We have recently got some Cisco SG350-28P & SG350-52P switches, and I'm having trouble connecting to all of them. We are a Windows shop that until now has been using Cisco SG300, and Cisco SG500 switches without issue. Now we've added SG350s in, and I am not able to connect to them all the time, using either the web interface or SSH.
When I try to connect using the web interface it will load initially, and I can log in, but then a minute or so later, the interface stops responding, and it's dead. Similarly with SSH it doesn't even get to the login prompt. I am still able to ping them throughout, and there's no issue with access througout. Pulling the power appears to be the only way to get back on them. I've done a firmware update on a couple of them to see if it's just a bug but the behaviour persists. I have administrative gateway/default route set the same as other switches that don't exhibit this behaviour.
We have them configured with static IPs. We do have a DHCP pool but it doesn't overlap with the static IPs we give to the switches.
This exact behaviour is identical on just the SG350s we have, and doesn't affect the SG300s or SG500s.
I'm banging my head against a wall, can anyone shed any light on where I might be going wrong? but could anyone offer some insight to where the problem might be?
Config:
config-file-header SW013 v2.3.5.63 / RLINUX_923_093 CLI v1.0 file SSD indicator encrypted @ ssd-control-start ssd config ssd file passphrase control unrestricted no ssd file integrity control ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0 ! ! unit-type-control-start unit-type unit 1 network gi uplink none unit-type-control-end ! vlan database vlan 123,150 exit voice vlan oui-table add 0001e3 Siemens_AG_phone________ voice vlan oui-table add 00036b Cisco_phone_____________ voice vlan oui-table add 00096e Avaya___________________ voice vlan oui-table add 000fe2 H3C_Aolynk______________ voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone voice vlan oui-table add 00d01e Pingtel_phone___________ voice vlan oui-table add 00e075 Polycom/Veritel_phone___ voice vlan oui-table add 00e0bb 3Com_phone______________ bonjour interface range vlan 1 hostname SW013 ip http authentication aaa login-authentication https tacacs local aaa authentication login authorization SSH tacacs local aaa authentication enable authorization SSH tacacs enable aaa accounting login start-stop group tacacs+ line ssh login authentication SSH enable authentication SSH password <redacted> encrypted exit no passwords complexity enable username <redacted> password encrypted <redacted> privilege 15 ip ssh server snmp-server server snmp-server location "<redacted>" snmp-server contact "<redacted>" snmp-server community <redacted> ro view Default no ip http server tacacs-server host <redacted> single-connection encrypted tacacs-server key <redacted> clock summer-time web recurring eu sntp server <redacted> poll no sntp server time-a.timefreq.bldrdoc.gov no sntp server time-b.timefreq.bldrdoc.gov no sntp server time-c.timefreq.bldrdoc.gov ip domain name <redacted> ip name-server 172.30.10.37 ! interface vlan 1 ip address 172.30.10.13 255.255.255.0 no ip address dhcp ! interface vlan 123 name "<redacted>" ! interface vlan 150 name <redacted> ! interface GigabitEthernet7 switchport mode trunk switchport trunk allowed vlan remove 2-149,151-4094 power inline priority critical ! interface GigabitEthernet48 description "<redacted>" switchport access vlan 123 switchport trunk native vlan 123 ! interface GigabitEthernet49 switchport mode trunk switchport trunk allowed vlan remove 2-149,151-4094 ! interface GigabitEthernet50 switchport mode trunk switchport trunk allowed vlan remove 2-122,124-149,151-4094 ! interface GigabitEthernet51 switchport mode trunk switchport trunk allowed vlan remove 2-149,151-4094 ! interface GigabitEthernet52 switchport mode trunk switchport trunk allowed vlan remove 2-149,151-4094 ! exit banner login <redacted> macro auto disabled ip default-gateway 172.30.10.1
No comments:
Post a Comment