Help with Cisco switch…

Author
Discussion

eltax91

Original Poster:

10,005 posts

212 months

Monday 16th October 2023
quotequote all
Hi all

I have a problem I’m trying to solve and I wonder if anyone can help me. A friend of mine has come into an old Cisco catalyst 2960 given by his employer as it’s being retired. He’s just done a house refurb and has pulled lots of cat6 cable throughout.

He’s asked me if I can configure it and get it up and running for him so we can connect up the data sockets, some cctv and some ubiquiti AP’s.

I’ve messed about with a few fortigates in my time but never a cisco switch. So far I have:-

Established connectivity via serial port

Factory reset the appliance

Followed the ‘wizard’ in the CLI and configured the mgmt port to have IP 192.168.1.254

Successfully connected to 1.254 from a laptop plugged into the mgmt port and hit the web interface. Unfortunately this is just a basic html page and the full web management is not installed on the appliance. If you click ‘web console’ you simply get 404 error. There is limited space to install it (32mb).

I have setup a laptop with a static IP of 192.168.1.1

Also setup a laptop with static IP of 192.168.1.50

I CANNOT ping between .1 and .50 in either direction.

So, how do I either:-

1. Get the full html management page onto the switch
2. Somehow manage/ configure it from software installed on a laptop?
3. Configure it to perform basic switch functions via the CLI

For context. ALL devices in this network will be in the 192.168.1.x range, so it’s a flat structure. The router is 1.1. I will do IP reservations on the router for the fixed devices (NAS, AP’s etc).

I will then have a dhcp scope from .50-.200 or something.

Any heals on getting this configured is greatly appreciated. I’ve reached the end of my skill now and don’t know what to do next. biggrin

colin79666

1,936 posts

119 months

Tuesday 17th October 2023
quotequote all
To be honest if money has been spend on a refurb and putting in the structured cabling I’d be splashing out on a new switch to connect it all. That Cisco is potentially 18 years old. A new UniFi switch would play nicely with the APs.

xeny

4,587 posts

84 months

Tuesday 17th October 2023
quotequote all
What does "sh run" look like. Can you post it for one of the ports?

Alex Z

1,417 posts

82 months

Tuesday 17th October 2023
quotequote all
You’ll need to do all the config by CLI which is easy enough with a bit of googling, but it’s an old switch now. It may be better to just buy a modern 24 port one like this.

https://www.ebuyer.com/263573-tp-link-tl-sg1024d-2...

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
Alex Z said:
You’ll need to do all the config by CLI which is easy enough with a bit of googling, but it’s an old switch now. It may be better to just buy a modern 24 port one like this.

https://www.ebuyer.com/263573-tp-link-tl-sg1024d-2...
Any tips or links for what’s needed would be great. biggrin

New switch sounds great. But with 3 AP’s, half a dozen cameras and some future proofing, you’re looking at 48 port switches with at least 12 POE. Starts to get pricey on top of the investment in all the brand new ubiquiti kit I’ve helped him buy

P1Fanatic

915 posts

19 months

Tuesday 17th October 2023
quotequote all
There is a reason his employer is giving it away! Are you actually in full CLI enable mode? If its been factory defaulted you probably need to set an enable pwd in order to get into conf mode (configure terminal) and unshut the interfaces. Once you have access / some output I'd suggest your better off signing up here and asking:

https://community.cisco.com/

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
colin79666 said:
To be honest if money has been spend on a refurb and putting in the structured cabling I’d be splashing out on a new switch to connect it all. That Cisco is potentially 18 years old. A new UniFi switch would play nicely with the APs.
Yes you’re right, it would be the ideal situation. However those things cost a wedge and there’s a reason he’s acquired something old but functional….

Surely a ubiquiti switch isn’t going to change the game that much with the AP’s. Mine work fine with an old POE switch I bought on eBay….

Richyvrlimited

1,835 posts

169 months

Tuesday 17th October 2023
quotequote all
eltax91 said:
Hi all

I have a problem I’m trying to solve and I wonder if anyone can help me. A friend of mine has come into an old Cisco catalyst 2960 given by his employer as it’s being retired. He’s just done a house refurb and has pulled lots of cat6 cable throughout.

He’s asked me if I can configure it and get it up and running for him so we can connect up the data sockets, some cctv and some ubiquiti AP’s.

I’ve messed about with a few fortigates in my time but never a cisco switch. So far I have:-

Established connectivity via serial port

Factory reset the appliance

Followed the ‘wizard’ in the CLI and configured the mgmt port to have IP 192.168.1.254

Successfully connected to 1.254 from a laptop plugged into the mgmt port and hit the web interface. Unfortunately this is just a basic html page and the full web management is not installed on the appliance. If you click ‘web console’ you simply get 404 error. There is limited space to install it (32mb).

I have setup a laptop with a static IP of 192.168.1.1

Also setup a laptop with static IP of 192.168.1.50

I CANNOT ping between .1 and .50 in either direction.

So, how do I either:-

1. Get the full html management page onto the switch
2. Somehow manage/ configure it from software installed on a laptop?
3. Configure it to perform basic switch functions via the CLI

For context. ALL devices in this network will be in the 192.168.1.x range, so it’s a flat structure. The router is 1.1. I will do IP reservations on the router for the fixed devices (NAS, AP’s etc).

I will then have a dhcp scope from .50-.200 or something.

Any heals on getting this configured is greatly appreciated. I’ve reached the end of my skill now and don’t know what to do next. biggrin
The management port is on a completely different vrf to the access ports so you being unable to ping between devices isn't surprising.

do you want the switch to switch, or to be a L3 device and issue DHCP/do basic routing.

if the former, then after the factory reset it'll just work as a basic switch.

if you want to do L3 stuff then via the CLI:

conf t

in managment 1 (or mgmt1 can't remember)
no ip address

int vlan 1
shut

int vlan 10
description **** Home LAN ****
ip add 192.168.1.254 255.255.255.0

vlan 10
name HOME_LAN

int range gi1/0/1 - 24 (amend this as per the naming structure, assuming that they're gig interfaced and it's a 24 port switch)
switchport mode access
switchport access vlan 10

ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1 (assuming that 1.1 is the IP address of your internet router)

ip dhcp pool HOMELAN
network 192.168.1.0 255.255.255.0
dns-server 1.1.1.1 (or whatever you want for DNS)
default-router 192.168.1.1 (your internet router)

ip domain name HOME_LAN
crypto key generate rsa general-keys modulus 2048

username admin priv 15 secret (pick a password)

line vty 0 15
transport input ssh
login local


that should get you running and you can then ssh to the switch via the vlan10 address of 192.168.1.254

Cheers

P.S. don't forget to disable DHCP on the internet router....

EDIT: the CISCO Web gui's are garbage, CLI all the way. the above is only the basics fee free to DM if you want any more help

Edited by Richyvrlimited on Tuesday 17th October 10:23

Richyvrlimited

1,835 posts

169 months

Tuesday 17th October 2023
quotequote all
eltax91 said:
Yes you’re right, it would be the ideal situation. However those things cost a wedge and there’s a reason he’s acquired something old but functional….

Surely a ubiquiti switch isn’t going to change the game that much with the AP’s. Mine work fine with an old POE switch I bought on eBay….
Newer stuff needs PoE+ which the older 2960 won't support.

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
Richyvrlimited said:
Newer stuff needs PoE+ which the older 2960 won't support.
Sorry, was in bed musing when I wrote the OP. Just checked, it’s a 2960-s which is 48x PoE+

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
Richyvrlimited said:
The management port is on a completely different vrf to the access ports so you being unable to ping between devices isn't surprising.

do you want the switch to switch, or to be a L3 device and issue DHCP/do basic routing.

if the former, then after the factory reset it'll just work as a basic switch.

if you want to do L3 stuff then via the CLI:

conf t

in managment 1 (or mgmt1 can't remember)
no ip address

int vlan 1
shut

int vlan 10
description **** Home LAN ****
ip add 192.168.1.254 255.255.255.0

vlan 10
name HOME_LAN

int range gi1/0/1 - 24 (amend this as per the naming structure, assuming that they're gig interfaced and it's a 24 port switch)
switchport mode access
switchport access vlan 10

ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1 (assuming that 1.1 is the IP address of your internet router)

ip dhcp pool HOMELAN
network 192.168.1.0 255.255.255.0
dns-server 1.1.1.1 (or whatever you want for DNS)
default-router 192.168.1.1 (your internet router)

ip domain name HOME_LAN
crypto key generate rsa general-keys modulus 2048

username admin priv 15 secret (pick a password)

line vty 0 15
transport input ssh
login local


that should get you running and you can then ssh to the switch via the vlan10 address of 192.168.1.254

Cheers

P.S. don't forget to disable DHCP on the internet router....

EDIT: the CISCO Web gui's are garbage, CLI all the way. the above is only the basics fee free to DM if you want any more help

Edited by Richyvrlimited on Tuesday 17th October 10:23
Thanks

I will give this a play later when these boring calls are all done. biggrin

I wasn’t trying to ping from the mgmt to the other ports. I had 1.1 plugged into port 1 and 1.50 plugged into port7 then 19. Sounds like I need a vlan though to allow them to talk?

It’s not operating as a basic switch as default

Edited by eltax91 on Tuesday 17th October 11:10

Richyvrlimited

1,835 posts

169 months

Tuesday 17th October 2023
quotequote all
eltax91 said:
Thanks

I will give this a play later when these boring calls are all done. biggrin

I wasn’t trying to ping from the mgmt to the other ports. I had 1.1 plugged into port 1 and 1.50 plugged into port7 then 19. Sounds like I need a vlan though to allow them to talk?

It’s not operating as a basic switch as default

Edited by eltax91 on Tuesday 17th October 11:10
by default all ports will be in vlan1, you'd need to check the config, likelihood is either the port is admin down or in different vlans.

Someone else posted above asking what show run displays

from the priviliged exec mode i.e. console in:

then type enable

then show run

copy and past the lot in here

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
Switch#show run
Building configuration...

Current configuration : 7813 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$A5Wp$P1yJiuksYJawK5qWPsCBd.
enable password admin
!
!
!
no aaa new-model
switch 1 provision ws-c2960s-48fps-l
!
!
cluster enable cluster 0
!
!
crypto pki trustpoint TP-self-signed-3446063744
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3446063744
revocation-check none
rsakeypair TP-self-signed-3446063744
!
!
crypto pki certificate chain TP-self-signed-3446063744
certificate self-signed 01
3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33343436 30363337 3434301E 170D3933 30333031 30303033
31335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34343630
36333734 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100AD6F E785FF24 686B03AB 9ED91129 B42ABBFE 7D0E01C8 87A7265A 27790B9E
57A0DCEF 78C6220D 4C600D48 4D1794C7 27D28962 7D0A7C50 CABFE398 DF50C855
5091C4FE 4ECA1A9A 869AA8D0 034C6915 F33DEB0D 18FDECFC 3655F3B8 E98A9096
EC38BBF4 17DAE8A4 2C6778C3 61410641 3AFEF499 4A3CF1C8 41798DE8 05DB576C
C8670203 010001A3 67306530 0F060355 1D130101 FF040530 030101FF 30120603
551D1104 0B300982 07537769 7463682E 301F0603 551D2304 18301680 14610E8B
94C0BCF1 C6BDE9C3 FD4B8554 E75CB940 25301D06 03551D0E 04160414 610E8B94
C0BCF1C6 BDE9C3FD 4B8554E7 5CB94025 300D0609 2A864886 F70D0101 04050003
8181009F 6B6858D2 A1DD674A F58BA7D6 99C3B927 2F905723 CF8CBA47 2C8398D5
AEB35044 4D5F7018 E99824AA C7113F76 52202BB2 953EC855 BF33A286 C6467A27
1B04EC1B D1A3108C 620FE5FC D5B624A8 4068B776 D4B422B0 EB5F6789 23492E02
4DCE48E6 87B6D22A 19ABEC4A A90B4063 F6D306A9 E1C3DC45 C5BBBEBE 38FC5BA4 2A6D3E
quit
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0
no ip address
!
interface GigabitEthernet1/0/1
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/2
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/3
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/4
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/5
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/6
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/7
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/8
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/9
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/10
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/11
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/12
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/13
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/14
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/15
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/16
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/17
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/18
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/19
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/20
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/21
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/22
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/23
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/24
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/25
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/26
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/27
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/28
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/29
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/30
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/31
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/32
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/33
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/34
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/35
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/36
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/37
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/38
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/39
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/40
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/41
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/42
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/43
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/44
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/45
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/46
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/47
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/48
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/49
!
interface GigabitEthernet1/0/50
!
interface GigabitEthernet1/0/51
!
interface GigabitEthernet1/0/52
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
description ***Home LAN***
ip address 192.168.1.254 255.255.255.0
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
line con 0
exec-timeout 0 0
line vty 0 4
password cisco
login
line vty 5 15
password cisco
login
!
end


Edited by eltax91 on Tuesday 17th October 13:59

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
I now have the devices 1.1 and 1.50 pinging each other across the switch. biggrin

I also have http access on 1.254 from within the switch (not mgmt interface)

Richyvrlimited

1,835 posts

169 months

Tuesday 17th October 2023
quotequote all
eltax91 said:
I now have the devices 1.1 and 1.50 pinging each other across the switch. biggrin

I also have http access on 1.254 from within the switch (not mgmt interface)
Well done, was that from the config I provided or your own playing around?

if the latter I'd recommend changing all ports to a new vlan (not 1) just as a basic secuity best practice, and also disable http server, (no http-server) it's absolute bobbins and insecure as heck.

EDIT, add portfast to all the ports too, they'll forgoe the STP listening/learning process to stop switching loops and ensure the ports come up quickly

int range gi1/0/1 - 48
spanning-tree portfast

also don't forget to write any config to flash, from the piv exec mode type:

write

Edited by Richyvrlimited on Tuesday 17th October 13:12

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
Richyvrlimited said:
Well done, was that from the config I provided or your own playing around?

if the latter I'd recommend changing all ports to a new vlan (not 1) just as a basic secuity best practice, and also disable http server, (no http-server) it's absolute bobbins and insecure as heck.

EDIT, add portfast to all the ports too, they'll forgoe the STP listening/learning process to stop switching loops and ensure the ports come up quickly

int range gi1/0/1 - 48
spanning-tree portfast

also don't forget to write any config to flash, from the piv exec mode type:

write

Edited by Richyvrlimited on Tuesday 17th October 13:12
From a combo of the CLI guide and your combo. I disabled vlan1 and created a vlan 10

I’ll have a look at the other bits.

From my config, have I set the default gateway correctly? I want all traffic to head to 1.1 as the internet router

ETA: I haven't setup DHCP on the switch. I was going to leave that on the vodafone router on the basis that it's easier to talk him through troubleshooting on a GUI than a CLI


Edited by eltax91 on Tuesday 17th October 14:04

Richyvrlimited

1,835 posts

169 months

Tuesday 17th October 2023
quotequote all
eltax91 said:
From a combo of the CLI guide and your combo. I disabled vlan1 and created a vlan 10

I’ll have a look at the other bits.

From my config, have I set the default gateway correctly? I want all traffic to head to 1.1 as the internet router

Edited by eltax91 on Tuesday 17th October 13:45
that config isn't needed in this instance, you'd only need it if you wanted to manage the switch from an alternate subnet.

the switch isn't doing routing, only switching, so user traffic will use the DF as set via whatever is doing your DHCP.

If you want the switch to L3 route, you need to add the lines

ip routing

ip route 0.0.0.0 0.0.0.0 192.168.1.1

but you don't need that at all really, jsut let it switch and leave it at that.

eltax91

Original Poster:

10,005 posts

212 months

Tuesday 17th October 2023
quotequote all
Richyvrlimited said:
that config isn't needed in this instance, you'd only need it if you wanted to manage the switch from an alternate subnet.

the switch isn't doing routing, only switching, so user traffic will use the DF as set via whatever is doing your DHCP.

If you want the switch to L3 route, you need to add the lines

ip routing

ip route 0.0.0.0 0.0.0.0 192.168.1.1

but you don't need that at all really, jsut let it switch and leave it at that.
Thanks for the assistance. I did try to add routing, just to see, however i got errors in commands too


xeny

4,587 posts

84 months

Tuesday 17th October 2023
quotequote all
eltax91 said:
From my config, have I set the default gateway correctly? I want all traffic to head to 1.1 as the internet router
If you're routing with a typical domestic router, you don't need routing enabled on the switch, and the switch's default gateway is to give the switch external connectivity - it doesn't impact devices using the switch to provide connectivity at all.

Richyvrlimited

1,835 posts

169 months

Tuesday 17th October 2023
quotequote all
eltax91 said:
Thanks for the assistance. I did try to add routing, just to see, however i got errors in commands too
Ah I forgot, I think the 2960 is L2 only, doesn't support IP routing features. You may be able to find a firmware online which supports it but as said previous, you don't need it.