I have a scenario where I have created seperate vlans and using my switch as the default gateway. all vlans can route between each other but one vlan cant reach internet. The vlans are 1 and 3 and the address scheme is 10.0.35.0 on vlan 1 which can reach internet. The secondary vlan is 10.0.40.0 and cant reach internet. The firewall is on vlan 1
I have looked at the config that you posted. since you posted only part of the config there is a possibility that there is something in the part that you did not post that is influencing this behavior.
I note this in the config which I do not understand:
ip route 10.0.40.0 255.255.255.0 Vlan1
why do you have a static route for the address space of VLAN 3 pointing to VLAN 1?
Perhaps the larger question is why you have static routes defined for the address space of any of the VLANs?
I also note this in the config which seems incorrect:
this specifies the source address as host 10.0.40.0 which is the subnet address. So it is logically inconsistent. And since this appears to be the only statement in the access list, the access list would not permit any traffic through. Since you do not show how the access list is used we can not tell whether this is impacting your problem or not.
Based on the config it does look like VLAN 3 should be able to get to the firewall. If it can not get through the firewall then it looks like the issue may be on the firewall. As Jon suggested it may be an issue of whether the firewall has a route back to the 10.0.40.0 subnet. It might also be a question of the firewall rules and whether the firewall is permitting the traffic from VLAN 3 to go through, whether it is properly translating the traffic from VLAN 3, or some other similar issue.
Perhaps you can provide some more information about the firewall setup.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...