This should be a rather simple scenario but couldnt get my head around it.
R1 and R2 are connected to SW1 (3560) in the same vlan and subnet but R1 cannot reach R2.
In order to try and isolate the problem I created an SVI for the vlan on SW1 and assigned it an ip add in the same subnet. From R1 i could ping the SVI address and vice-versa but from the SVI i could not ping R2. Making it seem the issue is isolated to between SW1 and R2
R1 is able to learn the mac address of R2
All concerned ports on the switch are in STP designated/forwarding state for the vlan
All concerned ports show as connected and assigned to the vlan (no err-disabled or notconnected)
I do not have access to R2 ( But as per requirement, if everyting is ok on the devices I have access to, I should be able to reach R2)
I looked through each line of the switch config and it is almost basic i.e. there is nothing strange present.
No private vlans
No SPAN sessions
No STP commands
Reloaded both R1 and SW1
The one strange thing I noticed which I cant explain is when I do a debug ip icmp on R1 with pings to the SVI i see the icmp request/echo in the debug messages. But when i do a debug ip icmp on R1 and i ping to R2 i do not see icmp request/echo (samething when ping from SW1 to R2). I'm thinking atleast I should see my icmp request going out even if there were some ACL(or anything else blocking) on R2
At the end of the day, I am supposed to have a bgp session established between R1 and R2. But with this problem in place, it just remains active.
Any insights to what else might be checked on R1 and SW1 to establish this connectivity would be appreciated. (Unfortunately configs not available at this time)
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...