You are on page 1of 13

ROUTER OSPF 1

NETWORK (IP y Wild) AREA0


PASSIVE-INTERFACE (puertos que no están conectados a OSPF)
EXIT

Ruta por defecto-

ROUTER OSPF 1
DEFAULT-INFORMATION ORIGINATE
EXIT

——
Shh-
hostname orlando
enable secret cisco
line con 0
password cisco
login

Telnet-
line vty 0 4
password cisco
login
exit

Banner de aviso-

banner motd # Solo personal Autorizado #

——

PPP / PAP : PASSWORD AUTHENTICATION PROTOCOL

R1
INTER SER0/0/0
ENCAPSULATION PPP
PPP AUTHENTICATION CHAP
HOSTNAME R1
USERNAME R2 PASS CISCO

--------------------------------------

R2
INTER SER0/0/0
ENCAPSULATION PPP
PPP AUTHENTICATION PAP
PPP PAP SENT-USERNAME R1 PASS CISCO
EXIT
HOSTNAME R2
USERNAME R2 PASS CISCO

———

VTP: VIRTUAL TRUNKING PROTOCOL


SINCRONIZA LA BASE DE DATOS DE VLAN.

SERVER:
VTP MODE SERVER
VTP DOMAIN CCNA
VTP PASSWORD CISCO

CLIENT:
VTP MODE CLIENT
VTP DOMAIN CCNA
VTP PASSWORD CISCO

TRANSPARENT: (LAS VEGAS)


NOTA: SE DEBEN CREAR LAS VLANS MANUALMENTE

VTP MODE TRANSPARENT


VTP DOMAIN CCNA
VTP PASSWORD CISCO

——

Troncal

INTER RANGE FAST0/1-5


SW MODE TRUNK
SW TRUNK NATIVE VLAN 99
SW TRUNK ALLOWED VLAN 10,20,30
EXIT
——

SEGURIDAD DE PUERTOS:
(NOTA: SOLO PARA PUERTOS DE ACCCESO)

INTER FAST0/1
SW MODE ACCESS
SWITCHPORT PORT-SECURITY
SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY
SWITCHPORT PORT-SECURITY MAXIMUM 2
SWITCHPORT PORT-SECURITY VIOLATION SHUTDOWN
EXIT

REINICIAR EL PUERTO:
INTER FAST0/1
SHUTDOWN
NO SHUTDOWN
EXIT

LIMPIAR LAS DIRECCIONES MAC APRENDIDAS:


CLEAR PORT-SECURITY ALL

——
COMANDOS DE STP:

1. CONFIGURAR EL ROOT BRIDGE:


1.1 : PRIORIDAD : SPANNING-TREE VLAN 1 PRIORITY 4096

Ejemplo
MLS1
SPANNING-TREE VLAN 1,10,20,30,40,99,100 Priority 4096

1.2 : DINAMICA : SPANNING-TREE VLAN 1 ROOT PRIMARY

Ejemplo
MLS1
SPANNING-TREE VLAN 1,10,20,30,40,99,100 ROOT PRIMARY

2. CONFIGURAR EL STP RAPIDO:


SPANNING-TREE MODE RAPID-PVST

3. CONFIGURAR PUERTOS EXTREMOS : CONFIGURACION DE PORTFAST


(NOTA : SOLO EN PUERTOS DE ACCESO)

INTER FAST0/10
SPANNING-TREE PORTFAST
SPANNING-TREE BPDUGUARD ENABLE
EXIT

ETHERCHANNEL:

INTERFACE PORTCHANNEL 1
SW MODE TRUNK
SW TRUNK NATIVE VLAN (pone la nativa que USA)
EXIT

INTER RANGE FAST0/1-2


SW MODE TRUNK
SW TRUNK NATIVE VLAN (pone la nativa que USA)
CHANNEL-GROUP 1 MODE ????
EXIT

---------------------------------------

PAGP : PORT AGGREGATION PROTOCOL (CISCO)

MODOS: DESIRABLE = ACTIVO


AUTO = PASIVO

INTERFACE PORT-CHANNEL 1
SW MODE TRUNK
SW TRUNK NATIVE VLAN 99
EXIT

INTER RANGE FAST0/1-2


SW MODE TRUNK
SW TRUNK NATIVE VLAN 99
CHANNEL-GROUP 1 MODE DESIRABLE
EXIT

Ejemplo

PASO 9:

PO1:

ALFA-OMEGA:
INTERFACE PORT-CHANNEL 1
SW MODE TRUNK
EXIT
INTER RANGE FAST0/20-21
CHANNEL-GROUP 1 MODE DESIRABLE
EXIT
-----------------------------------------

PO2:

ALFA-DELTA:
INTERFACE PORT-CHANNEL 2
SW MODE TRUNK
EXIT

INTER RANGE FAST0/22-23


CHANNEL-GROUP 2 MODE DESIRABLE
EXIT

--------------------------------------------

PO3

OMEGA - DELTA

OMEGA
INTERFACE PORT-CHANNEL 3
SW MODE TRUNK
EXIT

INTER RANGE FAST0/22-23


CHANNEL-GROUP 3 MODE DESIRABLE
EXIT

DELTA
INTERFACE PORT-CHANNEL 3
SW MODE TRUNK
EXIT

INTER RANGE FAST0/20-21


CHANNEL-GROUP 3 MODE DESIRABLE
EXIT

*Nota- se conectan por por los puestos que va a conectados

VERIFICACION:
SHOW ETHERCHANNEL SUMMARY

Ejemplo

CONFIGURAR ETHERCHANNEL:

PO1: PAGP

MLS1

INTER PORT-CHANNEL 1
SW TRUNK ENCAPSULATION DOT1Q
SW MODE TRUNK
SW TRUNK NATIVE VLAN 99
EXIT
INTER RANGE FAST0/23-24
CHANNEL-GROUP 1 MODE DESIRABLE
EXIT

S3
INTER PORT-CHANNEL 1
SW MODE TRUNK
SW TRUNK NATIVE VLAN 99
EXIT

INTER RANGE FAST0/23-24


CHANNEL-GROUP 1 MODE DESIRABLE
EXIT

------------------------------------------------------
PO2: LACP

MLS1

INTER PORT-CHANNEL 2
SW TRUNK ENCAPSULATION DOT1Q
SW MODE TRUNK
SW TRUNK NATIVE VLAN 99
EXIT

INTER RANGE FAST0/20-21


CHANNEL-GROUP 2 MODE ACTIVE
EXIT

S1
INTER PORT-CHANNEL 2
SW MODE TRUNK
SW TRUNK NATIVE VLAN 99
EXIT

INTER RANGE FAST0/20-21


CHANNEL-GROUP 2 MODE ACTIVE
EXIT

——
DHCP

SINTAXIS:
IP DHCP POOL (NOMBRE)
NETWORK (RED) (MASCARA)
DEFAULT-ROUTER (IP GATEWAY)
DNS-SERVER (IP DNS)
EXIT
IP DHCP EXCLUDED-ADDRESS (IP / RANGO DE IPS)

RETRANSMISION DE DHCP:

INTER FAST0/0
IP HELPER-ADDRESS (IP SERVER)
EXIT

CONFIGURAR DHCP:
MLS1

IP DHCP POOL VLAN10


NETWORK 192.168.10.0 255.255.255.0
DEFAULT-ROUTER 192.168.10.1
DNS-SERVER 172.16.20.5
EXIT
IP DHCP EXCLUDED-ADDRESS 192.168.10.1

IP DHCP POOL VLAN20


NETWORK 192.168.20.0 255.255.255.0
DEFAULT-ROUTER 192.168.20.1
DNS-SERVER 172.16.20.5
EXIT
IP DHCP EXCLUDED-ADDRESS 192.168.20.1

IP DHCP POOL VLAN30


NETWORK 192.168.30.0 255.255.255.0
DEFAULT-ROUTER 192.168.30.1
DNS-SERVER 172.16.20.5
EXIT
IP DHCP EXCLUDED-ADDRESS 192.168.30.1

IP DHCP POOL VLAN40


NETWORK 192.168.40.0 255.255.255.0
DEFAULT-ROUTER 192.168.40.1
DNS-SERVER 172.16.20.5
EXIT
IP DHCP EXCLUDED-ADDRESS 192.168.40.1

———
VLAN ADMINISTRATIVA

CONFIGURACION DE VLAN ADMINISTRATIVA (VLAN 100)

MLS1
VLAN 100
EXIT

INTER VLAN 100


IP ADD 192.168.100.1 255.255.255.0
EXIT

------------------------------------------
S1
INTER VLAN 100
IP ADD 192.168.100.2 255.255.255.0
EXIT
IP DEFAULT-GATEWAY 192.168.100.1

S2
INTER VLAN 100
IP ADD 192.168.100.3 255.255.255.0
EXIT
IP DEFAULT-GATEWAY 192.168.100.1

S3
INTER VLAN 100
IP ADD 192.168.100.4 255.255.255.0
EXIT
IP DEFAULT-GATEWAY 192.168.100.1
——

ACL

ACL: ACCESS CONTROL LIST


FILTRAR TRAFICO : PERMIT
DENY

ACL STANDARD: SOLO FILTRAN POR IP DE ORIGEN (TODO LO QUE VENGA DESDE?)

NUMERADA: RANGO 1-99


SINTAXIS:
ACCESS-LIST # CONDICION ORIGEN WILDCARD

EJEMPLO1:
ACCESS-LIST 1 PERMIT 192.168.0.0 0.0.0.255
ACCESS-LIST 1 DENY ANY (IMPLICITO)

EJEMPLO2:
ACCESS-LIST 1 DENY 192.168.0.0 0.0.0.255
ACCESS-LIST 1 PERMIT ANY
ACCESS-LIST 1 DENY ANY (IMPLICITO)

EJEMPLO3:
ACCESS-LIST 1 PERMIT 192.168.0.10 0.0.0.0
ACCESS-LIST 1 DENY 192.168.0.0 0.0.0.255
ACCESS-LIST 1 PERMIT ANY
ACCESS-LIST 1 DENY ANY (IMPLICITO)

EJEMPLO4 MALO:
ACCESS-LIST 1 DENY 192.168.0.0 0.0.0.255
ACCESS-LIST 1 PERMIT 192.168.0.10 0.0.0.0
ACCESS-LIST 1 PERMIT ANY
ACCESS-LIST 1 DENY ANY (IMPLICITO)

NOMBRADA: CON NOMBRE


SINTAXIS:
IP ACCESS-LIST STANDARD (NOMBRE)
CONDICION (ORIGEN) (WILDCARD)
EXIT

EJEMPLO:
IP ACCESS-LIST STANDARD JUANA
PERMIT 192.168.0.0 0.0.0.255
DENY ANY (IMPLICITO)
EXIT

EJEMPLO2:
IP ACCESS-LIST STANDARD JUANA
DENY 192.168.0.0 0.0.0.255
PERMIT ANY
DENY ANY (IMPLICITO)
EXIT

-----------------------------------------------------------------------
ACL EXTENDED: FILTRAN POR : IP DE ORIGEN (TODO LO QUE VENGA DESDE?)
IP DE DESTINO (TODO LO QUE VAYA PARA?)
PROTOCOLO (IP, ICMP, TCP/UDP)
PUERTO (80 , 443 , 53 , 25 , 110)
HTTP HTTPS DNS SMTP POP
NUMERADA: RANGO 100-199
SINTAXIS:
ACCESS-LIST # CONDICION PROTOCOLO (ORIGEN WILD) (DESTINO WILD) EQ PUERTO

EJEMPLO:
ACCESS-LIST 100 PERMIT TCP 192.168.0.0 0.0.0.255 ANY EQ 80
ACCESS-LIST 100 DENY IP ANY ANY (IMPLICITO)

EJEMPLO2:
ACCESS-LIST 100 DENY TCP 192.168.0.0 0.0.0.255 ANY EQ 80
ACCESS-LIST 100 PERMIT IP ANY ANY
ACCESS-LIST 100 DENY IP ANY ANY (IMPLICITO)

EJEMPLO3:
ACCESS-LIST 100 PERMIT TCP 192.168.0.10 0.0.0.0 ANY EQ 80
ACCESS-LIST 100 DENY TCP 192.168.0.0 0.0.0.255 ANY EQ 80
ACCESS-LIST 100 PERMIT IP ANY ANY
ACCESS-LIST 100 DENY IP ANY ANY (IMPLICITO)
:():
NOMBRADA:
SINTAXIS:
IP ACCESS-LIST EXTENDED (NOMBRE)
CONDICION PROTOCOLO (ORIGEN WILD) (DESTINO WILD) EQ (PUERTO)
EXIT

EJEMPLO:
IP ACCESS-LIST EXTENDED JUANA2
PERMIT TCP 192.168.0.0 0.0.0.255 ANY EQ 80
DENY IP ANY ANY (IMPLICITO)
EXIT

EJEMPLO2:
IP ACCESS-LIST EXTENDED JUANA2
DENY TCP 192.168.0.0 0.0.0.255 ANY EQ 80
PERMIT IP ANY ANY (IMPLÍCITO)
APLICACION DE LA ACL:

STANDARD: SE APLICA LO MAS CERCA AL DESTINO POSIBLE


EXTENDED: SE APLICA LO MAS CERCA AL ORIGEN POSIBLE

SINTAXIS PARA LA APLICACION:


INTERFACE TIPO (NUMERO)
IP ACCESS-GROUP (#/NOMBRE) (IN/OUT)
EXIT

EJEMPLO:
INTER FAST0/0
IP ACCESS-GROUP 1 OUT
EXIT
——

CONFIGURAR UNA RUTA POR DEFECTO Y LA REDISTRIBUYO EN OSPF:


R2
IP ROUTE 0.0.0.0 0.0.0.0 SER0/0/1

ROUTER OSPF 1
DEFAULT-INFORMATION ORIGINATE
EXIT
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::.

NAT: NETWORK ADDRESS TRANSLATION


TRADUCE DIRECCIONES PRIVADAS A PUBLICAS Y VICEVERSA.

IPV4: 0.0.0.0 RFC1918


255.255.255.255 DIRECCIONES PRIVADAS

CLASE A 00000000 /8 0.0.0.0 10.0.0.0/8


127.255.255.255 10.255.255.255

CLASE B 10000000 /16 128.0.0.0 172.16.0.0/12


191.255.255.255 172.31.255.255

CLASE C 11000000 /24 192.0.0.0 192.168.0.0/16


223.255.255.255 192.168.255.255

CLASE D 11100000 224.0.0.0


MULTICAST 239.255.255.255

CLASE E 11110000 240.0.0.0


EXPERIMENTALES 255.255.255.255

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::
DIRECCIONAMIENTO PUBLICO:
IANA:
RIR: REGISTROS REGIONALES DE INTERNET
ISP: INTERNET SERVICE PROVIDER

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:::
TERMINOLOGIA DE NAT:

LOCAL INTERNA : 192.168.0.12


GLOBAL INTERNA: 186.15.109.247
GLOBAL EXTERNA: 8.8.8.8
LOCAL EXTERNA : 8.8.8.8

LOCAL: PRIVADA
GLOBAL: PUBLICA
INTERNA: MI RED
EXTERNA: RED DESTINO

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::::
TIPOS DE NAT:

NAT ESTATICA: TRADUCE DE UNA PRIVADA A UNA PUBLICA (DE 1 A 1)

SINTAXIS: PRIVADA PUBLICA


IP NAT INSIDE SOURCE STATIC (LOCAL INTERNA) (GLOBAL INTERNA)
EJEMPLO:
IP NAT INSIDE SOURCE STATIC 172.16.0.254 209.165.200.254

APLICACION:
INTER FAST0/0
IP NAT INSIDE
EXIT
INTER SER0/0/1
IP NAT OUTSIDE
EXIT

PARA VERIFICAR:
DEBUG IP NAT

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
CONFIGURAR RUTA ESTATICA DE VUELTA EN ISP:

IP ROUTE 209.165.200.254 255.255.255.255 SER0/0/1

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONFIGURACION DE NAT DINAMICO:

TRADUCE DE VARIAS PRIVADAS A VARIAS PUBLICAS PRESTADAS:

1 PASO: CONFIGURAR EL POOL CON LAS PUBLICAS:

SINTAXIS:
IP NAT POOL (NOMBRE) (1ª UTILIZABLE) (ULT UTILIZABLE) NETMASK (MASCARA)

EJEMPLO:
IP NAT POOL CCNA 209.165.200.241 209.165.200.246 NETMASK 255.255.255.248

-------------------------------------------------------------------------
2 PASO: CONFIGURAR UNA ACL CON LAS PRIVADAS:

STANDAR NUMERADA:
ACCESS-LIST 1 PERMIT 192.168.10.0 0.0.0.255
ACCESS-LIST 1 PERMIT 192.168.11.0 0.0.0.255

STANDAR NOMBRADA:
IP ACCESS-LIST STANDARD NAT
PERMIT 192.168.10.0 0.0.0.255
PERMIT 192.168.11.0 0.0.0.255
EXIT

EXTENDIDA NUMERADA:
ACCESS-LIST 100 PERMIT IP 192.168.10.0 0.0.0.255 ANY
ACCESS-LIST 100 PERMIT IP 192.168.11.0 0.0.0.255 ANY

EXTENDIDA NOMBRADA:
IP ACESS-LIST EXTENDED NAT2
PERMIT IP 192.168.10.0 0.0.0.255 ANY
PERMIT IP 192.168.11.0 0.0.0.255 ANY
EXIT

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

3 PASO: CREAR ENLACE ENTRE EL POOL Y LA ACL.


SINTAXIS:
IP NAT INSIDE SOURCE LIST (#/NOMBRE) POOL (NOMBRE)

EJEMPLO:
IP NAT INSIDE SOURCE LIST 1 POOL CCNA

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

4 PASO: APLICAR EN INTERFACES

INTER SER0/0/0
IP NAT INSIDE
EXIT
INTER SER0/0/1
IP NAT OUTSIDE
EXIT

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

RESUMEN DE NAT DINAMICO:

R2(BORDE)

IP NAT POOL CCNA 209.165.200.241 209.165.200.246 NETMASK 255.255.255.248

ACCESS-LIST 1 PERMIT 192.168.10.0 0.0.0.255


ACCESS-LIST 1 PERMIT 192.168.11.0 0.0.0.255

IP NAT INSIDE SOURCE LIST 1 POOL CCNA

INTER SER0/0/0
IP NAT INSIDE
EXIT
INTER SER0/0/1
IP NAT OUTSIDE
EXIT

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONFIGURAR LA RUTA ESTATICA DE VUELTA EN EL ISP:

209.165.200.241 .11110001
209.165.200.242 .11110110
209.165.200.243 /29
209.165.200.244 .11110000
209.165.200.245 .240
209.165.200.246

IP ROUTE 209.165.200.240 255.255.255.248 SER0/0/1

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
BORRAR UN NAT:

NO IP NAT INSIDE SOURCE LIST 1 POOL CCNA

NO IP NAT POOL CCNA 209.165.200.241 209.165.200.246 NETMASK 255.255.255.248

NOTA: PARA BORRAR UN POOL PRIMERO SE DEBE BORRAR EL LINK.


:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

NATEO DINAMICO CON SOBRECARGA:


NAT PAT: PORT ADDRESS TRANSLATION
TRADUCE DE 1 O MUY POCAS PUBLICAS A MUCHAS PRIVADAS.

IP NAT POOL CCNA 209.165.200.241 209.165.200.242 NETMASK 255.255.255.252

ACCESS-LIST 1 PERMIT 192.168.10.0 0.0.0.255


ACCESS-LIST 1 PERMIT 192.168.11.0 0.0.0.255

IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD

INTER SER0/0/0
IP NAT INSIDE
EXIT
INTER SER0/0/1
IP NAT OUTSIDE
EXIT

TRABAJA CON DIFERENTE SOCKET: LA UNION DE LA IP Y EL PUERTO.

SHOW IP NAT TRANSLATIONS


:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

NAT PAT: SIN POOL

ACCESS-LIST 1 PERMIT 192.168.10.0 0.0.0.255


ACCESS-LIST 1 PERMIT 192.168.11.0 0.0.0.255

IP NAT INSIDE SOURCE LIST 1 INTER SER0/0/1 OVERLOAD

INTER SER0/0/0
IP NAT INSIDE
EXIT
INTER SER0/0/1
IP NAT OUTSIDE
EXIT

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::.

FULL MESH: MALLA COMPLETA

R1
INTER SER0/0/0
ENCAPSULATION FRAME-RELAY
NO SHUTDOWN
EXIT

INTER SER0/0/0.103 POINT-TO-POINT


IP ADD 10.0.0.1 255.255.255.252
FRAME-RELAY INTERFACE-DLCI 103
EXIT

INTER SER0/0/0.102 POINT-TO-POINT


IP ADD 10.0.0.9 255.255.255.252
FRAME-RELAY INTERFACE-DLCI 102
EXIT

------------------------------------------
R2

INTER SER0/0/0
ENCAPSULATION FRAME-RELAY
NO SHUTDOWN
EXIT

INTER SER0/0/0.203 POINT-TO-POINT


IP ADD 10.0.0.5 255.255.255.252
FRAME-RELAY INTERFACE-DLCI 203
EXIT

INTER SER0/0/0.201 POINT-TO-POINT


IP ADD 10.0.0.10 255.255.255.252
FRAME-RELAY INTERFACE-DLCI 201
EXIT

------------------------------------------------

R3
INTER SER0/0/0
ENCAPSULATION FRAME-RELAY
NO SHUTDOWN
EXIT

INTER SER0/0/0.301 POINT-TO-POINT


IP ADD 10.0.0.2 255.255.255.252
FRAME-RELAY INTERFACE-DLCI 301
EXIT

INTER SER0/0/0.302 POINT-TO-POINT


IP ADD 10.0.0.6 255.255.255.252
FRAME-RELAY INTERFACE-DLCI 302
EXIT

You might also like