Вы находитесь на странице: 1из 27

Configuración inicial del router

Router>ena
Router#conf
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#line console 0
Router(config-line)#pass letmein
Router(config-line)#login
Router(config-line)#exit
Router(config)#enable pass cisco ->no se encripta la contraseña
Router(config)#enable sec itsasecret -> se encripta la contraseña EXEC privilegiado
Router(config)#banner motd
Router(config)#banner motd "Unauthorized access is strictly prohibited"
Router(config)#service password-encryption
Router(config)#host R1
R1#copy running-config startup-config

Conexión de un router a una red LAN


R1#conf t R2#conf t
Enter configuration commands, one per Enter configuration commands, one per
line. End with CNTL/Z. line. End with CNTL/Z.
R1(config)#inter giga0/0 R2(config)#inter giga0/0
R1(config-if)#ip add 192.168.10.1 R2(config-if)#ip add 10.1.1.1
255.255.255.0 255.255.255.0
R1(config-if)#no shu R2(config-if)#no shu
R1(config-if)# R2(config-if)#
R1(config-if)#inter giga0/1 R2(config-if)#inter giga0/1
R1(config-if)#ip add 192.168.11.1 R2(config-if)#ip add 10.1.2.1
255.255.255.0 255.255.255.0
R1(config-if)#no shu R2(config-if)#no shu
R1(config-if)# R2(config-if)#
R1(config-if)#inter se0/0/0 R2(config-if)#exit
R1(config-if)#ip add 209.165.200.225 R2(config)#inter s0/0/0
255.255.255.252 R2(config-if)#ip add 209.165.200.226
R1(config-if)#clock rate 64000 255.255.255.252
R1(config-if)#no shu R2(config-if)#no shu
R1(config-if)#exit R2(config-if)#end
R1(config)# R2#copy running-config startup-config
R1(config)#cop
R1(config)#ex
R1#copy running-config startup-config
Solución de problemas relacionados con gateways
predeterminados

S1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
S1(config)#ip de
S1(config)#ip default-gateway 192.168.10.1
S1(config)#exit
S1#copy ru
S1#copy running-config s
S1#copy running-config startup-config

S2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
S2(config)#inter vlan 1
S2(config-if)#ip add 192.168.11.2 255.255.255.0
S2(config-if)#
S2(config-if)#exit
S2(config)#
S2(config)#exit
S2#copy ru
S2#copy running-config st
S2#copy running-config startup-config
Reto de habilidades de integración

Router>ena
Router#show ru
Router#conf t
Router(config)#host Floor14
Floor14(config)#line console 0
Floor14(config-line)#pass cisco
Floor14(config-line)#login
Floor14(config-line)#exit
Floor14(config)#line vty 0 15
Floor14(config-line)#pass cisco
Floor14(config-line)#login Room-146(config-line)#pass cisco
Floor14(config-line)#exit Room-146(config-line)#login
Floor14(config)#ena sec class Room-146(config-line)#
Floor14(config)#service pas Room-146(config-line)#exit
Floor14(config)#service password- Room-146(config)#ena sec class
encryption Room-146(config)#service
Floor14(config)#ban Room-146(config)#service p
Floor14(config)#banner mo Room-146(config)#service password-
Floor14(config)#banner motd "Hola" encryption
Floor14(config)#inter g0/0 Room-146(config)#ba
Floor14(config-if)#ip add 172.14.5.1 Room-146(config)#banner mo
255.255.255.0 Room-146(config)#banner motd "Hola"
Floor14(config-if)#no shu Room-146(config)#
Floor14(config-if)# Room-146(config)#ip default-gateway
Floor14(config-if)#inter g0/1 172.14.10.1
Floor14(config-if)#ip add 172.14.10.1 Room-146(config)#exit
255.255.255.0 Room-146#
Floor14(config-if)#no shu Room-146#conf t
Floor14(config-if)# Enter configuration commands, one per
Floor14(config-if)#exit line. End with CNTL/Z.
Floor14(config)#exit Room-146(config)#inter vlan 1
Floor14# Room-146(config-if)#ip add 172.14.10.35
Floor14#copy running-config startup- 255.255.255.0
config Room-146(config-if)#no shu
Room-146(config-if)#exit
Switch>ena Room-146(config)#exit
Switch#conf t Room-146#copy running-config startup-
Switch(config)#host Room-146 config
Room-146(config)#line console 0
Room-146(config-line)#pass cisco
Room-146(config-line)#login
Room-146(config-line)#exit
Room-146(config)#line vty 0 15
Subnetting Escenario 1 (Cuando se hace subnetting
la porción de hosts más grande para comenzar)

2^3= 8 Subredes
2^5= 32 Hosts para cada subred
192.168.100.0/27 Subred 0
192.168.100.32/27 Subred 1
192.168.100.64/27 Subred 2
192.168.100.96/27 Subred 3
192.168.100.128/27 Subred 4

R1>ena
R1#conf t
R1(config)#inter giga0/0
R1(config-if)#ip add 192.168.100.1
255.255.255.224
R1(config-if)#no shu
R1(config-if)#
R1(config-if)#inter giga0/1
R1(config-if)#ip add 192.168.100.33
255.255.255.224
R1(config-if)#no shu

S3>ena
S3#conf t
S3(config)#inter vlan1
S3(config-if)#ip add 192.168.100.66
255.255.255.224
S3(config-if)#no shu
S3(config-if)#exit
S3(config)#
S3(config)#ip de
S3(config)#ip default-gateway
192.168.100.65
Subnetting Escenario 2

2^4= 16 Subredes
2^4=16 Hosts
172.31.1.0/28
172.31.1.16/28
172.31.1.32/28
172.31.1.48/28
172.31.1.64/28
172.31.1.80/28
172.31.1.96/28

R1>ena S3>ena
R1#conf t S3#show ru
R1(config)#inter giga0/0 S3#conf t
R1(config-if)#ip add 172.31.1.1 S3(config)#inter vlan1
255.255.255.240 S3(config-if)#ip add 172.31.1.34
R1(config-if)#no shu 255.255.255.240
R1(config-if)# S3(config-if)#no shu
R1(config-if)# S3(config-if)#
R1(config-if)#exit S3(config-if)#exit
R1(config)# S3(config)#ip de
R1(config)#inter se0/0/0 S3(config)#ip default-gateway
R1(config-if)#ip add 172.31.1.65 172.31.1.33
255.255.255.240
R1(config-if)#no shu
R1(config-if)#
R1(config-if)#clock rate 64000
R1(config-if)#exit

R2>ena
R2#conf t
R2(config)#inter gig0/0
R2(config-if)#ip add 172.31.1.17
255.255.255.240
R2(config-if)#no shu
Diseño e implementación de un esquema de
direccionamiento VLSM

58 hosts= 2^6=64 host y 2^2=4 SR


29 hosts= 2^5=32 host y 2^3=8 SR
15 hosts= 2^5=32 host y 2^3=8 SR
7 hosts= 2^4=16 host y 2^4=16 SR
2 hosts= 2^2=4 host y 2^6=64 SR

Building1>ena
Building1#conf t
Building1(config)#inter giga0/1
Building1(config-if)#ip add 192.168.72.0/26
192.168.72.97 255.255.255.224
192.168.72.64/27
Building1(config-if)#no shu
Building1(config-if)#inter giga0/0 192.168.72.96/27
Building1(config-if)#ip add
192.168.72.129 255.255.255.240 192.168.72.128/28
Building1(config-if)#no shu 192.168.72.144/30
ASW-3>ena 192.168.72.148/
ASW-3#conf t
ASW-3(config)#inter vlan1
ASW-3(config-if)#ip add 192.168.72.66
255.255.255.224
ASW-3(config-if)#no shu
ASW-3(config-if)#
ASW-3(config-if)#exit
ASW-3(config)#
ASW-3(config)#ip de
ASW-3(config)#ip default-gateway
192.168.72.65
Skills Integration Challenge

Switch>ena Room-146(config-line)#pass xAw6k


Switch#conf t Room-146(config-line)#login
Enter configuration commands, one per Room-146(config-line)#ena se 6EBUp
line. End with CNTL/Z. Room-146(config)#servi
Switch(config)#host Room-145 Room-146(config)#service a
Room-145(config)#line console 0 Room-146(config)#service pa
Room-145(config-line)#pass xAw6k Room-146(config)#service password-
Room-145(config-line)#login encryption
Room-145(config-line)#line vty 0 15 Room-146(config)#banner motd
Room-145(config-line)#pass xAw6k "warning"
Room-145(config-line)#login Room-146#copy
Room-145(config-line)# Room-146#copy r
Room-145(config-line)#exit Room-146#copy running-config st
Room-145(config)#enable sec 6EBUp Room-146#copy running-config startup-
Room-145(config)#service pa config
Room-145(config)#service password- Room-146#
encryption Room-146#conf t
Room-145(config)#banner Motd Room-146(config)#inter vlan1
"warning" Room-146(config-if)#ip add
Room-145(config)#inter vlan1 128.107.20.15 255.255.255.0
Room-145(config-if)#ip add Room-146(config-if)#no shu
128.107.20.10 255.255.255.0
Room-145(config-if)#no shu
Room-145(config-if)#
Room-145(config-if)#end
Room-145#copy ru
Room-145#copy running-config st
Room-145#copy running-config startup-
config

Switch>ena
Switch#conf t
Switch(config)#host Room-146
Room-146(config)#line console 0
Room-146(config-line)#pass xAw6k
Room-146(config-line)#login
Room-146(config-line)#line vty 0 15
Configuring SSH
Packet Tracer PC Command Line 1.0
C:\>telnet 10.10.10.2
Trying 10.10.10.2 ...Open

User Access Verification

Password: S1#
S1>ena S1#exit
Password: C:\>telnet 10.10.10.2
Password: Trying 10.10.10.2 ...Open
S1#copy
S1#copy ru [Connection to 10.10.10.2 closed by
S1#copy running-config s foreign host]
S1#copy running-config startup-config C:\>telnet 10.10.10.2
Destination filename [startup-config]? Trying 10.10.10.2 ...Open
Building configuration...
[OK] C:\>ssh -l administrator 10.10.10.2
S1#conf t Open
S1(config)#service pas Password:
S1(config)#service password-encryption
S1(config)#ip dom S1>ena
S1(config)#ip domain- Password:
S1(config)#ip domain-n Password:
S1(config)#ip domain-name netacad.pka Password:
S1(config)#crypto key generate rsa S1#
The name for the keys will be:
S1.netacad.pka
Choose the size of the key modulus in the
range of 360 to 2048 for your
General Purpose Keys. Choosing a key
modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]:


1024
% Generating 1024 bit RSA keys, keys
will be non-exportable...[OK]

S1(config)#username administrator pass


cisco
S1(config)#line vty 0 15
S1(config-line)#login local
S1(config-line)#transport input ssh
S1(config-line)#no pas cisco
S1(config-line)#end
Configuring IPv4 Static and Default Routes

Se puede configurar de diferentes maneras


1)
R1>ena
R1#conf t
R1(config)#ip route 172.31.0.0 255.255.255.0 172.31.1.193
R1(config)#ip route 172.31.1.128 255.255.255.192 172.31.1.193
R1(config)#ip route 172.31.1.196 255.255.255.252 172.31.1.193
R2>ena
R2#conf t
R2(config)#ip route 172.31.1.0 255.255.255.128 s0/0/0
R2(config)#ip route 172.31.1.128 255.255.255.192 s0/0/1
R3>ena
R3#conf t
R3(config)#ip route 0.0.0.0 0.0.0.0 172.31.1.197 -> Ruta predeterminada o por defecto
2)
R1>ena
R1#conf t
R1(config)#ip route 172.31.0.0 255.255.255.0 Serial0/0/0
R1(config)#ip route 172.31.1.128 255.255.255.192 Serial0/0/0
R2>ena
R2#conf t
R2(config)#ip route 172.31.1.0 255.255.255.128 Serial0/0/0
R2(config)#ip route 172.31.1.128 255.255.255.192 Serial0/0/1
R3>ena
R3#conf t
R3(config)# ip route 172.31.0.0 255.255.255.0 Serial0/0/1
R3(config)# ip route 172.31.1.0 255.255.255.128 Serial0/0/1
Designing and Implementing a VLSM Addressing Scheme

Remote-Site1(config)#inter g0/0
Remote-Site1(config-if)#no shu
Remote-Site1(config-if)#ip add
172.31.103.1 255.255.255.224
Remote-Site1(config-if)#exit
Remote-Site1(config)#
Remote-Site1(config)#inter g0/1
Remote-Site1(config-if)#ip add
172.31.103.33 255.255.255.224
Remote-Site1(config-if)#no shu

Sw3(config)#inter vlan1
Sw3(config-if)#ip add 172.31.103.66 255.255.255.240
Sw3(config-if)#no shu
Sw3(config-if)#
Sw3(config-if)#exit
Sw3(config)#ip default-gateway 172.31.103.65

27 hosts= 2^5=32 host y 2^3=8 SR


25 hosts= 2^5=32 host y 2^3=8 SR
14 hosts= 2^4=16 host y 2^4=16 SR
14 hosts= 2^4=16 host y 2^4=16 SR
2 hosts= 2^2=4 host y 2^6=32 SR

172.31.103.0/27
172.31.103.32/27
172.31.103.64/28
172.31.103.80/28
172.31.103.96/30
172.31.103.100/30
Configuring IPv4 Route Summarization - Scenario 1

Para hacer rutas sumarizadas se


deben escoger las redes que estén
en el mismo segmento o en la
misma red.
172.22.1.128
172.22.1.160
172.22.1.10000000
172.22.1.10100000
172.22.1.128/26
255.255.255.192

172.31.157.0
172.31.157.96
172.31.157.64

172.31.157.00000000
172.31.157.01100000
172.31.157.01000000
---------------------------
172.31.157.0/25

255.255.255.128

R1(config)#ip route 172.22.1.128 255.255.255.192 172.31.157.98


R3(config)#ip route 172.31.157.0 255.255.255.128 s0/0/1
Configuring IPv4 Route Summarization - Scenario 2

HQ
172.22.64.0
172.22.66.0
172.22.01000000.0
172.22.01000010.0
------------------------
172.22.64.0/22
255.255.252.0
B1
172.22.70.0
172.22.70.128 HQ(config)#ip route 172.22.70.0
172.22.70.00000000 255.255.255.0 Serial0/0/0
172.22.70.10000000 HQ(config)#ip route 172.22.68.0
------------------------- 255.255.254.0 172.22.71.6
172.22.70.0/24 Branch1(config)#ip route 198.0.0.0
255.255.255.0 255.255.255.252 Serial0/0/0
Branch1(config)#ip route 172.22.71.4
B2 255.255.255.252 Serial0/0/0
172.22.68.0 Branch1(config)#ip route 172.22.64.0
172.22.69.0 255.255.252.0 172.22.71.1
Branch1(config)#ip route 172.22.68.0
172.22.01000100.0 255.255.254.0 172.22.71.1
172.22.01000101.0
----------------------- Branch2(config)#ip route 198.0.0.0
255.255.255.252 Serial0/0/1
172.22.68.0/23
Branch2(config)#ip route 172.22.71.0
255.255.254.0
255.255.255.252 Serial0/0/1
ISP Branch2(config)#ip route 172.22.70.0
255.255.255.0 Serial0/0/1
172.22.64.0 Branch2(config)#ip route 172.22.64.0
172.22.70.0 255.255.252.0 172.22.71.5
172.22.68.0
ISP(config)#ip route 172.22.64.0
172.22.01000000.0 255.255.248.0 198.0.0.2
172.22.01000110.0
172.22.01000100.0
-----------------------
172.22.64.0/21
255.255.248.0
Configuring a Floating Static
Route
Una ruta estática flotante que se utiliza
como ruta de respaldo. Esta ruta tiene una
distancia administrativa configurada
manualmente mayor que la de la ruta
principal y, por lo tanto, no aparece en la
tabla de routing hasta que la ruta principal
falla.
Edge_Router(config)# ip route 0.0.0.0 0.0.0.0 s0/0/0
Edge_Router(config)# ip route 0.0.0.0 0.0.0.0 s0/0/1 5

Configuring RIPv2

R1(config)#router rip
R1(config-router)#version 2
R1(config-router)#net 192.168.1.0
R1(config-router)#net 192.168.2.0
R1(config-router)#net 64.100.0.0
R1(config-router)#no auto-summary
R1(config-router)#default-information
originate
R1(config-router)#passive-interface g0/0
R1(config-router)#exit
R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/1

R2(config)#router rip R3(config)#router rip


R2(config-router)#ve 2 R3(config-router)#v 2
R2(config-router)#net 192.168.2.0 R3(config-router)#net 192.168.4.0
R2(config-router)#net 192.168.4.0 R3(config-router)#net 192.168.5.0
R2(config-router)#net 192.168.3.0 R3(config-router)#no aut
R2(config-router)#no auto R3(config-router)#no auto-summary
R2(config-router)#no auto-summary R3(config-router)#def
R2(config-router)#def R3(config-router)#default-information o
R2(config-router)#default-information or R3(config-router)#default-information
R2(config-router)#default-information originate
originate R3(config-router)#pas
R2(config-router)#pass R3(config-router)#passive-interface g0/0
R2(config-router)#passive-interface g0/0
Configuring Basic EIGRP with IPv4

R1(config)#router eigrp 1
R1(config-router)#net 172.16.1.0
0.0.0.255
R1(config-router)#net 192.168.10.4
0.0.0.3
R1(config-router)#net 172.16.3.0 0.0.0.3
R1(config-router)#no auto-summary
R1(config-router)#passive-interface g0/0

R2(config)#router eigrp 1 R3(config)#router eigrp 1


R2(config-router)#net 172.16.2.0 R3(config-router)#net 192.168.1.0
0.0.0.255 0.0.0.255
R2(config-router)#net 172.16.3.0 0.0.0.3 R3(config-router)#net 192.168.10.4
R2(config-router)#net 192.168.10.8 0.0.0.3
0.0.0.3 R3(config-router)#net 192.168.10.8
R2(config-router)#no auto-summary 0.0.0.3
R2(config-router)#passive-interface g0/0 R2(config-router)#no auto-summary
R3(config-router)#passive-interface g0/0

Configuring OSPFv2 in a Single Area


R1(config)#router ospf 10
R1(config-router)#router-id 1.1.1.1
R1(config-router)#net 172.16.1.0
0.0.0.255 area 0
R1(config-router)#net 172.16.3.0 0.0.0.3
area 0
R1(config-router)#net 192.168.10.4
0.0.0.3 area 0
R1(config-router)#passive-interface g0/0
R3(config)#router ospf 10
R2(config)#router ospf 10 R3(config-router)#router-id 3.3.3.3
R2(config-router)#router-id 2.2.2.2 R3(config-router)#net 192.168.1.0
R2(config-router)#net 172.16.2.0 0.0.0.255 area 0
0.0.0.255 area 0 R3(config-router)#net 192.168.10.8
R2(config-router)#net 172.16.3.0 0.0.0.3 0.0.0.3 area 0
area 0 R3(config-router)#net 192.168.10.4
R2(config-router)#net 192.168.10.8 0.0.0.3 area 0
0.0.0.3 area 0 R3(config-router)#passive-interface g0/0
R2(config-router)#passive-interface g0/0
Configuring PAP and CHAP Authentication
1) PAP

R1(config)# interface s0/0/0


R1(config-if)# encapsulation ppp
R1(config)# username R3 secret class
R1(config)# interface s0/0/0
R1(config-if)# ppp authentication pap
R1(config-if)# ppp pap sent-username
R1 password cisco

R2(config)# interface s0/0/1


R2(config-if)# encapsulation ppp
R2(config-if)# username R3 secret class
R2(config)# interface s0/0/1
R2(config-if)# ppp authentication pap
R2(config-if)# ppp pap sent-username R2 password cisco

R3(config)# interface s0/0/0


R3(config-if)# encapsulation ppp
R3(config)# interface s0/0/1
R3(config-if)# encapsulation ppp
R3(config)# interface s0/1/0
R3(config-if)# encapsulation ppp
R3(config-if)# username R2 secret cisco
R3(config)# interface s0/0/1
R3(config-if)# ppp authentication pap
R3(config-if)# ppp pap sent-username R3 password class

Router(config)# interface s0/0/0


Router(config-if)# encapsulation ppp

2) CHAD

Router(config)# hostname ISP


ISP(config)# username R3 secret cisco
ISP(config)# interface s0/0/0
ISP(config-if)# ppp authentication chap

R3(config)# username ISP secret cisco


R3(config)# interface serial0/1/0
R3(config-if)# ppp authentication chap
Configuring Standard ACLs
The following network policies are implemented on R2:

 The 192.168.11.0/24 network is not allowed access to the WebServer on the


192.168.20.0/24 network.
 All other access is permitted.

R2(config)#access-list 1 deny 192.168.11.0 0.0.0.255


R2(config)#access-list 1 permit any
R2(config)#inter g0/0
R2(config-if)#ip access-group 1 out

The following network policies are implemented on R3:


 The 192.168.10.0/24 network is not allowed to communicate to the
192.168.30.0/24 network.
 All other access is permitted.

R3(config)#access-list 1 deny 192.168.10.0 0.0.0.255


R3(config)#access-list 1 permit any
R3(config)#inter giga 0/0
R3(config-if)#ip access-group 1 out
Configuring Named Standard ACLs
The senior network administrator has tasked you to create a standard named ACL to prevent
access to a file server. All clients from one network and one specific workstation from a different
network should be denied access.

R1(config)#ip access-list standard File_Server_Restrictions


R1(config-std-nacl)#10 pe
R1(config-std-nacl)#10 permit hos
R1(config-std-nacl)#10 permit host 192.168.20.4
R1(config-std-nacl)#20 deny any
R1(config-std-nacl)#inter f0/1
R1(config-if)#ip acc
R1(config-if)#ip access-group File_Server_Restrictions out
Configuring Extended ACLs - Scenario 1
1) Notice that we could filter just for PC1 by using the host keyword or we could
allow any host. In this case, any device is allowed that has an address belonging to the
172.22.34.64/27 network. Enter the network address, followed by a question mark.

Notice that one of the options is <cr> (carriage return). In other words, you can
press Enter and the statement would permit all TCP traffic. However, we are only permitting
FTP traffic; therefore, enter theeq keyword, followed by a question mark to display the
available options. Then, enter ftp and pressEnter.

R1(config)#access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 eq ftp


R1(config)#access-list 100 permit icmp 172.22.34.64 0.0.0.31 host 172.22.34.62
R1(config)#inter giga 0/0
R1(config-if)#ip acc
R1(config-if)#ip access-group 100 in
2) Configure an ACL to permit HTTP access and ICMP.
You can configure named standard and extended ACLs. This access list filters both source and
destination IP addresses; therefore, it must be extended. Enter HTTP_ONLY as the name. (For
Packet Tracer scoring, the name is case-sensitive.)

The prompt changes. You are now in extended named ACL configuration mode. All devices on
the PC2LAN need TCP access. Enter the network address, followed by a question mark.

R1(config)#ip access-list extended HTTP_ONLY


R1(config-ext-nacl)#10 permit tcp 172.22.34.96 0.0.0.15 host 172.22.34.62 eq www
R1(config-ext-nacl)#10 permit icmp 172.22.34.96 0.0.0.15 host 172.22.34.62
R1(config-ext-nacl)#inter g0/1
R1(config-if)#ip acc
R1(config-if)#ip access-group HTTP_ONLY in
Configuring Extended ACLs - Scenario 3
Configure a Named Extended ACL
Use one named ACL to implement the following policy:
 Block HTTP and HTTPS access from PC1 to Server1 and Server2. The servers are
inside the cloud and you only know their IP addresses.
 Block FTP access from PC2 to Server1 and Server2.
 Block ICMP access from PC3 to Server1 and Server2.

Permit all other IP traffic.


By default, an access list denies all traffic that does not match any rule in the list. What
command permits all other traffic?

RT1(config)#ip access-list extended ACL


RT1(config-ext-nacl)#deny tcp host 172.31.1.101 host 64.101.255.254 eq 80
RT1(config-ext-nacl)#deny tcp host 172.31.1.101 host 64.101.255.254 eq 443
RT1(config-ext-nacl)#deny tcp host 172.31.1.101 host 64.103.255.254 eq 80
RT1(config-ext-nacl)#deny tcp host 172.31.1.101 host 64.103.255.254 eq 443
RT1(config-ext-nacl)#deny tcp host 172.31.1.102 host 64.101.255.254 eq ftp
RT1(config-ext-nacl)#deny tcp host 172.31.1.102 host 64.103.255.254 eq ftp
RT1(config-ext-nacl)#deny icmp host 172.31.1.103 host 64.101.255.254
RT1(config-ext-nacl)#deny icmp host 172.31.1.103 host 64.103.255.254
RT1(config-ext-nacl)#permit ip any any
RT1(config-ext-nacl)#inter g0/0
RT1(config-if)#ip access-group ACL in
Configuring Switch Port Security
S1(config)#inter range f0/1-2
S1(config-if-range)#sw port-security (Puertos de Seguridad)
S1(config-if-range)#sw port-security maximum 1 (1-132)
S1(config-if-range)#sw port-security mac-address sticky (la Mac se pone automáticamente
o también se lo coloca manualmente)
S1(config-if-range)#sw port-security violation restrict
protect Security violation protect mode
restrict Security violation restrict mode
shutdown Security violation shutdown mode
S1(config-if-range)#exit
S1(config)#inter range f0/3-24
S1(config-if-range)#shu
S1(config-if-range)#inter range giga 0/1-2
S1(config-if-range)#shu
S1(config-if-range)#shutdown
Configuring VLANs
S1(config)#name S3(config-vlan)#name
S1(config)#vlan 10 Management&Native
S1(config-vlan)#name Faculty/Staff S3(config-vlan)#exit
S1(config-vlan)#vlan 20 S3(config)#
S1(config-vlan)#name Students S3(config)#inte f0/11
S1(config-vlan)#vlan 30 S3(config-if)#sw ac
S1(config-vlan)#name Guest(Default) S3(config-if)#sw access vlan 10
S1(config-vlan)#vlan 99 S3(config-if)#sw mode acc
S1(config-vlan)#name S3(config-if)#inte f0/18
Management&Native S3(config-if)#sw acc vlan 20
S3(config-if)#sw mode acc
S3(config-if)#inte f0/6
S2(config)#vlan 10 S3(config-if)#sw acc vlan 30
S2(config-vlan)#name Faculty/Staff S3(config-if)#sw mode ac
S2(config-vlan)#vlan 20
S2(config-vlan)#name Students
S2(config-vlan)#vlan 30
S2(config-vlan)#name Guest(Default)
S2(config-vlan)#vlan 99
S2(config-vlan)#name
Management&Native
S2(config-vlan)#exit
S2(config)#inter f0/11
S2(config-if)#
S2(config-if)#sw acc
S2(config-if)#sw access vlan 10
S2(config-if)#sw mode
S2(config-if)#sw mode ac
S2(config-if)#sw mode access
S2(config-if)#inter f0/18
S2(config-if)#sw access vlan 20
S2(config-if)#sw mode access
S2(config-if)#inter f0/6
S2(config-if)#sw access vlan 30
S2(config-if)#sw mode access

S3(config)#vlan 10
S3(config-vlan)#name Faculty/Staff
S3(config-vlan)#vlan 20
S3(config-vlan)#name Students
S3(config-vlan)#vlan 30
S3(config-vlan)#name Guest(Default)
S3(config-vlan)#vlan 99
Configuring Trunks
S1(config)#inter range g0/1-2
S1(config-if-range)#swit
S1(config-if-range)#switchport mode tru
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk native vlan
99
S1(config-if-range)#switchport trunk allowed
vlan 10,20,30,99
S2(config)#inter g0/1
S2(config-if)#switchport trunk native vlan 99
S2(config-if-range)#switchport trunk allowed
vlan 10,20,30,99

S3(config)#inter g0/2
S3(config-if)#switchport trunk native vlan 99
S3(config-if-range)#switchport trunk allowed vlan 10,20,30,99

Configuring Router-on-a-Stick Inter-VLAN Routing


S1(config)#vlan 10 R1(config)#inter giga 0/0.30
S1(config-vlan)#name VLAN0010 R1(config-subif)#encapsulation dot1Q 30
S1(config)#vlan 30 R1(config-subif)#ip add 172.17.30.1
S1(config-vlan)#name VLAN0030 255.255.255.0
S1(config)#inter f0/11
S1(config-if)#sw mode acc
S1(config-if)#switc
S1(config-if)#switchport acc
S1(config-if)#switchport access vlan 10
S1(config-if)#inter f0/6
S1(config-if)#sw mode acc
S1(config-if)#switchport access vlan 30
S1(config)#inter g0/1
S1(config-if)#sw mode tru
S1(config-if)#sw mode trunk

R1(config)#inter giga 0/0


R1(config-if)#no shu
R1(config)#inter giga 0/0.10
R1(config-subif)#encapsulation dot1Q 10
R1(config-subif)#ip add 172.17.10.1
255.255.255.0
Configuring Basic OSPFv3 in a Single Area
R1(config)#ipv6 unicast-routing
R1(config)#ipv6 router ospf 10
R1(config-rtr)#router-id 1.1.1.1
R1(config-rtr)#exit
R1(config)#inter gi0/0
R1(config-if)#ipv6 ospf 10 area 0
R1(config-if)#inter s0/0/0
R1(config-if)#ipv6 ospf 10 area 0
R1(config-if)#inter s0/0/1
R1(config-if)#ipv6 ospf 10 area 0

R2(config)#ipv6 unicast-routing
R2(config)#ipv6 router ospf 10
R2(config-rtr)#router
R2(config-rtr)#router-id 2.2.2.2
R2(config-rtr)#end
R2#clear ipv6 ospf process
R2#conft
R2(config)#inter g0/0
R2(config-if)#ipv6 os
R2(config-if)#ipv6 ospf 10 area 0
R2(config-if)#inter s0/0/0
R2(config-if)#ipv6 ospf 10 area 0
R2(config-if)#inter s0/0/1
R2(config-if)#ipv6 ospf 10 area 0

R3(config)#ipv6 unicast-routing
R3(config)#ipv6 router ospf 10
R3(config-rtr)#router-id 3.3.3.3
R3(config-rtr)#exit
R3(config)#inter g0/0
R3(config-if)#ipv6 ospf 10 area 0
R3(config-if)#inter s0/0/0
R3(config-if)#ipv6 ospf 10 area 0
R3(config-if)#inter s0/0/1
R3(config-if)#ipv6 ospf 10 area 0
Configuring DHCP Using Cisco IOS
R2(config)#ip dhcp excluded-address 192.168.10.1 192.168.10.10
R2(config)#ip dhcp excluded-address 192.168.30.1 192.168.30.10
R2(config)#ip dhcp pool R1-LAN
R2(dhcp-config)#net 192.168.10.0 255.255.255.0
R2(dhcp-config)#default-router 192.168.10.1
R2(dhcp-config)#dns-server 192.168.20.254
R2(dhcp-config)#exi
R2(config)#ip dhcp pool R3-LAN
R2(dhcp-config)#net 192.168.30.0 255.255.255.0
R2(dhcp-config)#default-router 192.168.30.1
R2(dhcp-config)#dns-server 192.168.20.254
R2(dhcp-config)#exit
R2(config)#inter g0/1
R2(config-if)#ip add dhcp
R2(config-if)#no shu
R2(config-if)#no shutdown

R1#conf t
R1(config)#inter g0/0
R1(config-if)#ip helper-address 10.1.1.2
R3#conf t
R3(config)#inter gi0/0
R3(config-if)#ip helper-address 10.2.2.2
Configuring GRE
RA(config)#inter tunnel 0
RA(config-if)#ip add 10.10.10.1 255.255.255.252
RA(config-if)#tunnel source s0/0/0
RA(config-if)#tunnel destination 209.165.122.2
RA(config-if)#
RA(config-if)#tunnel mode gre ip
RA(config-if)#no shu
RA(config-if)#no shutdown
RA(config-if)#exit
RA(config)#ip route 192.168.2.0 255.255.255.0 10.10.10.2

RB(config)#inter tunnel 0
RB(config-if)#ip add 10.10.10.2 255.255.255.252
RB(config-if)#tunnel source s0/0/0
RB(config-if)#tunnel destination 64.103.211.2
RB(config-if)#tunnel mode gre ip
RB(config-if)#no sh
RB(config-if)#exit
RB(config)#ip route 192.168.1.0 255.255.255.0 10.10.10.1

Вам также может понравиться