1 / 18

Cisco Networking Academy

Cisco Networking Academy. Semester 3 Basic 1900 Switch Configuration. Basic 1900 Switch Configuration.  On the Catalyst 1900 switch, three different configuration methods exist: • Menu-driven interface from the console port • Web-based Visual Switch Manager (VSM)

ikenneth
Download Presentation

Cisco Networking Academy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cisco Networking Academy Semester 3 Basic 1900 Switch Configuration

  2. Basic 1900 Switch Configuration On the Catalyst 1900 switch, three different configuration methods exist: • Menu-driven interface from the console port • Web-based Visual Switch Manager (VSM) • IOS command-line interface (CLI) • Telnet to the switch.

  3. Default 1900 Configuration • IP address: 0.0.0.0 • CDP: Enabled • Switching mode: Fragment Free • 100BaseT port: Auto-negotiate duplex mode • 10BaseT port: Half duplex • Spanning Tree: Enabled • Console password: None

  4. Numbering Ports (Interfaces)

  5. Catalyst 1900 Switch Various Configuration Modes • > User Mode • # Privileged Mode • (Config)# Global Configuration Mode. • (Config-if)# Interface, or Port Configuration Mode

  6. Basic IP and Port Duplex Configuration Use the hostname command

  7. Varifying IP Configuration and Duplex Setting

  8. Varifying IP Settings and Duplex Continued

  9. Viewing and Configuring Entries in The MAC Address Table • Dynamic addresses—MAC addresses added to the MAC address table via normal bridge/switch processing. In other words, when a frame is received, the source MAC of the frame is associated with the incoming port/interface. These entries in the table time out with disuse and are cleared whenever the entire table is cleared. • Permanent MAC addresses—Via configuration, a MAC address is associated with a port, just as it would have been associated as a dynamic address. However, permanent entries in the table never time out. • Restricted-static entries—Via configuration, a MAC address is configured to be associated only with a particular port, with an additional restriction: Frames destined to that MAC address must have entered via a particular set of incoming ports.

  10. MAC Address Table Manipulation-Sample Network • Catalyst 1900 stores up to 1024 entries in the MAC address table. • If all the entries are filled, the switch will flush the table and relearn the addresses. • The company controller server is a popular server and its MAC address should remain in the switch’s table at all times. • The Payroll server is also on this switch and only the company controller is allowed access.

  11. MAC Address Table Manipulation Command Description

  12. Port Security Configuration

  13. Port Security Configuration Commands

  14. Interpreting Port Security Configuration Commands • The port secure max-mac-count 3command means that a total of three addresses can be learned on this port. • The first two addresses learned, in addition to the permanent address that is configured, are considered to be sticky-learned. • These two addresses are considered to be static, so that if someone came along and plugged into the finance hub, the switch would not add that hacker’s MAC address to the MAC address table.

  15. Verifying Port Security Configuration

  16. Address violation Configuration Commands • 3 Possible action for a port Address Violation: • Suspend. • Disable. • Ignore. • Use the address-violation global configuration command to specify the action for a port address violation. The syntax for this command is as follows: address-violation {suspend | disable | ignore} • Use the no address-violation command to set the switch to its default value, which is suspend.

  17. Managing Configuration and System Files Routers VS. Switches • Switch does not actually run IOS—it has many features like IOS, including the IOS CLI, but there are and probably always will be some differences. • When the configuration is changed, running-config is modified, but the startup-config file in NVRAM is automatically updated. In other words, there is no need for a copy running-config startup-config command on the 1900 family of switches. • Configuration files can be copied to an external TFTP server, but instead of the keyword startup-config, NVRAM is used. • (copy nvram tftp://10.1.1.1/mybackup.cfg.)

  18. IOS CLI Differences: Router Versus 1900 Switch

More Related