Beruflich Dokumente
Kultur Dokumente
Se asigna IP al servidor:
Se activa el TFTP
Se entra Al SW
Switch(config)#
Switch(config)#int vlan 1
Switch(config-if)#no sh
Switch#sh flash
Directory of flash:/
1 -rw- 4414921 <no date> c2960-lanbase-mz.122-25.FX.bin ----el sistema operativo
Writing c2960-lanbase-mz.122-25.FX.bin.....
Switch#delete c2960-lanbase-mz.122-25.FX.bin
Delete filename [c2960-lanbase-mz.122-25.FX.bin]?
Delete flash:/c2960-lanbase-mz.122-25.FX.bin? [confirm]
Se reinicia equipo
Switch(config)#do reload
Se activa IPV6
Switch(config)#sdm prefer ?
default Default bias
dual-ipv4-and-ipv6 Support both IPv4 and IPv6
lanbase-routing Lanbase routing
qos Qos bias
Switch(config)#sdm prefer dual-ipv4-and-ipv6 default
Changes to the running SDM preferences have been stored, but cannot take effect until the next
reload.
Use 'show sdm prefer' to see what SDM preference is currently active.
Switch(config)#
Switch(config)# do wr
Switch(config)#do reload
Se pone el nombre
Switch>en
Switch(config)#hostname SW1-Rk1-Piso1
SW1-Rk1-Piso1(config)#do WR
Building configuration...
[OK]
*****Uso privado*****
SW1-Rk1-Piso1(config)#line console 0
SW1-Rk1-Piso1(config-line)#password cisco
SW1-Rk1-Piso1(config-line)#do wr
SW1-Rk1-Piso1(config)#service password-encryption
SW1-Rk1-Piso1(config)#
SW1-Rk1-Piso1(config)#int
SW1-Rk1-Piso1(config)#interface vlan1
SW1-Rk1-Piso1(config-if)#ipv6 add 2001:DB8:CAFE::2/64
SW1-Rk1-Piso1(config-if)#ipv6 add fe80::2 link-local
SW1-Rk1-Piso1(config-if)#do wr
SW1-Rk1-Piso1#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
SW1-Rk1-Piso1(config)#line vty 0 1
SW1-Rk1-Piso1(config-line)#password cisco
SW1-Rk1-Piso1(config-line)#login
SW1-Rk1-Piso1(config-line)#transport input telnet
SW1-Rk1-Piso1(config-line)#do wr
Building configuration...
[OK]
SW1-Rk1-Piso1(config-line)#
**********************************************************************
**********************************************************************
**********************************************************************
SW1-Rk1-Piso2#conf ter
SW1-Rk1-Piso2(config)#ip domain-name www.cisco.com
SW1-Rk1-Piso2(config)#ip default-gateway 192.168.10.1
SW1-Rk1-Piso2(config)#crypto key generate rsa
The name for the keys will be: SW1-Rk1-Piso2.www.cisco.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
W1-Rk1-Piso2#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
SW1-Rk1-Piso2(config)#username ral privilege 15 password cisco
SW1-Rk1-Piso2(config)#username damian privilege 15 password cisco
SW1-Rk1-Piso2(config)#do wr
**********************************
SW1-Rk1-Piso2(config)#
SW1-Rk1-Piso2(config)#line vty 0
SW1-Rk1-Piso2(config-line)#^Z
SW1-Rk1-Piso2#
SW1-Rk1-Piso2#conf ter
SW1-Rk1-Piso2(config)#crypto key generate rsa
% You already have RSA keys defined named SW1-Rk1-Piso2.www.cisco.com .
% Do you really want to replace them? [yes/no]: no
SW1-Rk1-Piso2(config)#
SW1-Rk1-Piso2(config)#line vty 0
SW1-Rk1-Piso2(config-line)#login local
SW1-Rk1-Piso2(config-line)#transport input all
SW1-Rk1-Piso2(config-line)#do wr
W1-Rk1-Piso2#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
SW1-Rk1-Piso2(config)#line console 0
SW1-Rk1-Piso2(config-line)#login local
SW1-Rk1-Piso2(config-line)#do wr
Building configuration...
[OK]
se borra el telnet
C:\>telnet 192.168.0.3
Trying 192.168.0.3 ...
% Connection timed out; remote host not responding
:\>ssh -l damian 192.168.10.3
Password:
*****Uso privado*****
SW1-Rk1-Piso2#
SW1-Rk1-Piso1(config)#int f0/1
SW1-Rk1-Piso1(config-if)#switchport mode access
SW1-Rk1-Piso1(config-if)#
SW1-Rk1-Piso1(config-if)#do sh int f0/1 sw
*********************
se shutea si se conecta otro equipo
SW1-Rk1-Piso1(config)#int f0/1
SW1-Rk1-Piso1(config-if)# switchport mode access
SW1-Rk1-Piso1(config-if)#switchport port-security maximum 1
SW1-Rk1-Piso1(config-if)#switchport port-security violation ?
protect Security violation protect mode
restrict Security violation restrict mode
shutdown Security violation shutdown mode
SW1-Rk1-Piso1#
SW1-Rk1-Piso1#ping 192.168.10.10
Radios en el SW 1 IEEE802.1X
Se va al SW
SW1-Rk1-Piso1(config)#aaa new-model
SW1-Rk1-Piso1(config)#aaa authentication ?
dot1x Set authentication lists for IEEE 802.1x.
enable Set authentication lists for enable.
login Set authentication lists for logins.
ppp Set authentication lists for ppp.
SW1-Rk1-Piso1(config)#aaa authentication dot1x ?
default The default authentication list.
SW1
Switch>en
Switch#confi ter
Switch(config)#vlan 10
Switch(config-vlan)#name compras
Switch(config-if-range)#int g0/1
Switch(config-if)#sw mode trunk
Switch(config-if)#switchport trunk allowed vlan 10,20,30,100,200
*********************************************
SW2 INTERMEDIO
Switch(config-vlan)#int g0/1
Switch(config-if)#sw mode trunk
Switch(config-if)#switchport trunk native vlan 200
Switch(config)#vlan 10
Switch(config-vlan)#vlan 20
Switch(config-vlan)#vlan 30
Switch(config-vlan)#vlan 10
Switch(config-vlan)#vlan 100
Switch(config-vlan)#vlan 200
*****************************
Router capa3
Router(config)#int g0/0/0.10
Router(config-subif)#encapsulation dot1Q 10
Router(config-subif)#ip address 192.168.10.1 255.255.255.0