一、CAT4006引擎模块WS-X4013的 配置 清单 (其中包括:基本设置、VLAN的 配置 、通道 配置 、以及端口镜像口的1/2设置连接千兆IDS) Cisco Systems, Inc. Console Enter password: CAT4006> enable Enter password: CAT40 06> (enable) ....... ...........
一、CAT4006引擎模块WS-X4013的配置清单(其中包括:基本设置、VLAN的配置、通道配置、以及端口镜像口的1/2设置连接千兆IDS)
Cisco Systems, Inc. Console
Enter password:
CAT4006> enable
Enter password:
CAT40
06> (enable)
.......
..................
..................
....................
....................
..
begin
!
# ***** NON-DEFAULT CONFIGURATION *****
!
!
#time: Mon Apr 11 2005, 22:02:13
!
#version 6.1(1)
!
!
#system web interface version(s)
set password *********************
set enablepass *********************
!
#test
!
#system
set system name CAT4006
!
#frame distribution method
set port channel all distribution mac both
!
#vtp
set vtp domain hngazk
set vlan 1 name default type ethernet mtu 1500 said 100001 state active
set vlan 16 name Old_Bangong type ethernet mtu 1500 said 100016 state active
set vlan 17 name Server_Manage type ethernet mtu 1500 said 100017 state active
set vlan 18 name New_Bangong type ethernet mtu 1500 said 100018 state active
set vlan 19 name Library type ethernet mtu 1500 said 100019 state active
set vlan 20 name New_Shiyanzhongxin type ethernet mtu 1500 said 100020 state active
set vlan 22 name Old_Shiyanzhongxin type ethernet mtu 1500 said 100022 state active
set vlan 23 name CaiZhuan_Jiashuyuan type ethernet mtu 1500 said 100023 state active
set vlan 1002 name fddi-default type fddi mtu 1500 said 101002 state active
set vlan 1004 name fddinet-default type fddinet mtu 1500 said 101004 state active stp ieee
set vlan 1005 name trnet-default type trbrf mtu 1500 said 101005 state active stp ibm
set vlan 1003 name token-ring-default type trcrf mtu 1500 said 101003 state active mode srb aremaxhop 0 stemaxhop 0 backupcrf off
!
#ip
set interface sc0 17 21x.xxx.17.253/255.255.255.0 21x.xxx.xxx.255
set interface sl0 down
set interface me1 down
set ip route 0.0.0.0/0.0.0.0 21x.xxx.xxx.254
!
#dns
set ip dns server 21x.xxx.xxx.2 primary
set ip dns enable
!
#syslog
set logging level cops 2 default
!
#set boot command
set boot config-register 0x2
set boot system flash bootflash:cat4000.6-1-1.bin
!
#mls
set mls nde disable
!
#port channel
set port channel 3/1-4 636
!
#module 1 : 2-port 1000BaseX Supervisor
set udld enable 1/1
set trunk 1/1 nonegotiate dot1q 1-1005
set trunk 1/2 nonegotiate dot1q 1-1005
!
#module 2 : 6-port 1000BaseX Ethernet
set vlan 20 2/3
set port name 2/1 Old_Shiyanzhongxin
set port name 2/2 Library
set port name 2/3 New_Shiyanzhongxin
set port name 2/4 New_Bangong
set port name 2/5 CaiZhuan_Jiashuyuan
set port name 2/6 Old_Shiyanzhongxin
set udld enable 2/6
set udld disable 2/3
set trunk 2/1 nonegotiate dot1q 1-1005
set trunk 2/2 nonegotiate dot1q 1-1005
set trunk 2/3 nonegotiate dot1q 1-1005
set trunk 2/4 nonegotiate dot1q 1-1005
set trunk 2/5 nonegotiate dot1q 1-1005
set trunk 2/6 nonegotiate dot1q 1-1005
!
#module 3 : 34-port Router Switch Card
set vlan 16 3/3-9,3/11-19,3/26-34
set vlan 17 3/10,3/20
set vlan 18 3/21
set vlan 19 3/22
set vlan 20 3/23
set vlan 22 3/24
set vlan 23 3/25
set port name 3/1 Firewall_Talent
set trunk 3/1 nonegotiate dot1q 1-1005
set trunk 3/2 nonegotiate dot1q 1-1005
set port channel 3/1-2 mode on
!
#module 4 : 34-port 10/100/1000 Ethernet
set vlan 16 4/5-9,4/11,4/15-34
set vlan 17 4/3-4,4/10,4/12-14
set trunk 4/1 nonegotiate dot1q 1-1005
set trunk 4/2 nonegotiate dot1q 1-1005
!
#module 5 empty
!
#module 6 empty
!
#switch port analyzer
set span 2/1-6,3/1-34,4/1-34 1/2 both inpkts disable learning enable create
end
CAT4006> (enable)
二、WS-X4232-L3三层路由模块的配置清单
(其中包括:VLAN路由、访问控制列表、三层模块与交换机背板通道的配置等等)
WS-X4232-L3#
Using 4055 out of 126968 bytes
!
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname WS-X4232-L3
!
enable secret 5 *****************
enable password **********
!
ip subnet-zero
!
!
!
interface Port-channel1
no ip address
no ip directed-broadcast
hold-queue 300 in
!
interface Port-channel1.1
encapsulation dot1Q 1 native
ip address 10.10.1.254 255.255.255.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface Port-channel1.16
encapsulation dot1Q 16
ip address 21x.xxx.16.254 255.255.255.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface Port-channel1.17
encapsulation dot1Q 17
ip address 21x.xxx.17.254 255.255.255.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface Port-channel1.18
encapsulation dot1Q 18
ip address 21x.xxx.18.254 255.255.255.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface Port-channel1.19
encapsulation dot1Q 19
ip address 21x.xxx.19.254 255.255.255.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface Port-channel1.20
encapsulation dot1Q 20
ip address 21x.xxx.21.254 255.255.254.0 secondary
ip address 21x.xxx.20.254 255.255.254.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface Port-channel1.22
encapsulation dot1Q 22
ip address 21x.xxx.22.254 255.255.255.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface Port-channel1.23
encapsulation dot1Q 23
ip address 21x.xxx.23.254 255.255.255.0
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip directed-broadcast
!
interface FastEthernet1
no ip address
no ip directed-broadcast
shutdown
!
interface GigabitEthernet1
ip address 21x.xxx.xxx.xxx 255.255.255.240
ip access-group 110 in
ip access-group 110 out
no ip directed-broadcast
!
interface GigabitEthernet2
no ip address
no ip directed-broadcast
!
interface GigabitEthernet3
no ip address
no ip directed-broadcast
no negotiation auto
channel-group 1
!
interface GigabitEthernet4
no ip address
no ip directed-broadcast
no negotiation auto
channel-group 1
!
ip classless
ip route 0.0.0.0 0.0.0.0 2xx.xxx.xxx.xxx
!
access-list 110 deny tcp any any eq echo
access-list 110 deny tcp any any eq chargen
access-list 110 deny tcp any any eq 135
access-list 110 deny tcp any any eq 136
access-list 110 deny tcp any any eq 137
access-list 110 deny tcp any any eq 138
access-list 110 deny tcp any any eq 139
access-list 110 deny tcp any any eq 389
access-list 110 deny tcp any any eq 445
access-list 110 deny tcp any any eq 4444
access-list 110 deny udp any any eq tftp
access-list 110 deny udp any any eq 135
access-list 110 deny udp any any eq 136
access-list 110 deny udp any any eq netbios-ns
access-list 110 deny udp any any eq netbios-dgm
access-list 110 deny udp any any eq netbios-ss
access-list 110 deny udp any any eq 389
access-list 110 deny udp any any eq 445
access-list 110 deny udp any any eq 1434
access-list 110 deny udp any any eq 1433
access-list 110 deny udp any any eq 1025
access-list 110 deny udp any any eq 455
access-list 110 deny udp any any eq 5554
access-list 110 deny udp any any eq 9996
access-list 110 deny udp any any eq 6129
access-list 110 deny udp any any eq 3127
access-list 110 deny udp any any eq 2745
access-list 110 deny tcp any any eq 6669
access-list 110 deny tcp any any eq 1023
access-list 110 deny tcp any any eq 1024
access-list 110 deny tcp any any eq 3332
access-list 110 deny tcp any any eq 69
access-list 110 deny udp any any eq 593
access-list 110 deny tcp any any eq 593
access-list 110 permit ip any any
arp 127.0.0.2 0005.5e73.9300 ARPA
!
line con 0
transport input none
line aux 0
line vty 0 4
password **********
login
!
end
WS-X4332-L3#

随着互联网的不断发展和普及,Web应用程序已成为人们日常生活中必不可少的一部分,这也决定了Web应用程序的安全问题非常重要。在Web应用程序中,Cookie被广泛使用来实现用户身份认证等功能,然而Cookie也存在着安全风险,因此在配置Nginx时,必须设定适当的Cookie安全策略,以保证Cookie的安全性。下面是一些在Nginx中配置Cookie安全策

如何配置MySQL连接池的最大连接数?MySQL是一个开源的关系型数据库管理系统,被广泛应用于各种领域的数据存储与管理。在使用MySQL时,我们常常需要使用连接池来管理数据库连接,以提高性能和资源利用率。连接池是一种维护和管理数据库连接的技术,它能够在需要时提供数据库连接,并在不需要时回收连接,从而减少了连接的重复创建和销毁。而连接池的最大连接数则是连接池所

使用GDB调试Linux内核的常用配置技巧引言:在Linux开发中,使用GDB调试内核是一项非常重要的技能。GDB是一款功能强大的调试工具,可以帮助开发者快速定位和解决内核中的bug。本文将介绍一些常用的GDB配置技巧,以及如何使用GDB调试Linux内核。一、配置GDB环境首先,我们需要在Linux系统上配置GDB的环境。请确保你的系统已经安装了GDB工具

Nginx错误页面配置,优雅处理网站故障在现代互联网时代,一个高度稳定和可靠的网站是任何企业或个人追求的目标。然而,由于各种原因,网站可能会经历故障或错误,这可能是由于网络问题、服务器问题或应用程序错误等。为了提供更好的用户体验和优雅地处理任何可能发生的错误,Nginx作为一个强大的Web服务器软件,不仅能够提供高性能的服务,还能够灵活地配置错误页面。在Ng

在Linux服务器上配置防火墙非常重要,它可以有效地保护服务器免受恶意攻击。在Ubuntu操作系统上,我们可以使用UFW防火墙来保护服务器的安全。在本文中,我们将介绍如何使用宝塔面板配置UFW防火墙。第一步:安装宝塔面板首先,我们需要在Ubuntu上安装宝塔面板。您可以在宝塔官网免费下载宝塔面板的安装包,然后在命令行中运行以下命令来安装宝塔面板:$wget

随着云计算、大数据和物联网等技术的日益普及,虚拟化技术成为了当今IT领域的热门话题。虚拟化是通过将一台物理主机划分为多个独立的虚拟机,实现资源的共享和管理的方法。虚拟网络是虚拟化的其中一个重要组成部分,能够满足不同应用之间的网络隔离和互动需求。在本文中,我们将介绍如何使用Linux进行虚拟网络配置。一、Linux虚拟网络的概述在物理网络中,网卡是连接网络设备

IntelTXT(TrustedExecutionTechnology,可信执行技术)是一种硬件帮助保护系统安全的技术。它通过使用硬件测量模块(TPM)来确保系统启动过程中的完整性,并且可以防止恶意软件攻击。在本文中,我们将讨论IntelTXT的安装和配置步骤,帮助你更好地保护你的系统安全。第一步:检查硬件要求安装IntelTXT前,需要先检查计算

宝塔面板是一款非常方便的服务器管理面板,它集成了多种功能,如网站管理、数据库管理、文件管理等。在使用宝塔面板时,有时需要将网站进行反向代理,将请求转发至其他服务器上进行处理。那么,如何进行反向代理的配置呢?下面将介绍详细的步骤。创建网站首先,在宝塔面板中创建一个网站。点击左侧菜单栏中的“网站”,选择“添加站点”按钮,填写相关信息,包括域名、目录、端口等。这里


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

WebStorm Mac version
Useful JavaScript development tools

Zend Studio 13.0.1
Powerful PHP integrated development environment

SublimeText3 Linux new version
SublimeText3 Linux latest version

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.
