- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Cisco Meraki VLAN creation Issue in MS 250
Hi All,
Good evening.
Recently we have bought MS250 Switch and MX105 firewall.
Here we need to keep all VLANs in MS250 instead of MX105.
In firewall we are keeping default VLAN 1 (192.168.128.0/24).
I have created 5 VLANs in MS250. But its not working.
VLANs are not able to reach firewall.
VLAN Details below.
192.168.10.0/24 Interface IP 192.168.10.1
192.168.12.0/29 Interface IP 192.168.12.1
192.168.12.8/29 Interface IP 192.168.128.9
172.24.100.0/24 Interface IP 172.24.100.1
* InterVLAN communication is not working.
But i have two end points in 192.168.12.5 1 / 92.168.128.6. I am able to access this end points from 192.168.12.1.
Do we need to enable OSPF for interVLAN communication?
Can some one help me to resolve this case since i am new to cisco meraki Environment.
Solved! Go to solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Do you have routes configured on Switch and Firewall?
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
https://documentation.meraki.com/MS/Layer_3_Switching/MS_Layer_3_Switching_and_Routing
Can you share your MS and MX interfaces and routes configuration?
Basically, you need to create a default route in MS pointing to MX as the next hop and routes in MX to the subnets you created in MS pointing to MS IP as the next hop.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Alemabrahao,
Thank you for your response.
MS 250 Routing:
Default route 0.0.0.0/0 192.168.128.1 No Not preferred
Note : 192.168.128.1 is firewall IP address. (VLAN1 Which is in Firewall)
MX105
Default 0.0.0.0/0 192.168.128.5 always
192.168.128.5 is my switch IP address
Note : Switch is in Stack
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Your route on the MX is wrong.
Take a look at this example:
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
No, OSPF is not necessary. Do you have any ACL configured?
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Alemabrahao,
There is no ACL configured. But when i enable OSPF , i am able to ping the end devices which is connected within VLANs.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Probably you are missing some configuration, I'm pretty sure that OSPF is not a requirement. 😉
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I will check it out and let you know.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Some Considerations:
Switch Management IP and Layer 3 Interfaces
The management IP is treated entirely different from the layer 3 routed interfaces and must be a different IP address. It can be placed on a routed or non-routed VLAN (such as the case of a management VLAN independent from client traffic). Traffic using the management IP address to communicate with the Cisco Meraki Cloud Controller will not use the layer 3 routing settings, instead using its configured default gateway. Therefore, it is important that the IP address, VLAN, and default gateway entered for the management/LAN IP still provide connectivity to the internet.
The management interface for a switch (stack) performing L3 routing cannot have a configured gateway of one of its own L3 interfaces
For switch stacks performing L3 routing, ensure that the management IP subnet does not overlap with the subnet of any of it's own configured L3 interfaces. Overlapping subnets on the management IP and L3 interfaces can result in packet loss when pinging or polling (via SNMP) the management IP of stack members.
Pings Destined for a Layer 3 Interface
MS Switches with Layer 3 enabled will prioritize forwarding traffic over responding to pings. Because of this, packet loss and/or latency may be observed for pings destined for a Layer 3 interface. In such circumstances, it's recommended to ping another device in a given subnet to determine network stability and reachability.
Please, if this post was useful, leave your kudos and mark it as solved.
