A2 B5F2FD5D 097A2178 0BC2ED2F CC765510 6C2E8DD5 DFB3FE91
5CE5E511 BC7F015F 47BFF47D FD362B7F 51A12618 EC806462 07F0C75F A318616F
2F392947 02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F
0603551D 23041830 1680146E DE682822 346E9DDE 4D12C455 F79943C2 E384F230
1D060355 1D0E0416 04146EDE 68282234 6E9DDE4D 12C455F7 9943C2E3 84F2300D
06092A86 4886F70D 01010505 00038201 01003BB5 48BD6906 C5664D7B 16F8B230
AA8A3858 B87A7FDB F6E44544 79F984C1 FE6E2C84 680CD08E D98635D0 F1AE3357
6476D56A FF6E86F2 70A530D6 576DB847 F99FCA34 041C2C67 78069C63 1111446A
2B22311C CEBF829E 935DB107 EEFFE739 BC41DD42 586F4731 67808918 00C75976
B58EBFDE B001809B 40529982 CAEAEB1D 4B92B405 6D1EE6AF 0FF1EE39 C108EEBF
5866F010 BA2D3F7E D6E26525 787E42DF D2CB0AA8 55E6CB44 9DFE8B35 0AA4F618
C45AE70E E28602D2 B804135D DB3E56D2 3FAB5654 4D000D7C 6267ECC2 47D51C5E
98BDE5B3 3CA9EF65 F53794D7 18E2392B 4DF0E1FA 86F8BDDF EF6328EF 457A9309
2D0CA755 F42A2D52 B0EDB4B1 98E8019D AEF2
quit
!
!
license boot level network-advantage addon dna-advantage
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree portfast bpduguard default
spanning-tree extend system-id
spanning-tree uplinkfast
memory free low-watermark processor 134344
!
errdisable recovery cause udld
errdisable recovery cause bpduguard
errdisable recovery cause security-violation
errdisable recovery cause channel-misconfig
errdisable recovery cause dtp-flap
errdisable recovery cause link-flap
errdisable recovery cause gbic-invalid
errdisable recovery cause psecure-violation
errdisable recovery cause dhcp-rate-limit
errdisable recovery cause arp-inspection
errdisable recovery interval 60
username admin privilege 15 secret 9 $9$IoFYD9veFjnVD.$6zgcD63vXIAU0JPjTjQw5gsDvNPdWP1pFi14rhhk2oE
username priyan privilege 15 secret 9 $9$KeNIQRltUwq6O.$ECk98l/4Qpi9wd5OqMtx1AkAQ/LpvxlfI8epVF3s8jg
!
redundancy
mode sso
!
!
!
!
!
transceiver type all
monitoring
!
vlan 13
name ISOLOATED-NET
!
vlan 98
name P2P-Link-Firewall-CORE
!
vlan 100
name SERVER-VLAN
!
vlan 102
name USER-VLAN1
!
vlan 103
name USER-VLAN2
!
vlan 104
name USER-VLAN3
!
vlan 105
name USER-VLAN4
!
vlan 170
name DSL-INTERNET
!
vlan 180-183
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
class-map match-any system-cpp-default
description EWLC Data, Inter FED Traffic
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
interface Port-channel1
description connected to FIREWALL-1
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
spanning-tree portfast disable
!
interface Port-channel2
description connected to FIREWALL-2
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
spanning-tree portfast disable
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 13
switchport mode access
!
interface GigabitEthernet1/0/2
switchport access vlan 13
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/3
switchport access vlan 13
switchport mode access
!
interface GigabitEthernet1/0/4
switchport access vlan 13
switchport mode access
!
interface GigabitEthernet1/0/5
switchport trunk allowed vlan 98,100,102-105
switchport mode trunk
!
interface GigabitEthernet1/0/6
switchport access vlan 103
switchport mode access
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
switchport access vlan 180
switchport mode access
!
interface GigabitEthernet1/0/9
switchport access vlan 170
switchport mode access
!
interface GigabitEthernet1/0/10
switchport access vlan 170
switchport mode access
spanning-tree portfast disable
!
interface GigabitEthernet1/0/11
switchport access vlan 170
switchport mode access
spanning-tree portfast disable
!
interface GigabitEthernet1/0/12
switchport access vlan 170
switchport mode access
spanning-tree portfast disable
!
interface GigabitEthernet1/0/13
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet1/0/14
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet1/0/15
description "Server Vlan 100"
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet1/0/16
description "Server Vlan 100"
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet1/0/17
description "Ground Floor Vlan 102"
switchport access vlan 102
switchport mode access
!
interface GigabitEthernet1/0/18
description "First Floor Vlan 103"
switchport access vlan 103
switchport mode access
!
interface GigabitEthernet1/0/19
description "Second Floor Vlan 104"
switchport access vlan 104
switchport mode access
no cdp enable
!
interface GigabitEthernet1/0/20
description "Server vlan 105"
switchport access vlan 105
switchport mode access
no cdp enable
spanning-tree portfast
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
description connected to FIREWALL-1
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
channel-group 1 mode active
!
interface GigabitEthernet1/0/23
description connected to FIREWALL-1
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
channel-group 1 mode active
!
interface GigabitEthernet1/0/24
description connected to FIREWALL-1
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
channel-group 1 mode active
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/5
!
interface TenGigabitEthernet1/1/6
!
interface TenGigabitEthernet1/1/7
!
interface TenGigabitEthernet1/1/8
!
interface FortyGigabitEthernet1/1/1
!
interface FortyGigabitEthernet1/1/2
!
interface TwentyFiveGigE1/1/1
!
interface TwentyFiveGigE1/1/2
!
interface AppGigabitEthernet1/0/1
!
interface GigabitEthernet2/0/1
switchport access vlan 13
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/2
switchport access vlan 13
switchport mode access
!
interface GigabitEthernet2/0/3
switchport access vlan 13
switchport mode access
!
interface GigabitEthernet2/0/4
switchport access vlan 13
switchport mode access
!
interface GigabitEthernet2/0/5
!
interface GigabitEthernet2/0/6
!
interface GigabitEthernet2/0/7
!
interface GigabitEthernet2/0/8
!
interface GigabitEthernet2/0/9
switchport access vlan 170
switchport mode access
!
interface GigabitEthernet2/0/10
switchport access vlan 170
switchport mode access
spanning-tree portfast disable
!
interface GigabitEthernet2/0/11
switchport access vlan 170
switchport mode access
spanning-tree portfast disable
!
interface GigabitEthernet2/0/12
switchport access vlan 170
switchport mode access
spanning-tree portfast disable
!
interface GigabitEthernet2/0/13
description "Server Vlan 100"
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet2/0/14
description "Server Vlan 100"
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet2/0/15
description "Server Vlan 100"
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet2/0/16
description "Server Vlan 100"
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet2/0/17
description "Ground Floor Vlan 102"
switchport access vlan 102
switchport mode access
!
interface GigabitEthernet2/0/18
description "First Floor Vlan 103"
switchport access vlan 103
switchport mode access
no cdp enable
!
interface GigabitEthernet2/0/19
description "Second Floor Vlan 104"
switchport access vlan 104
switchport mode access
no cdp enable
!
interface GigabitEthernet2/0/20
description "Server vlan 105"
switchport access vlan 105
switchport mode access
no cdp enable
spanning-tree portfast
!
interface GigabitEthernet2/0/21
!
interface GigabitEthernet2/0/22
description connected to FIREWALL-2
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
channel-group 2 mode active
!
interface GigabitEthernet2/0/23
description connected to FIREWALL-2
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
channel-group 2 mode active
!
interface GigabitEthernet2/0/24
description connected to FIREWALL-2
switchport trunk allowed vlan 13,98,100,180-183
switchport mode trunk
channel-group 2 mode active
!
interface GigabitEthernet2/1/1
!
interface GigabitEthernet2/1/2
!
interface GigabitEthernet2/1/3
!
interface GigabitEthernet2/1/4
!
interface TenGigabitEthernet2/1/1
!
interface TenGigabitEthernet2/1/2
!
interface TenGigabitEthernet2/1/3
!
interface TenGigabitEthernet2/1/4
!
interface TenGigabitEthernet2/1/5
!
interface TenGigabitEthernet2/1/6
!
interface TenGigabitEthernet2/1/7
!
interface TenGigabitEthernet2/1/8
!
interface FortyGigabitEthernet2/1/1
!
interface FortyGigabitEthernet2/1/2
!
interface TwentyFiveGigE2/1/1
!
interface TwentyFiveGigE2/1/2
!
interface AppGigabitEthernet2/0/1
!
interface Vlan1
no ip address
shutdown
!
interface Vlan98
ip address 192.168.98.1 255.255.255.0
!
interface Vlan100
ip address 192.168.100.250 255.255.255.0
shutdown
!
interface Vlan102
ip address 192.168.102.1 255.255.255.0
ip helper-address 192.168.105.10
!
interface Vlan103
ip address 192.168.103.1 255.255.255.0
ip helper-address 192.168.105.10
!
interface Vlan104
ip address 192.168.104.1 255.255.255.0
ip helper-address 192.168.105.10
!
interface Vlan105
ip address 192.168.105.1 255.255.255.0
!
interface Vlan170
ip address 10.170.0.1 255.255.254.0
!
interface Vlan180
description ISOLATION VLAN
ip address 192.168.180.2 255.255.255.0
!
interface Vlan181
no ip address
!
interface Vlan182
no ip address
!
interface Vlan183
no ip address
!
ip forward-protocol nd
ip tcp synwait-time 15
ip http server
ip http authentication local
ip http secure-server
no ip ftp passive
ip route 0.0.0.0 0.0.0.0 192.168.98.2
ip route 10.212.134.0 255.255.255.0 192.168.98.2
ip route 192.168.100.0 255.255.255.0 192.168.98.2
ip ssh time-out 60
ip ssh authentication-retries 2
ip ssh version 2
!
!
!
logging host 10.220.195.183
!
!
!
control-plane
service-policy input system-cpp-policy
!
banner login ^C
PRE WARNING:This is a private computer system. Unauthorized access or use is prohibited and
subject to prosecution and/or disciplinaryaction. Any use of this system constitutes consent to
monitoring at all times and users are not
entitled to any expectation of privacy. If monitoring reveals possible evidenceof violation of criminal statutes,
this evidence and any otherrelated information, including identification information aboutthe user,
may be provided to law enforcement officials.If monitoring reveals violations of security regulations
or unauthorized use, employees who violate security regulations or make unauthorized use of this system
are subject to appropriate disciplinary action.
^C
!
line con 0
exec-timeout 5 0
logging synchronous
login local
transport output telnet
stopbits 1
line vty 0
logging synchronous
login local
length 0
transport input ssh
transport output ssh
line vty 1
logging synchronous
login local
length 0
transport input telnet
transport output telnet
line vty 2 4
logging synchronous
login local
length 0
transport input ssh
transport output ssh
line vty 5 15
login
!
!
!
!
!
!
!
end

 

i have not asked before what is access switch - cisco SMB switches (i am in guess)  - Core switch with config  i can see Cat 9300.

do the follow steps on access switch and check :

interface GigabitEthernet9
spanning-tree link-type point-to-point
switchport mode trunk
switchport trunk allowed vlan 98,100,102-105
no macro description switch
!next command is internal.
no macro auto smartport dynamic_type switch

Add route :

ip route 0.0.0.0 0.0.0.0 192.168.103.1

If you like you can also mentioned native vlan 103.  

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Thanks this sorted

ziyadps
Level 1
Level 1

core to access is not pinging

ziyadps
Level 1
Level 1

after some toruble shoot core to access is pinging . but access to core is not pingin

Richard Pidcock
Level 1
Level 1

I didn't see it in the config of your access switch.  Doe it have a default gateway statement.  (i.e. ip default-gateway x.x.x.x)

Richard W. Pidcock
Review Cisco Networking products for a $25 gift card