leadacid44
Technical User
Hi folks. I hope I have a simple problem to fix. First things first, I am not a CCNA, but I like to think I have the gist of simple Cisco switch configuration.
Now, we recently ran low on network ports, so I went to take one of our old Cisco 2950 24-port switches out of the closet. We have another 2950 running on the network already, and we use HP Procurve for everything else.
Anywhoo, what happens is that when I plug my 2nd 2950 into the network, the "first" one goes offline! I'm just connecting them via copper CAT5 on one of the FastEthernet ports. At that point I can no longer ping it or anything on it. The second switch is ping-able once the VLAN comes up. If I disconnect the second switch, the first switch comes back online in a minute or two. The two switches are not directly connected, but connected through the HP Procurve switches.
I admit that I don't have the event log of the switch that goes offline.
The switches are using identical configurations and the same firmware, so this really has me stumped.
Could someone take a look and see if I'm doing something obviously wrong?
Thanks Everyone!
Now, we recently ran low on network ports, so I went to take one of our old Cisco 2950 24-port switches out of the closet. We have another 2950 running on the network already, and we use HP Procurve for everything else.
Anywhoo, what happens is that when I plug my 2nd 2950 into the network, the "first" one goes offline! I'm just connecting them via copper CAT5 on one of the FastEthernet ports. At that point I can no longer ping it or anything on it. The second switch is ping-able once the VLAN comes up. If I disconnect the second switch, the first switch comes back online in a minute or two. The two switches are not directly connected, but connected through the HP Procurve switches.
I admit that I don't have the event log of the switch that goes offline.
The switches are using identical configurations and the same firmware, so this really has me stumped.
Could someone take a look and see if I'm doing something obviously wrong?
Thanks Everyone!
Code:
!
! Last configuration change at 17:08:20 CST Tue Nov 13 2012 by <username>
! NVRAM config last updated at 17:08:21 CST Tue Nov 13 2012 by <username>
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname cisco2950g24-2
!
aaa new-model
aaa authentication login local_auth local
aaa authorization exec local_auth local
enable secret 5 <password>
!
username <username> password 7 <password>
username <username> password 7 <password>
clock timezone CST -6
clock summer-time CDT recurring
ip subnet-zero
!
no ip domain-lookup
ip domain-name <domain name>
ip ssh time-out 120
ip ssh authentication-retries 3
ip ssh version 2
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
!
!
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
switchport mode dynamic auto
!
interface GigabitEthernet0/2
switchport mode dynamic auto
!
interface Vlan1
ip address <IP Address> 255.255.255.0
!
ip default-gateway <IP Address>
ip http server
ip http access-class 50
ip http authentication aaa
logging trap notifications
logging <IP Address>
logging <IP Address>
access-list 50 remark +------------------------------------------------------+
access-list 50 remark | ACL 50 controls line vty 0 4 login access |
access-list 50 remark +------------------------------------------------------+
access-list 50 permit <IP Address> 0.0.0.255
access-list 50 deny any log
access-list 60 permit <IP Address>
access-list 60 remark +------------------------------------------------------+
access-list 60 remark | ACL 60 controls SNMP public RO access |
access-list 60 remark +------------------------------------------------------+
access-list 60 permit <IP Address>
snmp-server community public RO 60
banner motd ^C
=============================================================================
PROPRIETARY INFORMATION
All content of this system and its associated sub-systems are PROPRIETARY
INFORMATION and remain the sole and exclusive property of this company.
This system may be accessed and used by authorized personnel only.
Authorized users may only perform authorized activities and may not exceed
the limits of such authorization. Disclosure of information found in this
system for any unauthorized use is *STRICTLY PROHIBITED*. All activities on
this system are subject to monitoring. Intentional misuse of this system
can result in disciplinary action or criminal prosecution.
UNAUTHORIZED ACCESS
Unauthorized access to this computer system and software is prohibited by
Title 18, United States Code, Section 1030, Fraud and Related Activity in
Connection with Computers. This system is for the use of authorized users
only. Individuals using this computer system without authority, or in
excess of their authority, are subject to having all of their activities
on this system monitored and recorded by system personnel. In the course
of monitoring individuals improperly using this system, or in the case of
system maintenance, the activities of authorized users may also be
monitored. Anyone using this system expressly consents to such monitoring
and is advised that if such monitoring reveals possible evidence of criminal
activity, system personnel may provide the evidence of such monitoring to
law enforcement officials.
=============================================================================
^C
!
line con 0
exec-timeout 5 0
authorization exec local_auth
login authentication local_auth
line vty 0 4
access-class 50 in
exec-timeout 5 0
authorization exec local_auth
login authentication local_auth
transport input ssh
line vty 5 15
access-class 50 in
exec-timeout 5 0
authorization exec local_auth
login authentication local_auth
transport input ssh
!
ntp server <IP Address>
ntp server <IP Address>
!
end