cisco Àåºñ ±âº» ¸í·É¾î
http://ehostidc.co.kr/center/EH050402.php?no=379753&page=1&choose=&ke¡¦ (482)https://blog.naver.com/goethe1/221551923794 (543)
Router> <---160;유1200;모드 기본1201;1064; 확1064;1012; 위한 명/161;Ǻ12;실행 show.. Router> enable Router# <---160;프리ǧ16;리1648;모드 유1200;모드+160;1200;1109;,삭1228;가 가능 Router# configure terminal Router(config)# <---160;글/196;벌 컨피그 모드 라우터,160;스위치 1204;체에 영향1012; 0120;치lj16; 명/161;Ǻ12; Router(config)# interface fa0/0 Router(config-if)# <---160;1064;터6168;1060;스모드 각각1032; 세ǥ12;기관1032; 구성 interface,line,routing,dhcp,nat መ1;1012; 구성할 수 1080;다. | #160;0176;너 구성Ȣ16;기160;!!!! login160;/196;그1064;시 motd160;1217;속과 ᇼ1;시에 TEST123(config)# banner motd ! 0176;너1032; 처1020;과 -149;1012; 표시할 ǐ12; Ǹ16;lj16; 1076;1032;1032; 문1088;160;-> "!". ! ====================== HELLO EVERYONE ====================== ! TEST123(config)# |
라우터를 위한160;telnet160;구성Ȣ16;기 enable password160;를 구성해 1452;Ǻ12;야한다. TEST(config)#160;enable password160;cisco 원ᅄ1;1217;속1012; 위한 터0120;널1012; 구성해야한다. TEST(config)# line vty 0 4 (최대160;5명) TEST(config-line)# password160;test TEST(config-line)# login TEST# show run (1648;금까1648; 1089;업확1064;) 보안성1012; 강화Ȣ16;기 위한 0169;법 1. cisco(config)# service password-encryption enable password 7 060506324F41 구성값 내ǥ12;1032; 모든160;password160;를 ǹ16;호화한다. 1076;시/196; 사용추천.160;1109;기1201;1004;/196; 1204;혀 안1204;Ȣ16;1648; 않다. 2. enable secret password cisco(config)# enable secret hyunseok cisco# show ip int brief (포트별 아1060;피와 연결확1064;) | 라우터 설1221; 1200;1109; 0169;법. 라우터1032; 구성 값(running-config)1012;160;nvram160;에 1200;1109;Ȣ16;고, tftp서버(192.168.2.101)160;에도 1200;1109;Ȣ16;라. sol.) HYUNSEOK# copy run start160;(run파1068;160;start/196; 1200;1109;) Destination filename [startup-config]? Building configuration... [OK] HYUNSEOK# wr160;<- copy run start160;와 같다 Building configuration... [OK] HYUNSEOK# copy run tftp: Address or name of remote host []? 192.168.2.101 (tftp160;아1060;피1452;소 1077;/141;) Destination filename [hyundai-confg]? |
DHCP160;구성Ȣ16;기 R1(config)# ip dhcp excluded-address 192.168.1.17 192.168.1.19 R1(config)# R1(config)# ip dhcp pool TEST1 R1(dhcp-config)# network 192.168.1.16 /28 R1(dhcp-config)# lease 0 6 30 R1(dhcp-config)# default-router 192.168.1.30 R1(dhcp-config)#160;dns-server 168.126.63.1 8.8.8.8 R1(dhcp-config)# domain-name skbroadband.com R1(dhcp-config)# exit R1(config)# R1(config)# int fa0/0 R1(config-if)# ip add 192.168.1.30 255.255.255.240 R1(config-if)# no sh R1(config-if)# | 해석 R1(config)# ip dhcp excluded-address [ip] [ip] 해NJ17; 구역1032;160;ip를 1228;외시킴. R1(config)# R1(config)# ip dhcp pool [Name]160;풀 1060;름 1648;1221; R1(dhcp-config)# network [ip]/[prefix]160;네트워크1452;소 R1(dhcp-config)# lease160;1068; 시간 ǥ16; R1(dhcp-config)# default-router [ip]160;기본 ,172;1060;트웨1060; R1(dhcp-config)# dns-server [ip] dns160;서버아1060;피 R1(dhcp-config)# domain-name [도메1064;1060;름] R1(dhcp-config)# exit R1(config)# R1(config)# int fa0/0 R1(config-if)# ip add [ip] [subnet mask] D.G.를 1077;/141; R1(config-if)# no sh [활성화] R1(config-if)# |
라우터에서160;SSH160;구성Ȣ16;기 R1(config)# ip domain-name test.com R1(config)# username user1 secret user1 R1(config)# crypto key generate rsa general-keys modulus 1024 The name for the keys will be: R1.test.com % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be non-export able...[OK] R1(config)# line vty 0 19 R1(config-line)# login local R1(config-line)# transport input ssh R1(config-line)# | 해석 R1(config)# ip domain-name [도메1064;1060;름] R1(config)# username [ID] secret [password] R1(config)# crypto key generate rsa general-keys modulus160;[512160;R11;160;2048] [사용Ȣ16;lj16; 유1200;1221;보를 ǹ16;호화 Ȣ16;lj16; 0169;법] The name for the keys will be: R1.test.com % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be non-export able...[OK] R1(config)# line vty 0 19 R1(config-line)# login local [1221;해놓1008; 유1200;1221;보 물Ǻ12;봄] R1(config-line)# transport input ssh ssh1004;/196;만 1217;속가능 |
VLAN(Virtual Local Area Network) SW1(config)# vlan 10 SW1(config-vlan)#160;name160;SALES SW1(config-vlan)# SW1(config-vlan)# vlan 20 SW1(config-vlan)# name ENG SW1(config-vlan)# SW1(config-vlan)# vlan 30 SW1(config-vlan)#160;no vlan 30 SW1(config)# SW1(config)# int e1/2 SW1(config-if)# switchport mode access SW1(config-if)# switchport access vlan 10 SW1(config-if)# SW1(config)# int e1/3 SW1(config-if)# switchport mode access SW1(config-if)# switchport access vlan 10 SW1(config-if)# SW1(config-if)# int160;range160;e2/0 - 1 SW1(config-if-range)# sw mode acc SW1(config-if-range)# sw acc vlan 20 SW1(config-if-range)# | <-- vlan 10160;생성 <-- vlan 10160;1032; 1060;름 변ᅆ1; <-- vlan 30160;생성 <-- vlan 30160;삭1228; <-- e1/2160;/196; 1652;1077; <--160;1060; 포트lj16; 액세스포트1060;다 <-- vlan 10160;에 access160;한다 <-- e2/0160;ǥ12;터 e2/1160;까1648; ᇼ1;시에 설1221; <-- e2/0,e2/1160;.168; 다 액세스포트1060;다 <-- e2/0,e2/1160;.168; 다 vlan 20에 액세스 |
스위치 포트에서 트/105;크 설1221; Ȣ16;lj16; 0169;법. SW2(config)# int e0/1 (라우터와 연결.108; 포트) SW2(config-if)# sw trunk encap dot1q SW2(config-if)# sw mode trunk | 라우터에서160;Vlan160;연결 ,172;1060;트웨1060; 설1221; 0169;법 R1(config)# int f0/1 R1(config-if)# no sh R1(config)# int f0/1.10(101008; Vlan에 맞춰서 함.) R1(config-subif)# encapsulation dot1q 10(Vlan160;번호) R1(config-subif)#ip add [vlan D.G. ip] [subneting] |
vtp domain160;설1221;Ȣ16;기 SW1(config)# vtp domain TEST (sw11008; 기본160;vtp모드가160;sever/196; 1648;1221;.120;.) | vtp mode160;1312;1221; SW2(config)# vtp mode client (sw2를 클라1060;Ǻ16;트/196; 1648;1221;.) |
STP160;ᅆ1;/196; 1312;1221; SW1(config)# spanning-tree vlan 10 root primary (루트브ና1;1648;/196; 설1221;) SW2(config)# spanning-tree vlan 10 root secondary (.160;번1704; 루트/196; 1648;1221;) | |
[STP설1221; 확1064;] SW1(config)# spanning-tree mode rapid-pvst |
1064;터넷 연결 가능 0169;법(NAT구성) R_HY(config)# ip nat inside source list 1 int fa0/0 overload R_HY(config)# access-list 1 per any R_HY(config)# R_HY(config)# int fa0/0 R_HY(config-if)# ip nat outside R_HY(config-if)# R_HY(config-if)# int fa0/1 R_HY(config-if)# ip nat inside | telnet160;구성 enable password / enable secret(패스워드1648;1221;) virtual terminal160;구성 R_HY(config)#line vty login160;or160;login local login160;1060;라면 R_HY(config-line)# line vty 0 4 R_HY(config-line)# password cisco R_HY(config-line)# login login local160;1060;라면 R_HY(config-line)# line vty 0 4 R_HY(config-line)# login local R_HY(config-)# username [ID] password [P/W] |
native vlan160;설1221;Ȣ16;기 SW(config)# int range e0/1 , e1/0 SW(config-if-range)# sw tr all vlan 10,20,999 SW(config-if-range)# sw tr nat vlan 444 SW(config-if-range)# SW(config)# int fa0/1.444 SW(config-if)# encapsulation dot1Q 444 native | native160;설1221;Ȣ16;기 R1-SW1160;간에lj16;160;native vlan160;문1228;가 0156;생할 ,163;1060;다.따라서160;R1에서도160;native vlan160;1012;160;SW와 ᇼ1;1068;한160;vlan1004;/196; 1648;1221;해 1452;Ǻ12;야한다. ->160;실1228; 통신에 1060;용한 1064;터6168;1060;스가 아니므/196;160;IP160;1452;소를 1077;/141;해 .168; 필요lj16; 없다. |
Active Standby160;설1221;Ȣ16;기 SW1 <<-- vlan 10 : Active/ vlan20 : Standby int vlan 10 standby 10 ip 172.16.1.254 standby 10 priority 110 standby 10 preempt standby 10 track e0/0 20 ! int vlan 20 standby 20 ip 172.16.2.254 standby 20 preempt ! | SW2 <<-- vlan 20 : Active/ vlan10 : Standby int vlan 20 standby 20 ip 172.16.2.254 standby 20 priority 110 standby 20 preempt standby 20 track e0/0 20 ! int vlan 10 standby 10 ip 172.16.1.254 standby 10 preempt ! |
CDP160;확1064;0169;법 # show cdp neighbor # show cdp neighbor detail | <--160;연결포트,기1333;,IOS <--160;추가1201;1004;/196;160;IP1452;소도 확1064;가능 |
1060;더채널 구성Ȣ16;기 SW1,2에서 int range e1/1 - 2 channel-group 1 mode active exit int port-channel 1 switchport trunk encapsulation dot1q switchport mode trunk SW1(config)# int range e1/1 - 2 SW1(config-if-range)# switchport trunk encapsulation dot1q SW1(config-if-range)# switchport mode trunk SW1(config-if-range)# channel-group 1 mode active SW1(config-if-range)# exit SW1(config)# int port-channel 1 SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode trunk SW1(config-if)# | |
[확1064;0169;법] # show int trunk # show int port-channel 1 BW160;ǥ12;ǥ16;1012; 확1064;Ȣ16;세요!!! # show spanning-tree vlan 1160;Ȣ16;여160;blocking port160;찾1004;세요 # debug spanning-tree event [STP에서1032; 상태변화확1064;] |
|