Hey guys,
Well, I've been tinkering with the network again, and in search
of performance increases I have come across something a little weird.
Let me run it by you all and see if anyone can play "spot the mistake"
for me. We have nine separate in house networks in our facility, each
with roughly 20 network attached devices (PCs mostly). They are built up
as follows:
10.10.10.0/24 - Administrative network (for me) (VLAN 1)
192.168.0.0/24 - Servers and NAS appliances (VLAN 2)
192.168.1.0/24 - Network 1 (VLAN 10)
192.168.2.0/24 - Network 2 (VLAN 20)
192.168.3.0/24 - Network 3 (VLAN 30)
192.168.4.0/24 - Network 4 (VLAN 40)
192.168.5.0/24 - Network 5 (VLAN 50)
192.168.6.0/24 - Network 6 (VLAN 60)
192.168.7.0/24 - Network 7 (VLAN 70)
192.168.8.0/24 - Network 8 (VLAN 80)
The physical network is made up of the following:
(1) Cisco 3620 with 10/100 Network Module
(1) Cisco Catalyst 2948G-L3
(4) Cisco Catalyst 3548XL
The physical arrangement is the 3620 connects via the 100MBit
module to port F48 of the 2948G-L3. The four 3548XLs are linked via
Cisco GigaStack Gbics in a non-clustered arrangement. One of the 3548s
links to the 2948G-L3 via a standard 1000MBit Gbic from its G0/2 into
the 2948G-L3's G49. The physical configuration is sound, all VLANs are
present on all of the cisco equipment, and I have been having no issues
from that end.
Each network must be able to reach the server network
(192.168.0.0/24). Initially, I configured ISL between all of the
switches, and since I have the 100Mbit module on the 3620, created an
ISL trunk to it with a sub-interface for each VLAN and began providing
inter-VLAN routing and internet access through it. Well, on high-speed
switches, hitting a 100Mbit bottleneck at the router during inter-VLAN
communications was kind of a downer so I began looking for other
options. Which is exactly how I ended up where I am now.
My idea was, hey, the 2948G-L3 is fully Layer 3 capable, so why
not make it do all of the routing so that I do not get the 100Mbit
bottleneck created by going through the 3620. Then, the only traffic the
3620 would need to get is internet traffic. So I set it up (configs at
the end of the letter, with scattered in-line comments). I configured
the 2948G-L3 to do IRB and route between the VLANs using the BVIs. Then,
I threw in a static default route so internet traffic would be routed to
the 3620. Lastly, I configured OSPF to run between the 2948G-L3 and the
3620 so that the 3620 would know about any existing or new networks that
I may create on the 2948G-L3.
Now for the problem part. At first, everything was working
great, but after a while I began watching performance and noticing that
I did not gain that much in the way of improved performance except for
machines that were plugged directly into the 2949G-L3. Machines
connected to a 3548XL and following the ISL trunk to the 2948G-L3 still
performed as if competing for a 100Mbit uplink. I was willing to live
with that, even though I should have at least quadrupled my routing
bandwidth by switching over to the 2948G-L3, but it was the next symptom
that got me. I started getting reports from people who were plugged
directly into the 2948G-L3 that occasionally their link would go dead
for about 15 seconds and then come back up. About two minutes later it
would happen again. Then things would be fine for a while, maybe an
hour, and it would repeat. Well, the 2948G-L3 takes longer that 15
seconds to reboot, so it isn't rebooting and I'm kind of stumped as to
what is happening. This is not occurring on any of the 3548XLs.
Anyhow, 1) I thought I would post and see if anyone could
comment on my configs as far as why I may not be getting the best
performance (I may not be thinking in the right direction). 2) Maybe
someone has seen symptoms similar to mine regarding the network 'brown
outs' that I am seeing. Any help is always appreciated.
Here is the config on the 2948G-L3:
------------------------------------------------------
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname C2948G-L3
!
enable password *removed*
!
ip subnet-zero
bridge irb
!
!
!
interface FastEthernet1
no ip address
no ip directed-broadcast
bridge-group 1
!
!
! ... Ports F1 - F46 are in VLAN 1
!
!
interface FastEthernet47
no ip address
no ip directed-broadcast
bridge-group 1
!
! F48 is my link to the Router, .1 for management, .2 for routing
!
interface FastEthernet48
no ip address
no ip directed-broadcast
!
interface FastEthernet48.1
encapsulation isl 1
no ip redirects
no ip directed-broadcast
bridge-group 1
!
interface FastEthernet48.2
encapsulation isl 2
no ip redirects
no ip directed-broadcast
bridge-group 2
!
! G49 is my ISL trunk to the 3548XL stack, thus all the sub-interfaces
!
interface GigabitEthernet49
no ip address
no ip directed-broadcast
!
interface GigabitEthernet49.1
encapsulation isl 1
no ip redirects
no ip directed-broadcast
bridge-group 1
!
interface GigabitEthernet49.2
encapsulation isl 2
no ip redirects
no ip directed-broadcast
bridge-group 2
!
interface GigabitEthernet49.10
encapsulation isl 10
no ip redirects
no ip directed-broadcast
bridge-group 10
!
interface GigabitEthernet49.20
encapsulation isl 20
no ip redirects
no ip directed-broadcast
bridge-group 20
!
interface GigabitEthernet49.30
encapsulation isl 30
no ip redirects
no ip directed-broadcast
bridge-group 30
!
interface GigabitEthernet49.40
encapsulation isl 40
no ip redirects
no ip directed-broadcast
bridge-group 40
!
interface GigabitEthernet49.50
encapsulation isl 50
no ip redirects
no ip directed-broadcast
bridge-group 50
!
interface GigabitEthernet49.60
encapsulation isl 60
no ip redirects
no ip directed-broadcast
bridge-group 60
!
interface GigabitEthernet49.70
encapsulation isl 70
no ip redirects
no ip directed-broadcast
bridge-group 70
!
interface GigabitEthernet49.80
encapsulation isl 80
no ip redirects
no ip directed-broadcast
bridge-group 80
!
! G50 doesn't run to anything
!
interface GigabitEthernet50
no ip address
no ip directed-broadcast
shutdown
!
! And of course, a BVI for each VLAN which I use as the default gateway
of the end-stations
!
interface BVI1
ip address 10.10.10.1 255.255.255.0
no ip directed-broadcast
!
interface BVI2
ip address 192.168.0.1 255.255.255.0
no ip directed-broadcast
!
interface BVI10
ip address 192.168.1.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
interface BVI20
ip address 192.168.2.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
interface BVI30
ip address 192.168.3.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
interface BVI40
ip address 192.168.4.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
interface BVI50
ip address 192.168.5.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
interface BVI60
ip address 192.168.6.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
interface BVI70
ip address 192.168.7.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
interface BVI80
ip address 192.168.8.254 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.0.101
no ip directed-broadcast
!
! OSPF makes sure the 3620 will know the way home
!
router ospf 100
network 10.10.10.0 0.0.0.255 area 0
network 192.168.0.0 0.0.0.255 area 0
network 192.168.1.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 0
network 192.168.3.0 0.0.0.255 area 0
network 192.168.4.0 0.0.0.255 area 0
network 192.168.5.0 0.0.0.255 area 0
network 192.168.6.0 0.0.0.255 area 0
network 192.168.7.0 0.0.0.255 area 0
network 192.168.8.0 0.0.0.255 area 0
!
ip classless
! My static route for internet access
ip route 0.0.0.0 0.0.0.0 192.168.0.2
ip http server
!
! None of the other networks need to reach the management VLAN
! So I have blocked them with AL 100
!
access-list 100 deny ip any 10.10.10.0 0.0.0.255
access-list 100 permit ip any any
bridge 1 protocol ieee
bridge 1 route ip
bridge 2 protocol ieee
bridge 2 route ip
bridge 10 protocol ieee
bridge 10 route ip
bridge 20 protocol ieee
bridge 20 route ip
bridge 30 protocol ieee
bridge 30 route ip
bridge 40 protocol ieee
bridge 40 route ip
bridge 50 protocol ieee
bridge 50 route ip
bridge 60 protocol ieee
bridge 60 route ip
bridge 70 protocol ieee
bridge 70 route ip
bridge 80 protocol ieee
bridge 80 route ip
!
line con 0
exec-timeout 0 0
password *removed*
login
transport input none
line aux 0
line vty 0 4
password *removed*
login
!
end
And the config for the 3620:
------------------------------------------------------
version 12.2
no service single-slot-reload-enable
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname C3620
!
logging rate-limit console 10 except errors
enable password *removed*
!
ip subnet-zero
!
!
no ip finger
no ip domain-lookup
!
ip audit notify log
ip audit po max-events 100
no ip dhcp-client network-discovery
!
call rsvp-sync
!
! E0/0 is not currently in use
!
interface Ethernet0/0
shutdown
half-duplex
!
! My internet connection (Point-to-point frame relay T1, 1.544 100%CIR)
!
interface Serial0/0
no ip address
encapsulation frame-relay
service-module t1 remote-alarm-enable
frame-relay lmi-type ansi
!
interface Serial0/0.1 point-to-point
description connected to Internet
ip address 10.27.7.194 255.255.255.252
ip nat outside
frame-relay interface-dlci 101 IETF
!
! Here's my ISL trunk to the 2948G-L3, I left this an ISL trunk because
I didn't want
! the other networks accessing the 10.10.10.0/24 network, but wanted an
IP
! accessable by both.
!
interface FastEthernet1/0
description connected to Private Network
no ip address
duplex auto
speed auto
!
! This is the interface I use for management
!
interface FastEthernet1/0.1
encapsulation isl 1
ip address 10.10.10.6 255.255.255.0
no ip redirects
ip nat inside
!
! This is the interface the 2948G-L3 uses as the default route for my
internet traffic.
!
interface FastEthernet1/0.2
encapsulation isl 2
ip address 192.168.0.2 255.255.255.0
ip nat inside
!
router ospf 100
log-adjacency-changes
network 10.10.10.0 0.0.0.255 area 0
network 192.168.0.0 0.0.0.255 area 0
network 192.168.1.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 0
network 192.168.3.0 0.0.0.255 area 0
network 192.168.4.0 0.0.0.255 area 0
network 192.168.5.0 0.0.0.255 area 0
network 192.168.6.0 0.0.0.255 area 0
network 192.168.7.0 0.0.0.255 area 0
network 192.168.8.0 0.0.0.255 area 0
!
ip kerberos source-interface any
ip nat pool C3620-natpool-8191 66.35.166.233 66.35.166.238 netmask
255.255.255.248
ip nat inside source list 1 pool C3620-natpool-8191 overload
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0.1
no ip http server
!
access-list 1 permit 10.10.10.0 0.0.0.255
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 1 permit 192.168.2.0 0.0.0.255
access-list 1 permit 192.168.3.0 0.0.0.255
access-list 1 permit 192.168.4.0 0.0.0.255
access-list 1 permit 192.168.5.0 0.0.0.255
access-list 1 permit 192.168.6.0 0.0.0.255
access-list 1 permit 192.168.7.0 0.0.0.255
access-list 1 permit 192.168.8.0 0.0.0.255
access-list 106 deny ip any 10.10.10.0 0.0.0.255
access-list 106 permit ip any any
!
dial-peer cor custom
!
line con 0
exec-timeout 0 0
password *removed*
login
transport input none
line aux 0
line vty 0 4
password *removed*
login
!
end
And just in case, I'll throw in the config for the first 3548XL
------------------------------------------------------
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname C3548XLA
!
enable password *removed*
!
ip subnet-zero
!
!
!
interface FastEthernet0/1
switchport access vlan 10
spanning-tree portfast
!
! ... Ports F0/1 - F0/48 are usually split in half on these switched
providing
! 24 ports each to two VLANs. The eight 192.168.x.0/24 networks are
! spread evenly this way accross the four switches.
!
interface FastEthernet0/48
switchport access vlan 20
spanning-tree portfast
!
! Standard Gbic 1000Mbit interface ISL trunk to the 2948G-L3
!
interface GigabitEthernet0/1
switchport mode trunk
!
! Cisco GigaStack 1000Mbit interface ISL trunk to the next 3548XL
!
interface GigabitEthernet0/2
switchport mode trunk
!
interface VLAN1
ip address 10.10.10.7 255.255.255.0
no ip directed-broadcast
no ip route-cache
!
ip default-gateway 10.10.10.6
!
line con 0
exec-timeout 0 0
password *removed*
login
transport input none
stopbits 1
line vty 0 4
password *removed*
login
line vty 5 15
password *removed*
login
!
end
------------------------------------------------------
Anyhow, maybe one of the gurus in the group can look at this and spot my
problem right off, or I'll keep you guys updated as I continue
researching it.
Thanks,
Don Pezet
Enterprise Technology Solutions
[EMAIL PROTECTED]
(352) 248-1010
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=51161&t=51161
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]