跳到主要內容

Cisco Switch 基礎設定


==基礎設定==
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.

sw02(config)#hostname sw02
sw02(config)#line console 0
sw02(config-line)#exec-timeout 0
sw02(config-line)#logging synchronous
sw02(config-line)#exit
sw02(config)#no ip domain-lookup
sw02(config)#interface vlan 1
sw02(config-if)#ip address 10.0.1.106 255.255.255.0
sw02(config-if)#no shutdown
00:19:32: %LINK-3-UPDOWN: Interface Vlan1, changed state to up
00:19:33: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up

sw02(config-if)#exit
sw02(config)#line console 0
sw02(config-line)#password cisco
sw02(config-line)#login
sw02(config-line)#exit
sw02(config)#enable password cisco
sw02(config)#enable secret cisco3
sw02(config)#username ciscouser password ciscopassword
sw02(config)#ip domain-name www.cisco.com
sw02(config)#crypto key generate rsa
The name for the keys will be: sw02.www.cisco.com
Choose the size of the key modulus in the range of 360 to 2048 for your
  General Purpose Keys. Choosing a key modulus greater than 512 may take
  a few minutes.

How many bits in the modulus [512]: 1024
Generating RSA keys ...
[OK]

00:21:16: %SSH-5-ENABLED: SSH 1.99 has been enabled
sw02(config)#line vty 0 15
sw02(config-line)#login local
sw02(config-line)#transport input ssh

*VTY登入後,若沒看到一些訊息,可以啟用Terminal monitor

==清除舊有設定==
sw02#erase startup-config
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
[OK]
Erase of nvram: complete
00:51:48: %SYS-7-NV_BLOCK_INIT: Initalized the geometry of nvram
sw02#delete vlan.dat


Banner設定
sw02(config)#banner login #
Enter TEXT message.  End with the character '#'.
1234
5678
#


==密碼加密==
sw02#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
sw02(config)#service password-encryption
sw02#show running-config | begin line con 0
line con 0
 password 7 045802150C2E
line vty 0 4
 login
line vty 5 15
 login
!
!
end

留言

這個網誌中的熱門文章

2台 Vigor 2920建立 LAN To LAN VPN (IPsec)

我有兩台Vigor 2920,環境如下: Vigor B 撥出 LAN:192.168.1.0/24 Vigor A 撥入 LAN:172.16.1.0/24 設定如下: Vigor B設定 Vigor A設定 詳細設定請參考官網 http://www.draytek.com/index.php?option=com_k2&view=item&id=2666&Itemid=264&lang=tw

使用Cisco L3 Switch做VLAN的Routing

目標: 讓VLAN100與VLAN200的電腦透過L3 Swtich做VLAN的Routing,並且可以互相存取資源與上網,另外再使用Windows Server 2012配發VLAN100,VLAN200的IP Firewall: 使用ASUS AP當Firewall,並設兩條Static Route Switch: Core Switch為Cisco 3750切VLAN 10,VLAN100,VLAN200,VLAN10為預設的VLAN,VLAN100為Sales,VLAN200為RD Edge Switch為Cisco 3750與2950,其中2950為VLAN100,3750為VLAN200,如果要By Port切VLAN也可以,這裡只是為了方便說明,所以Edge Switch都直接設為單一VLAN Core Switch的設定 原本我只想Show Running-config其中比較重要的設定,後來想想還是全部列出,用紅色標記重要的設定 Gi 1/0/1接2950 Gi 1/0/2接3750 Gi 1/0/24接Router Core-3750#show running-config Building configuration... Current configuration : 2436 bytes ! version 12.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Core-3750 ! boot-start-marker boot-end-marker ! ! ! ! no aaa new-model switch 1 provision ws-c3750g-24t system mtu routing 1546 ip routing no ip domain-lookup ! ! ! ! ! ! ! ! spanning-tree mode pvst spanning-tree portfas...

HP A5120 Switch 基本設定

沒用過HP的Switch,指令跟Cisco完全不同,花了一些時間熟悉~ 1.啟動Spanning-Tree,預設沒有開啟 (黑色粗體是我敲的指令) <HP> system-view System View: return to User View with Ctrl+Z. [HP] stp enable [HP] %Apr 26 12:03:59:826 2000 HP MSTP/6/MSTP_ENABLE: STP is now enabled on the device. %Apr 26 12:03:59:918 2000 HP MSTP/6/MSTP_FORWARDING: Instance 0's GigabitEthernet1/0/17 has been set to forwarding state. %Apr 26 12:04:00:068 2000 HP MSTP/6/MSTP_DETECTED_TC: Instance 0's GigabitEthernet1/0/17 detected a topology change. #Apr 26 12:04:00:208 2000 HP MSTP/1/PFWD: hwPortMstiStateForwarding: Instance 0's Port 0.9437200 has been set to forwarding state! 2.DHCP Snooping   (黑色粗體是我敲的指令) 假設我的DHCP Server接在24 Port,其他Port不允許有DHCP Server <HP> system-view System View: return to User View with Ctrl+Z. [HP] dhcp-snooping  DHCP Snooping is enabled. [HP] interface GigabitEthernet 1/0/24 [HP-GigabitEthernet1/0/24 ]dhcp-snooping trust 若是沒有Port 設成dhcp-snooping trust,那麼這台Switch就沒有Client可以從DHCP Serv...