I have a Cisco 3750 with Vlan 1 (192.168.60.4/24) and Vlan 200 (10.150.112.21/24)
I have a host (192.168.60.35) in port 10
I have a host (10.150.112.8) in port 45
Each host can ping its own default gateway and can ping the default gateway of the other host.
But the hosts cannot ping eachother.
Here is the config:
version 12.2 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname smcswa1 ! enable secret 5 $1$N6WZ$ggb0r1SfjXLbdPo.Rjsx41 ! no aaa new-model switch 1 provision ws-c3750g-48ts system mtu routing 1500 ip subnet-zero ip routing ! ! ! ! no file verify auto spanning-tree mode pvst spanning-tree extend system-id ! vlan internal allocation policy ascending
So it sounds like everyone is in agreement that I am not an idiot and my switch is configured correctly.
I will plug another laptop in on the other side tomorrow night to see if I can ping laptop to laptop....not sure what is going on.
Since the router can ping the interface of both the laptop and server, there appears to be no firewall issue on either end host. The hosts can ping the "other" interface of the router, but they cannot get through it to the far host...
I had set up probably a hundred 3750's like this so I didn't think it was the routing. It wasn't the default gateway.
So what the customer DIDN'T tell me was that the servers had a THIRD NIC that they had unplugged. This third NIC had an IP address that sat on the network that I was adding (and on the same network from where I was pinging).
When I would ping the server from my NIC, the server would get the packet and see that its NIC that was directly connected to the network that I was pinging from (my source IP) was down since the cable was unplugged. Doing an ICMP Debug on the 3750 gave some interesting information on traceroutes where it said that the packet TTL exceeded.
I had to remove the IP configuration from the server NIC to make it respond correctly.
Thanks for everyone's insight. You all had the idea correct, that it was the server and not the network.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...