cisco 6509配置手册

合集下载

cisco6509 时间访问列表配置

cisco6509 时间访问列表配置

cisco6509 时间访问列表配置要达到的具体要求如下:周一到周五早8:00到12:00不允许上网,12:00到13:00可以上网,13:00到17:00不可以上网,17:00以后到第二天早上8:00可以,周六,周日两天都可以上网。

大师们,帮帮我吧,我感觉不用网管软件实现起来是不是太困难了阿。

#1首先配置NTP服务,让你的路由器时间和北京时间一致。

Router(config)#ntp source gigabitEthernet 0/1指定NTP服务使用哪个端口连接国家授时中心Router(config)#ntp server 210.72.145.44(国家授时中心地址)Router(config)#ntp update-calendar让国家授时中心提供的日期时间更新你的路由器电池供电的电子表时间这样你的路由器时间就很准确了。

#2配置时间序列,基于时间的访问列表。

通过它,可以根据一天中的不同时间或者根据一星期中的不同日期(当然也可以二者结合起来)控制网络数据包的转发,实现上网控制。

Router(config)#time-range time_online(能够上网时间序列)Router(config-time-range)#periodic weekdays 12:00 to 13:00(工作日12点到13点)Router(config-time-range)#periodic weekdays 17:00 to 23:59(工作日17点到00点)Router(config-time-range)#periodic weekdays 00:00 to 08:00(工作日00点到08点)Router(config-time-range)#periodic weekend 00:00 to 23:59(休息日全天)这样就实现了基于北京时间的准确上网时间序列。

#3配置基于北京时间的访问控制列表Router(config)#ip access-list extended net_control(ACL名称)Router(config-ext-nacl)#permit ip any any time-range time_online(刚配好的上网时间序列)Router(config-ext-nacl)#end#4将该ACL应用到要控制上网的内网口,收工。

CISCO交换机6509简介(初级学习)

CISCO交换机6509简介(初级学习)

目录第1章CISCO交换机概述 (6)1.1概述 (6)1.2 Cisco交换机产品介绍 (7)1.2.1低端产品 (7)1.2.2中端产品 (7)1.2.3高端产品 (7)1.2.4单板与华为S8016的对比............................................................... 错误!未定义书签。

第2章Catalyst6000系列 (8)2.1特性表与华为S8016的对比...................................................................... 错误!未定义书签。

2.2接口模块与华为S8016的对比.................................................................. 错误!未定义书签。

第3章多层交换技术 (9)3.1概述 (9)3.2 Catalyst交换机的VLAN交换技术 (11)第4章6509的进一步配置 (18)4.1准备 (18)4.1.1网桥或交换机 (18)4.1.2生成树协议 (18)4.1.3 V L A N (18)4.1.4中继 (19)4.1.5捆绑端口 (19)4.1.6配置 (19)4.2 6509配置实战 (20)4.2.1 Catalyst模式 (20)4.2.2控制台波特率 (21)4.2.3 sc0接口 (21)4.2.4 IP允许表 (21)4.2.5 Reset命令 (22)4.2.6配置文件 (22)4.2.7快速以太网和千兆快速以太网端口的配置 (25)4.2.8生成树协议的使用 (26)4.2.9配置VLAN (26)4.2.10配置动态VLAN (26)4.2.11使用外部路由器路由VLAN (26)关键词:Catalyst 6509;S8016;多层交换(MLS);VLAN;6509配置摘要:第一章CISCO交换机概览”,对于想了解cisco的Catalyst系列交换机知识的可以看看;第二章Catalyst6000系列”,着重简述了6000系列交换机的规格。

关于Cisco 65097609 交换机Netflow的配置

关于Cisco 65097609 交换机Netflow的配置

关于Cisco 6509/7609 交换机Netflow的配置Netflow 在6500和7209 交换机上配置和路由器上配置有所不同,在公司开发Netflow的应用上,发现现场工程师基本没有配置对,导致流量出不来。

下面列出配置信息;CATOS的配置也的参考该配置1、首先看看Netflow配置是否正常起来:Switch# show mls nde一般看到都是Netflow Data Export disabled 这说明Netflow都没有起来。

参看Cisco 《Configuring NetFlow Data Export》PDf文档,默认是Disabled的2、启动netflowSwitch(config)# mls netflow3、启动netflow 的双向流量Switch(config)# mls flow ip destination-source4、启动NDE发送以及发送版本Switch(config)# mls nde sender [version {5 | 7}]如果只输入mls nde sender系统默认启用的是版本7,如果需要版本5,则mls nde send er version 5,目前版本能配的是5或7,这两个版本WEB均能出现正常的数据。

对于Cisco IOS 12.17以下版本的交换机,只有版本7。

5、进入VLAN,启动接口Netflow(如果在物理接口上其3层,则直接进入物理接口)。

Switch(config)# interface vlan 5Switch(config-if)# ip flow-export ingressSwitch(config-if)# ip route-cache flow6、配置Netflow的数据源,如果没有配置Loopback的接口,可以采用物理接口,建议配置L oopback接口Switch(config)# ip flow-export source loopback 07、检测Switch# show mls nde (能看到如下的信息,而且明确Netflow Data Export enable d )Netflow Data Export enabledExporting flows to 10.110.10.254 (9991)Exporting flows from 10.16.68.72 (55425)Version: 5Include Filter not configuredExclude Filter is:Total Netflow Data Export Packets are:49 packets, 0 no packets, 247 recordsTotal Netflow Data Export Send Errors:IPWRITE_NO_FIB = 0IPWRITE_ADJ_FAILED = 0IPWRITE_PROCESS = 0Switch(config)# show mls netfow ip看到大量的流量信息,大量的滚屏信息。

思科交换机6509配置实例(双机热备)

思科交换机6509配置实例(双机热备)

CISCO 6509配置手册1.设置时间switch#config tswitch(config)# clock timezone GMT 8 ;配置时区switch(config)# clock set 13:30:21 31 JAN 2004 ;配置交换机时间2.设置主机名及密码Switch#congfig tSwitch(config)#hostname 6509a //配置交换机名称6509a(config)#enable password cisco //配置用户密码6509a (config)#enable secret cisco //配置安全密码6509a (config-line)#line vty 0 15 //配置远程访问密码6509a (config-line)#login6509a (config-line)#password cisco6509a (config-line)#login6509a (config-line)#^z6509a #show running-config //查看配置信息6509a #copy running-config startup-config6509a #show startup-config6509a #show bootvar6509a #dir bootflash:6509a #copy system:running-config nvram:startup-config6509a #show fabric status6509a #show hardware3.配置vlan6509a #config t6509a (config)#vlan 3016509a (config-vlan)# name hexinxitong6509a (config)#vlan 3026509a (config-vlan)# name callcenter6509a (config)#vlan 3036509a (config-vlan)# name kuaijicaiwu6509a (config)#vlan 3046509a (config-vlan)# name guojiyewu6509a (config)#vlan 3056509a (config-vlan)# name guanlixitong6509a (config)#vlan 3066509a (config-vlan)# name ceshihuanjing6509a (config)#vlan 3076509a (config-vlan)# name wangluoguanli6509a (config-vlan)#exit6509a (config)#exit6509a #show vlan6509a (config)#interface range giga 2/1 – 8 //配置端口信息6509a (config-if-range)#switchport //二层交换模式6509a (config-if-range)#switchport mode access6509a (config-if-range)#switchport access vlan 3016509a (config-if-range)#exit6509a (config)#interface range giga 2/9– 146509a (config-if-range)#switchport mode access6509a (config-if-range)#switchport access vlan 3026509a (config-if-range)#exit6509a (config)#interface range giga 2/15 – 176509a (config-if-range)#switchport mode access6509a (config-if-range)#switchport access vlan 3036509a (config-if-range)#exit6509a (config)#interface range giga 2/18 – 226509a (config-if-range)#switchport mode access6509a (config-if-range)#switchport access vlan 3046509a (config)#interface range giga 2/23 – 266509a (config-if-range)#switchport mode access6509a (config-if-range)#switchport access vlan 3056509a (config-if-range)#exit6509a (config)#interface range giga 2/27 – 336509a (config-if-range)#switchport mode access6509a (config-if-range)#switchport access vlan 3066509a (config-if-range)#exit6509a (config)#interface range giga 2/34 – 396509a (config-if-range)#switchport mode access6509a (config-if-range)#switchport access vlan 3076509a (config-if-range)#exit6509a (config)#interface giga 2/486509a (config-if)#ip address 12.10.254.2 255.255.255.0 6509a (config-if)#no shut6509a (config)#exit6509a #show vlan4.配置trunk6509a(config)#int giga 5/16509a(config-if)#shut down6509a(config-if)#switchport6509a(config-if)#switchport trunk enca dot1q6509a(config-if)#switchport mode trunk6509a #show int giga 2/48 trunk6509a #show vtp counters6509a #show vtp status6509a(config)#int giga 6/16509a(config-if)#shut down6509a(config-if)#switchport6509a(config-if)#switchport trunk enca dot1q6509a(config-if)#switchport mode trunk6509a(config-if)#no shut down5.设置vlan地址及HSRP6509a #config t6509a(config) #int vlan 3016509a(config-if) #ip address 192.1.2.2 255.255.255.0 6509a(config-if) #no ip redirects6509a(config-if) #standby 1 ip 192.1.2.16509a(config-if) #standby 1 priority 1056509a(config-if) #standby 1 preempt6509a(config-if) #standby 1 track giga 1/486509a(config-if) #no shutdown6509a(config-if) #exit6509a(config) #exit6509a#show ip interface brief6509a #config t6509a(config) #int vlan 3026509a(config-if) #ip address 192.100.4.2 255.255.255.06509a(config-if) #no ip redirects6509a(config-if) #standby 2 ip 192.100.4.16509a(config-if) #standby 2 priority 1056509a(config-if) #standby 2 preempt6509a(config-if) #standby 2 track giga 1/486509a(config-if) #no shutdown6509a(config-if) #exit6509a(config) #exit6509a#show ip interface brief6509a #config t6509a(config) #int vlan 3036509a(config-if) #ip address 192.100.5.2 255.255.255.0 6509a(config-if) #no ip redirects6509a(config-if) #standby 3 ip 192.100.5.16509a(config-if) #standby 3 priority 1056509a(config-if) #standby 3 preempt6509a(config-if) #standby 3 track giga 1/486509a(config-if) #no shutdown6509a(config-if) #exit6509a(config) #exit6509a#show ip interface brief6509a #config t6509a(config) #int vlan 3046509a(config-if) #ip address 192.100.6.2 255.255.255.0 6509a(config-if) #no ip redirects6509a(config-if) #standby 4 ip 192.100.6.16509a(config-if) #standby 4 priority 1056509a(config-if) #standby 4 preempt6509a(config-if) #standby 4 track giga 1/486509a(config-if) #no shutdown6509a(config-if) #exit6509a(config) #exit6509a#show ip interface brief6509a #config t6509a(config) #int vlan 3056509a(config-if) #ip address 192.100.7.2 255.255.255.0 6509a(config-if) #no ip redirects6509a(config-if) #standby 5 ip 192.100.7.16509a(config-if) #standby 5 preempt6509a(config-if) #no shutdown6509a(config-if) #exit6509a(config) #exit6509a#show ip interface brief6509a #config t6509a(config) #int vlan 3066509a(config-if) #ip address 192.100.8.2 255.255.255.0 6509a(config-if) #no ip redirects6509a(config-if) #standby 6 ip 192.100.8.16509a(config-if) #standby 6 preempt6509a(config-if) #no shutdown6509a(config-if) #exit6509a(config) #exit6509a#show ip interface brief6509a #config t6509a(config) #int vlan 3076509a(config-if) #ip address 192.100.9.2 255.255.255.0 6509a(config-if) #no ip redirects6509a(config-if) #standby 7 ip 192.100.9.16509a(config-if) #standby 7 preempt6509a(config-if) #no shutdown6509a(config-if) #exit6509a(config) #exit6509a#show ip interface brief6.配置EIGRP6509a #config t6509a(config) #ip routing eigrp 1006509a(config) #router eigrp 1006509a(config-router) #network 192.1.2.06509a(config-router) #network 192.100.0 .0 255.255.0.0 6509a(config-router) #network 12.0.0.06509a(config-router) #network 192.254.253.06509a(config-router) #no auto-summary6509a(config-router) #^z6509a #show ip proto6509a #show ip route。

cisco6509配置(扩展访问控制列表)

cisco6509配置(扩展访问控制列表)

!version 12.2service timestamps debug datetime msec localtimeservice timestamps log datetime msec localtimeservice password-encryption!hostname 6509-L3!logging snmp-authfailenable password 7 060E0D220146000D!boot system flash bootflash:c6msfc3-pk9sv-mz.122-14.SX2.bin clock timezone PST 8ip subnet-zero!!ip domain-list assip host 1hl_7 192.168.0.5ip host 1hl_gy 192.168.0.6ip host 1hl_11 192.168.0.7ip host 2hl 192.168.0.8ip host 4hl 192.168.0.9ip host 6hl 192.168.0.10ip host 1cf 192.168.0.11ip host 2cf 192.168.0.12ip host 4c 192.168.0.4!no standby redirectredundancyhigh-availabilitysingle-router-mode!!!!!!interface Group-Async0physical-layer asyncip address negotiated previousencapsulation ppp!interface Vlan1ip address 192.168.0.1 255.255.255.0ip access-group tofirewall out!interface Vlan10ip address 192.168.41.1 255.255.255.0!interface Vlan20ip address 192.168.42.1 255.255.255.0!interface Vlan30ip address 172.16.9.1 255.255.255.0!interface Vlan40ip address 172.16.10.1 255.255.255.0ip access-group invlan40 inip access-group outvlan40 out!interface Vlan50ip address 172.16.11.1 255.255.255.0ip access-group invlan50 inip access-group outvlan50 out!interface Vlan60ip address 172.16.0.1 255.255.255.0!interface Vlan70ip address 172.16.1.1 255.255.255.0!interface Vlan80ip address 172.16.2.1 255.255.255.0!interface Vlan90ip address 172.16.3.1 255.255.255.0!interface Vlan100ip address 172.16.4.1 255.255.255.0!interface Vlan110ip address 172.16.5.1 255.255.255.0!interface Vlan120ip address 172.16.7.1 255.255.254.0 secondary ip address 172.16.6.1 255.255.254.0no ip redirects!interface Vlan130ip address 172.16.12.1 255.255.254.0ip access-group inbound inip access-group outbound out!interface Vlan140ip address 172.16.8.1 255.255.255.0!interface Vlan150ip address 172.16.16.1 255.255.255.252!router ripversion 2network 172.16.0.0network 192.168.0.0!ip classlessip route 0.0.0.0 0.0.0.0 192.168.0.236ip route 10.0.0.0 255.0.0.0 192.168.0.100ip route 172.16.17.0 255.255.255.0 172.16.16.2ip route 192.168.1.0 255.255.255.0 172.16.1.65ip route 220.201.208.112 255.255.255.252 172.16.16.2ip http server!!ip access-list extended inboundpermit ip any any reflect iptrafficip access-list extended invlan40permit ip host 172.16.10.168 any reflect iptrafficpermit ip any host 192.168.0.244 reflect iptrafficpermit ip any host 192.168.0.53 reflect iptrafficpermit ip any host 192.168.0.254 reflect iptrafficpermit ip any host 172.16.8.110 reflect iptrafficpermit ip host 172.16.10.82 any reflect iptrafficpermit ip host 172.16.10.117 any reflect iptrafficpermit ip any host 172.16.8.52 reflect iptrafficpermit tcp host 172.16.10.70 any eq domain reflect iptraffic permit tcp host 172.16.10.70 any eq pop3 reflect iptraffic permit tcp host 172.16.10.70 any eq smtp reflect iptraffic permit udp host 172.16.10.70 any eq domain reflect iptraffic permit ip any host 172.16.8.50 reflect iptrafficpermit ip any host 192.168.0.110 reflect iptrafficpermit ip any host 172.16.8.94 reflect iptrafficevaluate iptrafficip access-list extended invlan50permit ip any any reflect iptrafficip access-list extended outboundpermit ip host 192.168.0.3 anypermit ip host 172.16.1.65 anypermit ip any host 172.16.13.253permit ip any host 172.16.13.252permit ip any host 172.16.12.9permit ip host 172.16.8.52 anypermit ip host 192.168.0.247 host 172.16.12.52 permit ip host 172.16.8.50 anypermit ip host 192.168.0.110 anypermit ip host 172.16.8.94 anyevaluate iptrafficip access-list extended outvlan40permit ip any host 172.16.10.168permit ip host 192.168.0.237 anypermit ip any host 172.16.10.117permit ip host 172.16.8.52 anypermit tcp any host 172.16.10.70 eq domainpermit tcp any host 172.16.10.70 eq pop3permit tcp any host 172.16.10.70 eq smtppermit udp any host 172.16.10.70 eq domainpermit ip host 172.16.8.50 anypermit ip host 192.168.0.110 anypermit ip host 172.16.4.105 host 172.16.10.82 permit ip host 172.16.11.160 host 172.16.10.82 permit ip host 172.16.8.94 anyevaluate iptrafficip access-list extended outvlan50permit ip host 192.168.0.108 anypermit ip host 172.16.1.60 host 172.16.11.52 permit ip host 172.16.1.60 host 172.16.11.53 permit ip host 172.16.1.61 host 172.16.11.52 permit ip host 172.16.1.61 host 172.16.11.53 permit ip host 172.16.6.230 anypermit ip host 172.16.6.231 anypermit ip host 192.168.0.237 anypermit ip host 10.0.1.147 host 172.16.11.52permit ip host 10.0.1.147 host 172.16.11.53permit ip host 10.0.1.147 host 172.16.11.72permit ip host 172.16.6.171 host 172.16.11.52 permit ip host 172.16.6.171 host 172.16.11.53permit ip host 172.16.6.183 host 172.16.11.52 permit ip host 172.16.6.183 host 172.16.11.53 permit ip host 172.16.6.183 host 172.16.11.72 permit ip host 172.16.4.190 host 172.16.11.52 permit ip host 172.16.4.190 host 172.16.11.53 permit ip host 172.16.3.57 host 172.16.11.52 permit ip host 172.16.3.57 host 172.16.11.53 permit ip host 172.16.3.57 host 172.16.11.72 permit ip host 172.16.3.64 host 172.16.11.52 permit ip host 172.16.3.64 host 172.16.11.53 permit ip host 172.16.3.64 host 172.16.11.72 permit ip host 172.16.3.101 host 172.16.11.52 permit ip host 172.16.3.101 host 172.16.11.53 permit ip host 172.16.3.101 host 172.16.11.72 permit ip host 172.16.2.185 host 172.16.11.52 permit ip host 172.16.2.185 host 172.16.11.53 permit ip host 172.16.2.185 host 172.16.11.72 permit ip host 172.16.2.196 host 172.16.11.53 permit ip host 172.16.2.196 host 172.16.11.52 permit ip host 172.16.2.196 host 172.16.11.72 permit ip host 172.16.2.245 host 172.16.11.52 permit ip host 172.16.2.245 host 172.16.11.53 permit ip host 172.16.2.245 host 172.16.11.72 permit ip host 172.16.2.81 host 172.16.11.52 permit ip host 172.16.2.81 host 172.16.11.53 permit ip host 172.16.2.81 host 172.16.11.72 permit ip host 172.16.2.96 host 172.16.11.52 permit ip host 172.16.2.96 host 172.16.11.53 permit ip host 172.16.2.96 host 172.16.11.72 permit ip host 172.16.2.94 host 172.16.11.52 permit ip host 172.16.2.94 host 172.16.11.53 permit ip host 172.16.2.94 host 172.16.11.72 permit ip host 172.16.2.151 host 172.16.11.52 permit ip host 172.16.2.151 host 172.16.11.53 permit ip host 172.16.2.151 host 172.16.11.72 permit ip host 10.0.1.27 host 172.16.11.72permit ip host 10.0.1.27 host 172.16.11.53permit ip host 10.0.1.27 host 172.16.11.52permit ip host 172.16.4.55 host 172.16.11.52 permit ip host 172.16.4.55 host 172.16.11.53 permit ip host 172.16.4.55 host 172.16.11.72 permit ip host 172.16.4.190 host 172.16.11.121 permit ip host 172.16.4.190 host 172.16.11.250permit ip host 172.16.3.101 host 172.16.11.250 permit ip host 172.16.3.57 host 172.16.11.250 permit ip host 172.16.3.101 host 172.16.11.121 permit ip host 172.16.3.57 host 172.16.11.121 permit ip host 172.16.1.61 host 172.16.11.250 permit ip host 172.16.8.75 host 172.16.11.52 permit ip host 172.16.8.77 host 172.16.11.52 permit ip host 172.16.8.73 host 172.16.11.52 permit ip host 172.16.8.80 host 172.16.11.52 permit ip host 172.16.8.75 host 172.16.11.53 permit ip host 172.16.8.77 host 172.16.11.53 permit ip host 172.16.8.73 host 172.16.11.53 permit ip host 172.16.8.80 host 172.16.11.53 permit ip host 172.16.8.75 host 172.16.11.72 permit ip host 172.16.8.77 host 172.16.11.72 permit ip host 172.16.8.80 host 172.16.11.72 permit ip host 172.16.8.73 host 172.16.11.72 permit ip host 172.16.8.75 host 172.16.11.121 permit ip host 172.16.8.77 host 172.16.11.121 permit ip host 172.16.8.73 host 172.16.11.121 permit ip host 172.16.8.80 host 172.16.11.121 permit ip host 172.16.8.75 host 172.16.11.250 permit ip host 172.16.8.77 host 172.16.11.250 permit ip host 172.16.8.73 host 172.16.11.250 permit ip host 172.16.8.80 host 172.16.11.250 permit ip host 172.16.1.61 host 172.16.11.121 permit ip host 172.16.7.108 host 172.16.11.250 permit ip host 172.16.7.108 host 172.16.11.52 permit ip host 172.16.7.108 host 172.16.11.53 permit ip host 172.16.7.108 host 172.16.11.72 permit ip host 172.16.7.114 host 172.16.11.121 permit ip host 172.16.7.114 host 172.16.11.52 permit ip host 172.16.7.114 host 172.16.11.53 permit ip host 172.16.7.114 host 172.16.11.72 permit ip host 172.16.7.117 host 172.16.11.72 permit ip host 172.16.7.117 host 172.16.11.52 permit ip host 172.16.7.117 host 172.16.11.53 permit ip host 172.16.7.114 host 172.16.11.250 permit ip host 172.16.7.117 host 172.16.11.250 permit ip host 172.16.8.50 anypermit ip host 10.0.1.147 host 172.16.11.250 permit ip host 10.0.1.27 host 172.16.11.250permit ip host 10.0.1.147 host 172.16.11.121permit ip host 10.0.1.27 host 172.16.11.121permit ip host 192.168.0.110 anypermit tcp host 192.168.0.254 any eq ftppermit ip host 172.16.7.121 host 172.16.11.250 permit ip host 172.16.7.121 host 172.16.11.121 permit ip host 172.16.7.121 host 172.16.11.52 permit ip host 172.16.7.121 host 172.16.11.53 evaluate iptrafficip access-list extended tofirewallpermit tcp any host 192.168.0.110deny tcp any any eq echodeny tcp any any eq 139deny tcp any any eq 445deny tcp any any eq 135permit ip any any!logging 192.168.0.2access-list 11 permit 192.168.0.108access-list 11 permit 192.168.0.110access-list 11 permit 192.168.0.2access-list 11 permit 192.168.0.3access-list 11 permit 192.168.0.235access-list 11 permit 192.168.0.237access-list 11 permit 172.16.8.50arp 192.168.42.67 0014.224a.ea63 ARPAarp 172.16.7.185 000a.ebd9.7f33 ARPAarp 192.168.42.65 0010.dcd4.e74b ARPAarp 192.168.0.108 000d.61e8.a430 ARPAarp 192.168.42.71 0010.dcd4.dc0c ARPAarp 192.168.42.69 0010.dcce.e735 ARPAarp 192.168.42.75 0010.dcd4.7d3e ARPAarp 192.168.42.73 0005.5dd4.059b ARPAarp 192.168.0.101 000b.dbb7.9da4 ARPAarp 192.168.42.79 0010.dcd4.76d6 ARPAarp 192.168.0.102 000b.dbb8.4e25 ARPAarp 192.168.0.103 0016.7626.3c29 ARPAarp 192.168.42.77 000b.dbb8.cea5 ARPAarp 172.16.1.168 000d.6193.9c92 ARPAarp 172.16.7.172 0011.11a8.ab15 ARPAarp 172.16.2.164 000b.dbbb.00fa ARPAarp 172.16.2.162 0013.20d9.d0cb ARPAarp 192.168.42.95 0050.ba4f.9d8d ARPAarp 172.16.10.168 000d.61e8.3b66 ARPAarp 192.168.42.93 0011.110d.4cca ARPAarp 172.16.4.149 00e0.4cea.fab7 ARPA arp 172.16.2.254 0050.fc3a.8977 ARPA arp 172.16.5.254 0006.1bd0.b94c ARPA arp 171.16.2.254 0050.fc3a.8977 ARPA arp 172.16.8.253 0014.2246.4c96 ARPA arp 172.16.11.253 000b.dbb9.6520 ARPA arp 172.16.10.253 000d.61e8.a3ce ARPA arp 172.16.6.237 0011.110d.4de2 ARPA arp 172.16.11.208 1111.1111.1111 ARPA arp 172.16.7.209 0010.b54d.7b6c ARPA arp 172.16.7.208 000b.dbbb.00de ARPA arp 192.168.42.50 0005.5dd4.0704 ARPA arp 192.168.42.51 000a.e423.e9dd ARPA arp 172.16.7.200 0013.d303.28b1 ARPA arp 192.168.42.54 000b.dbbb.0e3b ARPA arp 192.168.42.52 000a.e43c.003a ARPA arp 192.168.42.53 000a.e423.ed2c ARPA arp 192.168.42.59 0010.dcd4.e951 ARPA arp 192.168.42.56 000b.dbb8.c8fb ARPA arp 172.16.7.199 0013.d324.c03a ARPA arp 172.16.4.56 0015.f240.edb7 ARPA arp 172.16.5.56 000c.f1ea.a554 ARPA arp 172.16.0.62 0010.dcd4.6eed ARPA arp 172.16.5.58 0011.11b7.1153 ARPA arp 172.16.0.56 000d.8740.7abf ARPA arp 172.16.2.58 0005.5dd4.0674 ARPA arp 172.16.11.50 0005.5d26.3229 ARPA arp 192.168.0.237 000b.dbb9.1131 ARPA arp 172.16.4.62 0014.2246.4bd2 ARPA arp 172.16.1.58 000f.1f5d.8b43 ARPA arp 172.16.3.56 0005.5d26.3461 ARPA arp 172.16.9.50 5254.ab14.6e7a ARPA arp 172.16.5.51 0060.6702.f70d ARPA arp 172.16.7.55 0010.c6cf.4a25 ARPA arp 172.16.4.52 0060.6706.a32c ARPA arp 172.16.3.51 0011.110d.4d16 ARPA arp 192.168.0.253 0010.5ce3.baab ARPA arp 192.168.0.254 000c.766e.ff8a ARPA arp 192.168.42.231 0013.20ac.53ed ARPA arp 192.168.42.228 0013.20d3.f9ad ARPA arp 172.16.6.23 0020.ed83.0c04 ARPA arp 172.16.6.10 0010.5cc5.811d ARPA arp 172.16.2.11 de ARPAarp 172.16.9.126 00e0.4c61.14d7 ARPAarp 172.16.2.110 0013.20d3.7d21 ARPAarp 172.16.4.107 0015.5809.c9ee ARPAarp 172.16.2.104 0011.110d.a157 ARPAarp 172.16.3.104 0010.5ce3.b37c ARPAarp 172.16.3.103 0013.20d9.cee8 ARPAarp 172.16.0.97 0013.20d9.ced5 ARPAarp 172.16.0.93 0010.b500.0657 ARPAarp 172.16.2.95 0020.ed3b.c492 ARPAarp 172.16.4.91 0015.f240.edb0 ARPAarp 172.16.10.82 0010.b54d.73e4 ARPAarp 172.16.4.93 000f.1f9e.aba3 ARPAarp 172.16.7.87 0014.2a31.7b60 ARPAarp 172.16.2.82 0010.b54d.7b6a ARPAarp 172.16.7.86 0014.2a35.ba95 ARPAarp 172.16.0.77 0010.dcd4.7d10 ARPAarp 172.16.5.75 000c.7680.fb56 ARPAarp 172.16.0.79 5254.ab14.769d ARPAarp 172.16.8.64 000b.dbb9.15c2 ARPAarp 172.16.5.77 0011.0911.bffd ARPAarp 172.16.8.65 000d.61e8.b0c1 ARPAarp 172.16.0.73 00d0.b76c.9893 ARPAarp 172.16.5.79 0010.dc48.ff46 ARPAarp 172.16.5.65 0013.20d9.cd7c ARPAarp 172.16.1.70 0020.ed15.91aa ARPAarp 172.16.7.70 000a.eb6a.0403 ARPAarp 172.16.0.66 0010.dcd4.76e3 ARPA!snmp-server community public ROsnmp-server community private RWsnmp-server chassis-idsnmp-server enable traps snmp authentication linkdown linkup coldstart warmstart snmp-server enable traps ttysnmp-server enable traps flash insertion removalsnmp-server enable traps hsrpsnmp-server enable traps configsnmp-server enable traps entitysnmp-server enable traps fru-ctrlsnmp-server enable traps bgpsnmp-server enable traps pim neighbor-change rp-mapping-change invalid-pim-message snmp-server enable traps ipmulticastsnmp-server enable traps msdpsnmp-server enable traps rsvpsnmp-server enable traps frame-relaysnmp-server enable traps rtrsnmp-server enable traps isakmp policy add snmp-server enable traps isakmp policy delete snmp-server enable traps isakmp tunnel start snmp-server enable traps isakmp tunnel stop snmp-server enable traps ipsec cryptomap add snmp-server enable traps ipsec cryptomap delete snmp-server enable traps ipsec cryptomap attach snmp-server enable traps ipsec cryptomap detach snmp-server enable traps ipsec tunnel start snmp-server enable traps ipsec tunnel stop snmp-server enable traps ipsec too-many-sas snmp-server enable traps isdn call-information snmp-server enable traps isdn layer2snmp-server enable traps isdn chan-not-avail snmp-server enable traps isdn ietfsnmp-server enable traps dlswsnmp-server host 192.168.0.2 privatesnmp-server host 192.168.0.2 public!tftp-server 192.168.0.3!line con 0exec-timeout 5 30password 7 141F1008410C233Flogging synchronousloginline vty 0 4access-class 11 inpassword 7 011B040716030F1Blogin!exception dump 192.168.0.3end。

思科交换机6509的配置方法

思科交换机6509的配置方法

清除vlanzhaozhou-6006 (enable) clear vlan 400This command will deactivate all ports on vlan 400in the entire management domainDo you want to continue(y/n) [n]?yVlan 400 deletedzhaozhou-6006 (enable)保存配置zhaozhou-6006 (enable) copy config 2Upload configuration to bootflash:211395136 bytes available on device bootflash, proceed (y/n) [n]? y.................................................Configuration has been copied successfully.zhaozhou-6006 (enable) sh flash-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name1 .. ffffffff 671e2eaa 49e1e4 25 4579681 Dec 02 1999 19:44:41 cat6000-sup.5-3-2-CSX.bin2 .. ffffffff 8bce2df9 4a1f40 6 15578 Oct 22 2001 17:54:41 zz60063 .. ffffffff bbf1e548 4a7c94 1 23762 Apr 05 2006 10:19:22 211371372 bytes available (4619412 bytes used)zhaozhou-6006 (enable) copy config flashFlash device [bootflash]?Name of file to copy to []? dqtvnet2006Upload configuration to bootflash:dqtvnet200611371244 bytes available on device bootflash, proceed (y/n) [n]? y.................................................Configuration has been copied successfully.zhaozhou-6006 (enable)删除带有名字的vlanzhaozhou-6006 (enable) copy config 2Upload configuration to bootflash:211395136 bytes available on device bootflash, proceed (y/n) [n]? y.................................................Configuration has been copied successfully.zhaozhou-6006 (enable) sh flash-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name1 .. ffffffff 671e2eaa 49e1e4 25 4579681 Dec 02 1999 19:44:41 cat6000-sup.5-3-2-CSX.bin2 .. ffffffff 8bce2df9 4a1f40 6 15578 Oct 22 2001 17:54:41 zz60063 .. ffffffff bbf1e548 4a7c94 1 23762 Apr 05 2006 10:19:22 211371372 bytes available (4619412 bytes used)zhaozhou-6006 (enable) copy config flashFlash device [bootflash]?Name of file to copy to []? dqtvnet2006Upload configuration to bootflash:dqtvnet200611371244 bytes available on device bootflash, proceed (y/n) [n]? y.................................................Configuration has been copied successfully.zhaozhou-6006 (enable)查看端口命令zhaozhou-6006 (enable) sh intsl0: flags=51<UP,POINTOPOINT,RUNNING>slip 0.0.0.0 dest 0.0.0.0sc0: flags=63<UP,BROADCAST,RUNNING>vlan 100 inet 221.209.150.82 netmask 255.255.255.248 broadcast 221.209.150.87 zhaozhou-6006 (enable)通过命令设置多个端口vlanzhaozhou-6006 (enable) set vlan 1 2/1-48VLAN 1 modified.VLAN 100 modified.VLAN Mod/Ports---- -----------------------1 2/1-485/1-48zhaozhou-6006 (enable)vtp清除#vtpset vtp domain zxstkset vtp mode serverset vtp v2 disableset vtp pruning disableset vtp pruneeligible 2-1000clear vtp pruneeligible 1001-1005set vlan 1 name default type ethernet mtu 1500 said 100001 state activeset vlan 1002 name fddi-default type fddi mtu 1500 said 101002 state activeset vlan 1004 name fddinet-default type fddinet mtu 1500 said 101004 state active bridge 0x0 stp ieeeset vlan 1005 name trnet-default type trbrf mtu 1500 said 101005 state active bridge 0x0 stp ibm set vlan 1003 name token-ring-default type trcrf mtu 1500 said 101003 state active parent 0 ring 0x0 mode srb aremaxhop 0 stemaxhop 0!#ipset interface sc0 100 221.209.150.82/255.255.255.248 221.209.150.87set interface sc0 upzhaozhou-6006 (enable) clear vtp domain zxstkUsage: clear vtp statisticsclear vtp pruneeligible <vlans..>(vlans: 1..1005An example of vlans is 2-10,1005)zhaozhou-6006 (enable) clear vtp pruneeligible 2-1000Vlans 1-1005 will not be pruned on this device.VTP domain zxstk modified.zhaozhou-6006 (enable)设置vtp模式透明zhaozhou-6006 (enable) set vtp mode ?Usage: set vtp [domain <name>] [mode <mode>] [passwd <passwd>][pruning <enable|disable>] [v2 <enable|disable>(mode = client|server|transparentUse passwd '0' to clear vtp password)Usage: set vtp pruneeligible <vlans>(vlans = 2..1000An example of vlans is 2-10,1000)zhaozhou-6006 (enable) set vtp mode transparentVTP domain zxstk modifiedzhaozhou-6006 (enable)设置端口汇聚zhaozhou-6006 (enable) set trunk ?Usage: set trunk <mod_num/port_num> [on|off|desirable|auto|nonegotiate] [vlans] [trunk_type] (vlans = 1..1005An example of vlans is 2-10,1005)(trunk_type = isl,dot1q,dot10,lane,negotiate)zhaozhou-6006 (enable) set trunk 2/3 on 1-400Adding vlans 1-400 to allowed list.Please use the 'clear trunk' command to remove vlans from allowed list.Port(s) 2/3 allowed vlans modified to 1-1005.Failed to set port 2/3 to trunk mode on.Trunk mode 'on' not allowed with trunk encapsulation type 'negotiate'.zhaozhou-6006 (enable) set trunk 2/3 on 1-400 dot1qAdding vlans 1-400 to allowed list.Please use the 'clear trunk' command to remove vlans from allowed list.Port(s) 2/3 allowed vlans modified to 1-1005.Port(s) 2/3 trunk mode set to on.Port(s) 2/3 trunk type set to dot1q.zhaozhou-6006 (enable)。

思科6509交换机FWSM防火墙模块配置资料_大全

思科6509交换机FWSM防火墙模块配置资料_大全
特性FSM Cisco PIX
性能5 Gb 1.7 Gb
VLAN标签有无
路由动态静态
故障恢复使用许可不需要需要
VPN功能无有
IDS签名无有
最大接口数100 10
输入控制列表(ACL)支持1280002M
Q. FWSM的性能如何?
A.总性能约为5Gbps。FWSM可以每秒支持一百万个并发连接,并且每秒可以建立超过10万个连接。
Q. FWSM主要具有哪些特性?
A. FWSM的主要特性包括:
·高性能,OC-48或者5 Gbps吞吐量,全双工防火墙功能
·具有整个X 6.0软件功能集和PIX 6.2的下列特性:
o命令授权
o对象组合
o ILS/NetMeeting修正
o URL过滤改进
·3Mpps吞吐量
·支持100个VLAN
·一百万个并发连接
Q. FWSM所能支持的最低的软件版本是多少?
A.最低的IOS软件版本是12.1(13)E,而综合CatOS的最低版本是7.5(1)。
Q. FWSM支持交换矩阵吗?
A.是的,FWSM支持交换矩阵。它具有一条与总线的连接和一条与交换矩阵的连接。
Q. FWSM是否利用热备份路由协议(HSRP)实现冗余?
Q. FWSM用什么机制检测流量?
A. FWSM使用与Cisco PIX防火墙相同的检测算法:自适应安全算法(ASA)。ASA是一种状态检测引擎,可以检测流量的完整性。ASA可以使用源和目的地的地址和端口、TCP序列号,以及其他TCP标志,散列IP报头信息。散列的作用相当于指纹,即创建一个独特的代码,表明建立输入或者输出连接的客户端的身份。
传统防火墙往往会成为网络上的瓶颈,因此性能是用户相当关心的问题。通过此次测试(请见表中数据),我们可以看到出众的性能是FWSM与Catalyst 6500紧密集成所带来的结果,交换机的优异性能表现在启动防火墙后同样得到了良好的体现。

Cisco 6509安装手册

Cisco 6509安装手册

Catalyst 6509 交换机安装手册version 1.0.0金中信息产业有限公司系统工程部2001.2.5目录1产品概述 (3)2系统描述 (4)2.1 系统特征 (4)2.1.1冗余 (4)2.1.2组件热插拔 (5)2.2 交换组件 (5)2.2.1配置选项 (5)2.2.2风扇 (5)2.2.3电源 (6)3安装 (7)1 产品概述●支持带有两个上行链路千兆端口的监控引擎;●支持MSFC及PFC;●支持可选的冗余监控引擎(带两个千兆上行链路接口);●最多支持八个附加的模块(以太网、快速以太网、千兆以太网及ATM);●支持多层交换模块(MSM);●所有的模块都可以热插拔;●支持冗余的、热插拔的AC(交流)电源或DC(直流)电源;●风扇可热插拔;●数据在背板总线上进行转发。

6509的底盘有9个插槽,插槽1保留给监控引擎使用,监控引擎提供交换、本地及远程管理、多个千兆上行链路端口功能。

插槽2可以插入一个附加的冗余监控引擎,如果第一个监控引擎失效,则这个监控引擎可以扮演备份的角色。

如果不需要冗余监控引擎,这个插槽就可以插入其它的模块。

其外形图如下:2 系统描述注:下面的描述适合所有的6000系列,除非有特殊的说明。

2.1 系统特征这个章节描述了6000系列交换机的硬件特征。

对于软件的描述,请参考the Catalyst 6000 Family Software Configuration Guide。

对于模块的描述及安装过程,请参考the Catalyst 6000 Family Module Installation Guide。

2.1.1 冗余6000系列交换机有下列特征:●底盘可放入两个热插拔的监控引擎;●底盘可放入两个冗余的、热插拔的交流或直流并进行负载共享的电源;●风扇是可热插拔的;●底板上的时钟模块是冗余的。

2.1.2 组件热插拔所有的模块(包括监控引擎,如果系统有冗余的监控引擎的话),风扇,电源,都支持热插拔,因此可以在不中断系统或使软件或接口shutdown的情况下对模块进行增加、替换、移动。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

cisco 6509交换机配置手册一个经典配置包括Catalyst6509 4006交换机配置方案拓扑图如下:一、 Catalyst 6509交换机配置方案1.1、配置6509二层交换Console> (enable) set system name bg-sw-01 /设备名称Bg-sw-01> (enable) set passwordEnter old password:Enter new password: test /设备口令Retype new password: testBg-sw-01> (enable) set enablepassEnter old password:Enter new password: test /设备口令Retype new password: testBg-sw-01> (enable) set banner motd % Welcome to the c6509 in the office % /提示文本Bg-sw-01> (enable) set interface sc0 10.234.180.21 255.255.255.0 /设置管理接口#sh intBg-sw-01> (enable) set ip route default 10.234.180.234 /设置默认网关 #sh iprouteBg-sw-01> (enable) set vtp mode server /设置VTP模式 #sh vtpdomainBg-sw-01> (enable) set vtp domain Core_Net /设置VTP域名Bg-sw-01> (enable) set vlan 31 name ZhongSanLu /创建VLAN #sh vlan Bg-sw-01> (enable) set vlan 32 name YiYangBg-sw-01> (enable) set vlan 33 name JianXiuBg-sw-01> (enable) set vlan 34 name RaoDianBg-sw-01> (enable) set vlan 35 name JinSanLouBg-sw-01> (enable) set vlan 36 name WuZiBg-sw-01> (enable) set port channel 1/1-2 on /设置Channel #shport channelBg-sw-01> (enable) set trunk 1/1 on dot1q 1-1005Bg-sw-01> (enable) set trunk 2/2 on dot1q 1-1005 /设置trunk口 #sh trunk # Bg-sw-01> (enable) set trunk 2/3 on dot1q 1-1005Bg-sw-01> (enable) set trunk 2/4 on dot1q 1-1005Bg-sw-01> (enable) set trunk 2/5 on dot1q 1-1005Bg-sw-01> (enable) set trunk 2/6 on dot1q 1-1005Bg-sw-01> (enable) set trunk 2/7 on dot1q 1-1005Bg-sw-01> (enable) set spantree root 1-40 dia 4 /设为spantree的根#sh spantree Bg-sw-01> (enable) set spantree portfast 1/1-2 enable /设spantree端口快速启用Bg-sw-01> (enable) set spantree portfast 2/1-8 enable Bg-sw-01> (enable) set spantree uplinkfast enable /设spantree端口快速切换Bg-sw-01> (enable) set spantree backbonefast enable /设spantree端口快速定位根1.2、配置路由Console> (enable) session 15 /进入路由子卡Router(config)# hostname c6509-msfc /设备名c6509-msfc (config)# enable password test /设口令c6509-msfc (config)# enable secret testC6509-msfc(config)# banner motd % Welcome to the c6509-msfc in the Office % /设提示文本c6509-msfc (config)# line vty 0 4 / 进入VTY模式c6509-msfc (config-line)#login / 登入提示c6509-msfc (config-line)#password test / 设用户级口令c6509-msfc (config-line)# endC6509-msfc#configure terminal / 进入全局模式Enter configuration commands, one per line. End with CNTL/Z.C6509-msfc(config)# interface vlan 1 /进入虚子接口C6509-msfc(config-if)# ip address 10.234.180.232 255.255.255.0 /加ip地址C6509-msfc(config-if)# no shutdown /开启端口C6509-msfc(config-if)# standby 1 ip 10.234.180.234 /建HSRP组并设虚IP地址C6509-msfc(config-if)# standby 1 priority 110 /设优先级C6509-msfc(config-if)# standby 1 preempt /设切换许可C6509-msfc(config-if)# interface vlan 31C6509-msfc(config-if)# ip address 10.234.181.60 255.255.255.192C6509-msfc(config-if)# no shutdownC6509-msfc(config-if)# standby 31 ip 10.234.181.62C6509-msfc(config-if)# standby 31 priority 110C6509-msfc(config-if)# standby 31 preemptC6509-msfc(config-if)# interfacevlan 32C6509-msfc(config-if)# ip address 10.234.181.124 255.255.255.192C6509-msfc(config-if)# no shutdownC6509-msfc(config-if)# standby 32 ip 10.234.181.126C6509-msfc(config-if)# standby 32 priority 110C6509-msfc(config-if)# standby 32 preemptC6509-msfc(config-if)# interface vlan 33C6509-msfc(config-if)# ip address 10.234.181.188 255.255.255.192 C6509-msfc(config-if)# no shutdownC6509-msfc(config-if)# standby 33 ip 10.234.181.190 C6509-msfc(config-if)# standby 33 priority 110C6509-msfc(config-if)# standby 33 preemptC6509-msfc(config-if)# interface vlan 34C6509-msfc(config-if)# ip address 10.234.181.220 255.255.255.224 C6509-msfc(config-if)# no shutdownC6509-msfc(config-if)# standby 34 ip 10.234.181.222 C6509-msfc(config-if)# standby 34 priority 110C6509-msfc(config-if)# standby 34 preemptC6509-msfc(config-if)# interface vlan 35C6509-msfc(config-if)# ip address 10.234.181.254 252.255.255.224 C6509-msfc(config-if)# no shutdownC6509-msfc(config-if)# standby 35 ip 10.234.181.254 C6509-msfc(config-if)# standby 35 priority 110C6509-msfc(config-if)# standby 35 preemptC6509-msfc(config-if)# interface vlan 36C6509-msfc(config-if)# ip address 10.234.182.28 255.255.255.224 C6509-msfc(config-if)# no shutdownC6509-msfc(config-if)# standby 36 ip 10.234.182.30C6509-msfc(config-if)# standby 36 priority 110C6509-msfc(config-if)# standby 36 preemptC6509-msfc(config-if)# exitC6509-msfc #copy running config[page]二、Catalyst 4006交换机配置方案2.1、配置4006二层交换(三层交换模块安置在第二个槽)Console> (enable) set system name bg-sw-02 /设备名称Bg-sw-02> (enable) set passwordEnter old password:Enter new password: test /设备口令Retype new password: testBg-sw-02> (enable) set enablepassEnter old password:Enter new password: test /设备口令Retype new password: testBg-sw-02> (enable) set banner motd % Welcome to the c4006 in the office % /提示文本Bg-sw-02> (enable) set interface sc0 10.234.180.22 255.255.255.0 /设置管理接口 #shintBg-sw-02> (enable) set ip route default 10.234.180.234 /设置默认网关 #sh ip routeBg-sw-02> (enable) set vtp mode server /设置VTP模式 #sh vtp domain Bg-sw-02> (enable) set vtp domain Core_Net /设置VTP域名Bg-sw-02> (enable) set vlan 31 name ZhongSanLu /创建VLAN #sh vlanBg-sw-02> (enable) set vlan 32 name YiYangBg-sw-02> (enable) set vlan 33 name JianXiuBg-sw-02> (enable) set vlan 34 name RaoDianBg-sw-02> (enable) set vlan 35 name JinSanLouBg-sw-02> (enable) set vlan 36 name WuZiBg-sw-02> (enable) set port channel 1/1-2 on /设置Channel #sh port channel Bg-sw-02> (enable) set trunk 1/1 on dot1q 1-1005 Bg-sw-02> (enable) set port channel 2/1-2 on /设置Channel #sh port channelBg-sw-02> (enable) set trunk 2/1 on dot1q 1-1005Bg-sw-02> (enable) set trunk 4/1 on dot1q 1-1005 /设置trunk口 #sh trunk # Bg-sw-02> (enable) set trunk 4/3 on dot1q 1-1005Bg-sw-02> (enable) set trunk 4/4 on dot1q 1-1005Bg-sw-02> (enable) set spantree root secondary 1-40 dia 4Bg-sw-02> (enable) set spantree portfast 1/1-2 enable /设spantree端口快速启用Bg-sw-02> (enable) set spantree portfast 2/1-34 enableBg-sw-02> (enable) set spantree portfast 3/1-32 enableBg-sw-02> (enable) set spantree portfast 4/1-6 enableBg-sw-02> (enable) set spantree uplinkfast enable /设spantree端口快速切换Bg-sw-02> (enable) set spantree backbonefast enable /设spantree端口快速定位根2.1、配置三层交换模块(三层交换模块安置在第二)Console> (enable) session 2 /进入路由子卡Router(config)# hostname c4006-L3 /设备名c4006-L3 (config)# enable password test /设口令c4006-L3 (config)# enable secret testc4006-L3(config)# banner motd % Welcome to the c4006-l3 in the Office % /设提示文本c4006-L3 (config)# line vty 0 4 / 进入VTY模式c4006-L3 (config-line)#login / 登入提示c4006-L3 (config-line)#password test / 设用户级口令c4006-L3 (config-line)# endC4006-L3#configure terminalEnter configuration commands, one per line. End with CNTL/Z.C4006-L3(config)# interface port-channel 1 /建内部虚端口C4006-L3(config)# interface g3 /进入接口模式C4006-L3(config-if)# channel-group 1 / 加入到channel组中C4006-L3(config-if)# exitC4006-L3(config)# interface g4 /进入接口模式C4006-L3(config-if)# channel-group 1 / 加入到channel组中C4006-L3(config-if)# exitC4006-L3(config)# interface port-channel 1.1 /进入子接口模式C4006-L3(config-if)# encapsulation dot1q 1 native / 封装trunk C4006-L3(config-if)# ip address 10.234.180.233 255.255.255.0 /加ip地址C4006-L3(config-if)# no shutdown /开启端口C4006-L3(config-if)# standby 1 ip 10.234.180.234 /建HSRP组并设虚IP地址C4006-L3(config-if)# standby 1 priority 100 /设优先级C4006-L3(config-if)# standby 1 preempt /设切换许可C4006-L3(config-if)# interface port-channel 1.31C4006-L3(config-if)# encapsulation dot1q 31C4006-L3(config-if)# ip address 10.234.181.61 255.255.255.192C4006-L3(config-if)# no shutdownC4006-L3(config-if)# standby 31 ip 10.234.181.62C4006-L3(config-if)# standby 31 priority 100C4006-L3(config-if)# standby 31 preemptC4006-L3(config-if)# interface port-channel 1.32C4006-L3(config-if)# encapsulation dot1q 32C4006-L3(config-if)# ip address 10.234.181.125 255.255.255.192C4006-L3(config-if)# no shutdownC4006-L3(config-if)# standby 32 ip 10.234.181.126C4006-L3(config-if)# standby 32 priority 100C4006-L3(config-if)# standby 32 preemptC4006-L3(config-if)# interface port-channel 1.33C4006-L3(config-if)# encapsulation dot1q 33C4006-L3(config-if)# ip address 10.234.181.189 255.255.255.192C4006-L3(config-if)# no shutdownC4006-L3(config-if)# standby 33 ip 10.234.181.190C4006-L3(config-if)# standby 33 priority 100C4006-L3(config-if)# standby 33 preemptC4006-L3(config-if)# interface port-channel 1.34C4006-L3(config-if)# encapsulation dot1q 34C4006-L3(config-if)# ip address 10.234.181.221 255.255.255.224 C4006-L3(config-if)# no shutdownC4006-L3(config-if)# standby 34 ip 10.234.181.222 C4006-L3(config-if)# standby 34 priority 100C4006-L3(config-if)# standby 34 preemptC4006-L3(config-if)# interface port-channel 1.35C4006-L3(config-if)# encapsulation dot1q 35C4006-L3(config-if)# ip address 10.234.181.253 255.255.255.224 C4006-L3(config-if)# no shutdownC4006-L3(config-if)# standby 35 ip 10.234.181.254 C4006-L3(config-if)# standby 35 priority 100C4006-L3(config-if)# standby 35 preemptC4006-L3(config-if)# interface port-channel 1.36C4006-L3(config-if)# encapsulation dot1q 36C4006-L3(config-if)# ip address 10.234.182.29 255.255.255.224 C4006-L3(config-if)# no shutdownC4006-L3(config-if)# standby 36 ip 10.234.182.30C4006-L3(config-if)# standby 36 priority 100C4006-L3(config-if)# standby 36 preemptC4006-L3(config-if)# exitC4006-L3#copy running config[page]三、Catalyst 3500XL交换机配置方案3.1、办公楼Catalyst 3500XL交换机配置方案第一台Catalyst 3548switch#configure terminalEnter configuration commands, one per line. End with CNTL/Z.switch(config)#hostname bg-sw-03 /设备名bg-sw-03(config)#enable password test /设口令bg-sw-03(config)#enable secret testbg-sw-03(config)#banner motd % Welcome to the C3548 in the Office % /提示文本bg-sw-03(config)#line vty 0 4 / 进入VTY模式bg-sw-03(config.line)#login / 登入提示bg-sw-03(config.line)#password test / 设用户级口令bg-sw-03(config.line)#exitbg-sw-03 (config)#int vlan 1 / 进入内部管理接口bg-sw-03 (config-if)#ip address 10.234.180.23 255.255.255.0 /加入IP地址bg-sw-03(config-if)#exitbg-sw-03(config)#ip default.gateway 10.234.180.234 /设网关bg-sw-03(config)#endbg-sw-03#vlan database / 进入vtp数据库bg-sw-03(vlan)#vtp domain Corp_Net /设vtp域bg-sw-03(vlan)#vtp client /设定vtp模式bg-sw-03(vlan)#exitbg-sw-03(config)#spantree uplinkfast /设定端口快速上连bg-sw-03(config)#int g0/1 /进入接口模式bg-sw-03(config-if)#switchport mode trunk /设为trunk模式bg-sw-03(config-if)#switchport trunk encapsulation dot1q /设定封装模式bg-sw-03(config-if)#switchport trunk allowed vlan all /设定trunk许可vlanbg-sw-03(config-if)#spanning-tree portfast /设定端口快速启用bg-sw-03(config-if)#int g0/2 /进入接口模式bg-sw-03(config-if)#switchport mode trunk /设为trunk模式bg-sw-03(config-if)#switchport trunk encapsulation dot1q /设定封装模式bg-sw-03(config-if)#switchport trunk allowed vlan all /设定trunk许可vlanbg-sw-03(config-if)#spanning-tree portfast /设定端口快速启用bg-sw-03(config-if)#exitbg-sw-03#write memory第二台Catalyst 3548switch#configure terminalEnter configuration commands, one per line. End with CNTL/Z.switch(config)#hostname bg-sw-04 /设备名bg-sw-04(config)#enable password test /设口令bg-sw-04(config)#enable secret testbg-sw-04(config)#banner motd % Welcome to the C3548 in the Office % /提示文本bg-sw-04(config)#line vty 0 4 / 进入VTY模式bg-sw-04(config.line)#login / 登入提示bg-sw-04(config.line)#password test / 设用户级口令bg-sw-04(config.line)#exit / 进入内部管理接口bg-sw-04(config)#int vlan 1bg-sw-04(config-if)#ip address 10.234.180.24 255.255.255.0bg-sw-04(config-if)#exitbg-sw-04(config)#ip default.gateway 10.234.180.234bg-sw-04(config)#endbg-sw-04#vlan databasebg-sw-04(vlan)#vtp domain Corp_Netbg-sw-04(vlan)#vtp clientbg-sw-04(vlan)#exitbg-sw-04(config)#spantree uplinkfastbg-sw-04(config)#int g0/1bg-sw-04(config-if)#switchport mode trunkbg-sw-04(config-if)#switchport trunk encapsulation dot1qbg-sw-04(config-if)#switchport trunk allowed vlan allbd-sw-03 (config-if)# spanning-tree portfastbg-sw-04(config-if)#exitbg-sw-04(config)#int g0/2bg-sw-04(config-if)#switchport mode trunkbg-sw-04(config-if)#switchport trunk encapsulation dot1qbg-sw-04(config-if)#switchport trunk allowed vlan allbg-sw-04(config-if)#spanning-tree portfastbg-sw-04(config-if)#exitbg-sw-04#write memory3.2 办公楼Catalyst 3548XL交换机配置方案switch#configure terminalEnter configuration commands, one per line. End with CNTL/Z.switch(config)#hostname zsr-sw-01zsr-sw-01(config)#enable password testzsr-sw-01(config)#enable secret testzsr-sw-01(config)#banner motd % Welcome to the C3548 in the Zhong San Lu ban GongLou %zsr-sw-01(config)#line vty 0 4zsr-sw-01(config.line)#loginzsr-sw-01(config.line)#password testzsr-sw-01(config.line)#exitzsr-sw-01(config)#int vlan 1zsr-sw-01(config-if)#ip address 10.234.180.25 255.255.255.0zsr-sw-01(config-if)#exitzsr-sw-01(config)#ip default.gateway 10.234.180.234zsr-sw-01(config)#endzsr-sw-01#vlan databasezsr-sw-01(vlan)#vtp domain Corp_Netzsr-sw-01(vlan)#vtp clientzsr-sw-01(vlan)#exitzsr-sw-1#configure terminalzsr-sw-1(config)#int f0/1zsr-sw-1(config-if)#switchport mode accesszsr-sw-1(config-if)#switchport access vlan 31zsr-sw-1(config-if)#exitzsr-sw-1(config)#int f0/2。

相关文档
最新文档