Friday, May 7, 2010

how to set topology vlan 99





















Learning Objectives
Establish console connection to switch.
Configure hostname and VLAN99.
Configure the clock.
Modify the history buffer.
Configure passwords and console/Telnet access.
Configure login banners.
Configure the router.
Configure the boot sequence.
Solve duplex and speed mismatch.
Manage the MAC address table.
Configure port security.
Secure unused ports.
Manage the switch configuration file.

Connect a console cable to S1.
For this activity, direct access to S1 Config and CLI tabs is disabled. You must establish a console session through PC1. Connect a console cable from PC1 to S1.
Establish a terminal session.
From PC1, open a Terminal window and use the default Terminal Configuration. You should now have access to the CLI for S1.
Switch>enable
Switch#config term
Switch(config)#hostname S1
S1(config)#int fa0/1
S1(config-if)#switchport mode access
S1(config-if)#switchport access vlan 99
S1(config-if)#exit
S1(config)#interface vlan99
S1(config-if)#ip address 172.17.99.11 255.255.255.0
S1(config-if)#no sh
S1(config-if)#exit
S1(config)#ip default-gateway 172.17.99.1
S1(config)#line console 0
S1(config-line)#history size 50
S1(config-line)#line vty 0 15
S1(config-line)#history size 50
S1(config-line)#exit
S1(config)#enable secret class
S1(config)#line console 0
S1(config-line)#password cisco
S1(config-line)#login
S1(config-line)#line vty 0 15
S1(config-line)#password cisco
S1(config-line)#login
S1(config-line)#exit
S1(config)#service password-encryption
S1(config)#banner motd &Authorized Access Only&
S1#show flas
Directory of flash:/

1 -rw- 4414921 c2960-lanbase-mz.122-25.FX.bin
3 -rw- 4670455 c2960-lanbase-mz.122-25.SEE1.bin
2 -rw- 616 vlan.dat

32514048 bytes total (23428056 bytes free)
S1#config term
S1(config)#interface fa 0/18
S1(config-if)#speed 100
S1(config-if)#duplex full
S1#config
S1(config)#mac-address-table static 0060.3ee6.1659 vlan 99 int fa 0/18
S1(config)#int fa0/18
S1(config-if)#switchport port-security maximum 1
S1(config-if)#switchport port-security violation shutdown
S1(config)#int fa 0/18
S1(config-if)#exit
S1(config)#int range fa0/2 - 4
S1(config-if-range)#shutdown
S1(config-if-range)#int range gi 1/1 - 2
S1(config-if-range)#shutdown
S1(config-if-range)#end
S1#config term
S1(config)#int fa 0/24
S1(config-if)#speed 100
S1(config-if)#duplex full

Configure the Router
Configure the router with the same basic commands you used on S1.
Routers and switches share many of the same commands. Access the CLI for R1 by clicking the device. Do the following on R1:
Configure the hostname.
Set the history buffer to 50 for both console and vty.
Configure the encrypted form of the privileged EXEC mode password and set the password to class.
Set the console and vty password to cisco and require users to log in.
Encrypt the console and vty passwords.
Configure the message-of-the-day as Authorized Access Only.
Move the console cable to reconnect PC1 to S1.

Router>ena
Router#conf term
Router(config)#hostname R1
R1(config)#line console 0
R1(config-line)#history size 50
R1(config-line)#line vty 0 4
R1(config-line)#history size 50
R1(config-line)#exit
R1(config)#enable secret class
R1(config)#line console 0
R1(config-line)#password cisco
R1(config-line)#login
R1(config-line)#line vty 0 4
R1(config-line)#password cisco
R1(config-line)#login
R1(config-line)#exit
R1(config)#banner motd &Authorized Access Ony&
R1(config)#service password-encryption
R1(config)#banner motd &Authorized Access Only&
R1(config)#exit
R1#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
R1#

0 komentar:

Post a Comment

 
Trends K N A Copyright © 2009
Fresh Girly Blogger Template Designed by Herro | Powered By Blogger