Professional Documents
Culture Documents
Switch Configurar Copia de Plantilla A Server
Switch Configurar Copia de Plantilla A Server
Switch#confi ter
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.10.2 255.255.255.0
Switch(config-if)#no sh
Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up
Switch(config-if)#do wr
Building configuration...
[OK]
Switch#
Switch#sh flash
Directory of flash:/
Writing c2960-lanbase-mz.122-
25.FX.bin...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 4414921 bytes]
Switch#delete c2960-lanbase-mz.122-25.FX.bin
Delete filename [c2960-lanbase-mz.122-25.FX.bin]?
Delete flash:/c2960-lanbase-mz.122-25.FX.bin? [confirm]
Accessing tftp://192.168.10.10/c2960-lanbasek9-mz.150-2.SE4.bin...
Loading c2960-lanbasek9-mz.150-2.SE4.bin from
192.168.10.10: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 4670455 bytes]
Switch(config)#sdm prefer ?
default Default bias
dual-ipv4-and-ipv6 Support both IPv4 and IPv6
lanbase-routing Lanbase routing
qos Qos bias
Switch(config)#do reload
Se pone el nombre
Switch>en
Switch(config)#hostname SW1-Rk1-Piso1
SW1-Rk1-Piso1(config)#do WR
Building configuration...
[OK]
*****Uso privado*****
W1-Rk1-Piso1#
SW1-Rk1-Piso1#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1(config)#line console 0
SW1-Rk1-Piso1(config-line)#password cisco
SW1-Rk1-Piso1(config-line)#do wr
SW1-Rk1-Piso1(config)#service password-encryption
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
SW1-Rk1-Piso1(config)#int
SW1-Rk1-Piso1(config)#interface vlan1
SW1-Rk1-Piso1(config-if)#ipv6 add 2001:DB8:CAFE::2/64
SW1-Rk1-Piso1(config-if)#ipv6 add fe80::2 link-local
SW1-Rk1-Piso1(config-if)#do wr
SW1-Rk1-Piso1#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
SW1-Rk1-Piso1(config)#line vty 0 1
SW1-Rk1-Piso1(config-line)#password cisco
SW1-Rk1-Piso1(config-line)#login
SW1-Rk1-Piso1(config-line)#transport input telnet
SW1-Rk1-Piso1(config-line)#do wr
Building configuration...
[OK]
SW1-Rk1-Piso1(config-line)#
**********************************************************************
**********************************************************************
**********************************************************************
SW1-Rk1-Piso2#conf ter
SW1-Rk1-Piso2(config)#ip domain-name www.cisco.com
SW1-Rk1-Piso2(config)#ip default-gateway 192.168.10.1
SW1-Rk1-Piso2(config)#crypto key generate rsa
The name for the keys will be: SW1-Rk1-Piso2.www.cisco.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
**********************************
SW1-Rk1-Piso2(config)#
SW1-Rk1-Piso2(config)#line vty 0
SW1-Rk1-Piso2(config-line)#^Z
SW1-Rk1-Piso2#
SW1-Rk1-Piso2#conf ter
SW1-Rk1-Piso2(config)#crypto key generate rsa
% You already have RSA keys defined named SW1-Rk1-Piso2.www.cisco.com .
% Do you really want to replace them? [yes/no]: no
SW1-Rk1-Piso2(config)#
SW1-Rk1-Piso2(config)#
SW1-Rk1-Piso2(config)#line vty 0
SW1-Rk1-Piso2(config-line)#login local
SW1-Rk1-Piso2(config-line)#transport input all
SW1-Rk1-Piso2(config-line)#do wr
W1-Rk1-Piso2#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
SW1-Rk1-Piso2(config)#line console 0
SW1-Rk1-Piso2(config-line)#login local
SW1-Rk1-Piso2(config-line)#do wr
Building configuration...
[OK]
se borra el telnet
C:\>telnet 192.168.0.3
Trying 192.168.0.3 ...
% Connection timed out; remote host not responding
:\>ssh -l damian 192.168.10.3
Password:
*****Uso privado*****
SW1-Rk1-Piso2#
SW1-Rk1-Piso1(config)#int f0/1
*********************
se shutea si se conecta otro equipo
SW1-Rk1-Piso1(config)#int f0/1
SW1-Rk1-Piso1(config-if)#switchport port-security maximum 1
SW1-Rk1-Piso1#sh por
SW1-Rk1-Piso1#sh port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
--------------------------------------------------------------------
Fa0/1 1 0 0 Shutdown
----------------------------------------------------------------------
SW1-Rk1-Piso1#
SW1-Rk1-Piso1#
SW1-Rk1-Piso1#sh port-security in
SW1-Rk1-Piso1#sh port-security interface f0/1
Port Security : Enabled
Port Status : Secure-up
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses :0
Configured MAC Addresses : 0
Sticky MAC Addresses :0
Last Source Address:Vlan : 0000.0000.0000:0
Security Violation Count : 0
SW1-Rk1-Piso1#
SW1-Rk1-Piso1#ping 192.168.10.10
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1(config)#aaa new-model
SW1-Rk1-Piso1(config)#aaa authentication ?
dot1x Set authentication lists for IEEE 802.1x.
enable Set authentication lists for enable.
login Set authentication lists for logins.
ppp Set authentication lists for ppp.
SW1-Rk1-Piso1(config)#aaa authentication dot1x ?
default The default authentication list.
SW1-Rk1-Piso1(config)#dot1x system-auth-control
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1(config)#do wr
Building configuration...
[OK]
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1(config)#int range f0/2-24