I am having problems connecting from some of my switches to the router/internet. I have a Cisco 1900 series router with four different 2960 series switches. All Gigabit Ethernet ports are configured to be trunk. The router is connected to FF_Switch using the Gig0/1 port while the Gig0/2 port is connected to a Fiber/T Transceiver(Fiber connection converted to RJ45 using Fiber/T Transceiver) passed over fiber connection to another Fiber/T Transceiver, from which it is connected to Gig0/1 of SVOSwitch2. Gig0/2 of SVOSwitch2 connects to Gig0/1 of SVOSwitch3. Gig0/2 of SVOSwitch3 connects to Gig0/1 of SVOSwitch1.
SVOSwitch1 has the ports on VLAN1 and 3, SVOSwitch2 has the ports on VLAN 4 and 5 while SVO Switch 3 has the ports on VLAN 5 and 6.
The problem is that whenever I connect to any of the ports, I can only connect and get DHCP on the ports on VLAN 1 and 4.
The configuration for the router is given below;
ip dhcp pool FF_SWITCH
network 192.168.1.0 255.255.255.0
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
default-router 192.168.1.1
!
ip dhcp pool SVOSwitch1
network 192.168.3.0 255.255.255.0
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
default-router 192.168.3.1
!
ip dhcp pool SVOSwitch2
network 192.168.4.0 255.255.255.0
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
default-router 192.168.4.1
!
ip dhcp pool SVOSwitchVlanPool1
network 192.168.6.0 255.255.255.0
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
default-router 192.168.6.1
!
ip dhcp pool SVOSwitch3
network 192.168.5.0 255.255.255.0
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
default-router 192.168.5.1
!
ip dhcp pool SVOSwitchVlanPool2
network 192.168.7.0 255.255.255.0
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
default-router 192.168.7.1
interface GigabitEthernet0/0
description ### WAN INTERFACE ###
ip address xxx.xxx.xxx.xxx 255.255.xxx.xxx
ip flow ingress
ip nat outside
ip virtual-reassembly in
duplex full
speed auto
no cdp enable
!
interface GigabitEthernet0/1
description ### LAN INTERFACE ###
no ip address
ip flow ingress
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/1.1
description ###1st FLR NETWORK ###
encapsulation dot1Q 1 native
ip address 192.168.1.1 255.255.255.0
ip access-group 110 in
ip accounting output-packets
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.3
description ### TNB WIRELESS NETWORK ###
encapsulation dot1Q 3
ip address 192.168.3.1 255.255.255.0
ip access-group 110 in
ip accounting output-packets
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.4
description ### TNB 1ST WING NETWORK ###
encapsulation dot1Q 4
ip address 192.168.4.1 255.255.255.0
ip access-group 110 in
ip accounting output-packets
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.5
description ### TNB 2ND WING NETWORK ###
encapsulation dot1Q 5
ip address 192.168.5.1 255.255.255.0
ip access-group 110 in
ip accounting output-packets
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.6
description ### TNB PENTHOUSE NETWORK ###
encapsulation dot1Q 6
ip address 192.168.6.1 255.255.255.0
ip access-group 110 in
ip accounting output-packets
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.7
description ### TNB OTHER NETWORK ###
encapsulation dot1Q 7
ip address 192.168.7.1 255.255.255.0
ip access-group 110 in
ip accounting output-packets
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/0/0
switchport access vlan 100
no ip address
!
interface GigabitEthernet0/0/1
no ip address
!
interface GigabitEthernet0/0/2
no ip address
!
interface GigabitEthernet0/0/3
no ip address
!
interface Vlan1
no ip address
!
interface Vlan100
ip address xxx.xxx.xxd.ddd xxx.xxx.xxx.xxx
!
ip forward-protocol nd
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip flow-export source GigabitEthernet0/1
ip flow-export version 9
ip flow-export destination 192.168.1.120 9996
!
ip nat inside source list NAT interface GigabitEthernet0/0 overload
ip route 0.0.0.0 0.0.0.0 aaa.aaa.aaa.aaa
!
ip access-list standard NAT
permit 192.168.1.0 0.0.0.255
permit 192.168.3.0 0.0.0.255
permit 192.168.4.0 0.0.0.255
permit 192.168.5.0 0.0.0.255
permit 192.168.6.0 0.0.0.255
!
!
!
snmp-server community public RO
snmp-server community private RW
snmp-server ifindex persist
Please what am I doing wrong?
EDIT:
As Avery Abbott requested, here is it from SVOSwitch3
SVOSwitch3#show vlan brief
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active
5 VLAN0005 active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6
6 VLAN0006 active Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/18
Fa0/19, Fa0/20, Fa0/21, Fa0/22
Fa0/23, Fa0/24
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
SVOSwitch3#show interface trun
Port Mode Encapsulation Status Native vlan
Gi0/1 on 802.1q trunking 1
Gi0/2 on 802.1q trunking 1
Port Vlans allowed on trunk
Gi0/1 1-4094
Gi0/2 1-4094
Port Vlans allowed and active in management domain
Gi0/1 1,5-6
Gi0/2 1,5-6
Port Vlans in spanning tree forwarding state and not pruned
Gi0/1 1,5-6
Gi0/2 1,5-6
SVOSwitch3#show run int gi0/1
Building configuration...
Current configuration : 59 bytes
!
interface GigabitEthernet0/1
switchport mode trunk
end
SVOSwitch3#show run int gi0/2
Building configuration...
Current configuration : 59 bytes
!
interface GigabitEthernet0/2
switchport mode trunk
end
And for the running config, I have,
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SVOSwitch3
!
boot-start-marker
boot-end-marker
!
enable secret 5 1/
!
!
!
no aaa new-model
system mtu routing 1500
!
!
!
!
crypto pki trustpoint TP-self-signed-14
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-14
revocation-check none
rsakeypair TP-self-signed-14
!
!
crypto pki certificate chain TP-self-signed-14
quit
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0/1
switchport access vlan 5
!
interface FastEthernet0/2
switchport access vlan 5
!
interface FastEthernet0/3
switchport access vlan 5
!
interface FastEthernet0/4
switchport access vlan 5
!
interface FastEthernet0/5
switchport access vlan 5
!
interface FastEthernet0/6
switchport access vlan 5
!
interface FastEthernet0/7
switchport access vlan 6
!
interface FastEthernet0/8
switchport access vlan 6
!
interface FastEthernet0/9
switchport access vlan 6
!
interface FastEthernet0/10
switchport access vlan 6
!
interface FastEthernet0/11
switchport access vlan 6
!
interface FastEthernet0/12
switchport access vlan 6
!
interface FastEthernet0/13
switchport access vlan 6
!
interface FastEthernet0/14
switchport access vlan 6
!
interface FastEthernet0/15
switchport access vlan 6
!
interface FastEthernet0/16
switchport access vlan 6
!
interface FastEthernet0/17
switchport access vlan 6
!
interface FastEthernet0/18
switchport access vlan 6
!
interface FastEthernet0/19
switchport access vlan 6
!
interface FastEthernet0/20
switchport access vlan 6
!
interface FastEthernet0/21
switchport access vlan 6
!
interface FastEthernet0/22
switchport access vlan 6
!
interface FastEthernet0/23
switchport access vlan 6
!
interface FastEthernet0/24
switchport access vlan 6
!
interface GigabitEthernet0/1
switchport mode trunk
!
interface GigabitEthernet0/2
switchport mode trunk
!
interface Vlan1
ip address 192.168.1.9 255.255.255.0
no ip route-cache
!
ip default-gateway 192.168.5.1
ip http server
ip http secure-server
That was picked from the SVOSwitch3.
Best Answer
All thanks to the comment by Avery Abbott, I was able to solve the problem by making sure that all [cascading] switches have the corresponding vlans created so that the trunks can carry data for that vlan across the switch.
thanks all.