Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Cisco Switching Black Book - Sean Odom, Hanson Nottingham.pdf
Скачиваний:
87
Добавлен:
24.05.2014
Размер:
2.89 Mб
Скачать

The auto syntax allows the port to autonegotiate the port speed. On an Ethernet or Fast Ethernet interface, use the command

set port duplex mod_num/port_num {full|half|auto}

to set the port duplex mode. Again, the auto syntax can be used to allow the port to autonegotiate the duplex mode.

Port Security

You can use port security to block a NIC on an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different than the MAC addresses specified to access that port. There must be at least one default MAC address per port for the port to be secured. The total number of MAC addresses on any port cannot exceed 1,025. You must also follow other guidelines when configuring port security:

You cannot configure port security on a trunk port.

Port security is not supported on the three−port Gigabit Ethernet module.

You cannot enable port security on a Switched Port Analyzer (SPAN) destination or source port.

You cannot configure dynamic, static, or permanent CAM entries for a secure port.

When port security on a port is enabled, any static or dynamic CAM entries associated with the port are cleared. Any currently configured permanent CAM entries are treated as secure.

Manually Configured MAC Addresses

Different IP addresses can be assigned to the virtual VLAN interfaces on the device; all of them utilize the same global MAC address. However, specifying an individual MAC address to each interface does have benefits in some situations. Assigning an individual MAC address to each interface offers these two main benefits:

Allows the best use of Fast EtherChannel for load distribution

Enhanced management with the use of the Multilayer Switching (MLS) cache

Determining the Slot Number in Which a Module Resides

To determine the slot number in which a module or card resides, use the following steps:

1. On the switch console, enter the enable command and the password to enter Privileged mode:

Coriolis5000# enable

Password: ********

Coriolis5000>(enable)

2. Enter the show module command to determine what cards are present:

Coriolis5000>(enable)

show module

 

 

 

Mod Module−Name Ports

Module−Type

Model

Serial−Num Status

——— ——————————— —————

———————————————

——————

————————

————

1

0

Supervisor III

WS−X5530

010854649

ok

2

24

10/10ObaseTX Ethernet

WS−X5225R

012453433

ok

3

1

Route Switch

M−X5302

007673460

ok

Mod MAC−Address(es)

Hw

Fw

Sw

 

123

——

—————————————————————————————————————— ———

———

————

1

00−40−0b−80−54−00 to 00−40−0b−80−57−fi 2.0

3.1.2

4.3(la)

2

00−40−0b−03−5d−58 to 00−40−0b−03−5d−6f 3.1

4.3(l)

4.3(la)

3

00−43−0d−91−45−66 to 00−43−0d−91−dc−67 5.0

20.14

11.3(6)WAA4(9)

Mod Sub−Type Sub−Model

Sub−Serial Sub−Hw

 

 

———

———————— —————————

—————————— ——————

 

 

1

NFFC II WS−F5531

0036457641

 

 

Accessing the Internal Route Processor from the Switch

The session command, followed by the slot number on the switch in which the internal routing processor module resides, allows you to access the module from the switch’s CLI. You can then end the session by using the exit command. Let’s take a look at an example of accessing the internal route processor:

Seans5002> (enable) session 15

Trying Router−15…

Connected to Router−15.

Escape character is '^]’.

User Access Verification

Password:

RSFC1>exit

Seans5002> (enable)

Let’s take a look at this process from the initial User EXEC mode prompt:

1. On the switch console, enter the enable command and the password to enter Privileged mode:

Coriolis5000# enable Password: ********

Coriolis5000>(enable)

2. To open a session from the console port for the RSM, use the following command:

Coriolis5000> session 3

∙ The prompt will look like this if it is the initial configuration:

Router>

Configuring a Hostname on the RSM

To configure the hostname on an RSM, follow these steps:

1. On the switch console, enter the enable command and the password to enter Privileged mode:

Coriolis5000# enable Password: ********

Coriolis5000>(enable)

2. To open a session from the console port for the RSM, use the following command:

Coriolis5000> session 3

The prompt will look like this if it is the initial configuration:

124

Router>

3. Enter Global Configuration mode with the following commands:

Router> enable

Router# configure terminal

Warning When you make changes in this mode, they must be saved to NVRAM. Otherwise, the next time you recycle the switch, the changes will be lost. The command to save changes is copy running−config startup−config.

4. Assign the RSM a unique hostname with the following command. Call it RSM1:

Router>(config)# hostname RSM1

RSM1>(config)#

Tip

The hostname can be up to 255 characters, using alphanumeric characters only. Although in this

 

example we use uppercase to identify the hostname, in some instances when you connect to the

 

switch with different software, the hostname may appear in lowercase.

Assigning an IP Address and Encapsulation Type to an Ethernet Interface

To assign an IP address and a trunking encapsulation type to an Ethernet interface so interVLAN routing can take place, follow these steps:

1.To enter Interface Configuration mode for Ethernet on the subinterface that needs to be configured, enter the following command in Global Configuration mode:

Catalyst5000(config)#interface ethernet 3/1.2

In this example, 3 indicates the module number/slot number, 1 indicates the port number, and 2 indicates the number of the subinterface to be configured.

Note No changes take effect until the no shutdown command is issued.

2.Once in Interface Configuration mode, you can configure the port for the encapsulation type and identify the VLAN number that will be carried by the port. The most common encapsulation type is ISL; this will be the encapsulation type configured in our example. Configure the interface for VLAN 2. Each VLAN packet destined for a non−local network is tagged with a VLAN ID within the packet header, to help identify the VLAN to the subinterface:

Coriolis5000(config−if)#encapsulation isl 2

3.Assign the subinterface its own unique IP address and subnet mask. To do this, use the following commands followed by a no shutdown command to apply the changes and exit:

Coriolis5000(config−if)#ip address 130.77.20.18 255.255.254.0

Coriolis5000(config−if)#no shutdown

Coriolis5000(config−if)#exit

Setting the Port Speed and Port Name on an Ethernet Interface

Here is an example of setting the port speed and port name:

Coriolis5000> (enable) set port speed 2/3 auto

Port 2/3 speed set to auto detect.

Coriolis5000> (enable) set port name 2/3 VLAN 1 FileServer1

Port 2/3 name set.

Coriolis5000> (enable) show port 2/3

Port Name Status Vlan Level Duplex Speed Type

125

———— ——————————— ———————— ———— ————— —————— ————— ——————

2/3 FileServer1 connect 1 normal a−half a−100 10/100BaseTX

Configuring a Default Gateway on a Catalyst 5000

Before IP management from another subnet or network can take place through Telnet, the sending device must know the routers that are connected to the local network to forward data for destinations outside the local network. Just as an end−user interface needs to have a defined default gateway, a switch needs to know the address of the interface of the route processor connected to the local subnet.

To define the gateway, in Global Configuration mode use the following command combined with the route processor or router IP address that is acting as the default gateway for the network:

Coriolis5000(config)# ip default−gateway 130.77.20.1

Verifying the IP Configuration on a Catalyst 5000

You can verify the IP configuration of the switch by using the show ip command:

Coriolis5000#show ip

IP Address: 130.77.20.15

Subnet Mask: 255.255.254.0

Default Gateway: 130.77.20.1

Management VLAN: 1

Domain name: coriolis.com

Name server 1: 130.77.17.190

Name server 2: 130.77.16.191

HM server : Enabled

HTTP port : 80

RIP : enabled

Enabling RIP on an RSM

To assign an IP routing protocol and network number, perform the following steps:

1.Assign a routing protocol (RIP) to the RSM. To do this, use the following commands in Global Configuration mode:

RSM1(config)#ip routing

RSM1(config)#router rip

2.Assign a network number to the route processor on the RSM by using the network command followed by the network number just as you would use with an external Cisco router’s interface:

RSM1(config−router)#network 172.16.0.0

3. Assign a VLAN to an IP address:

RSM1(config−router)#interface vlan 100

RSM1(config−if)#ip address 172.16.1.1 255.255.255.0

RSM1(config−if)#^Z

RSM1#

126

Соседние файлы в предмете Программирование