SlideShare a Scribd company logo
1 of 61
Switch Configuration



© 2004, Cisco Systems, Inc. All rights reserved.   1
Objectives




       © 2004, Cisco Systems, Inc. All rights reserved.   2
Starting the Switch


Switches:
• have several ports that hosts can connect to;
• have specialized ports for the purpose of
  management;
• can be managed and the configuration can be
  viewed and changed through the console port ;
• typically have no power switch to turn them on
  and off - simply connect or disconnect from a
  power source;

        © 2004, Cisco Systems, Inc. All rights reserved.   3
Catalyst 2950 series Switches Features

• Fixed configuration
  symmetrical switches with
  all ports being FastEthernet
  or 10/100;
• Asymmetrical switches
  with two fixed fiber or
  copper Gigabit Ethernet
  ports;
• Asymmetrical switches
  with modular Gigabit
  Interface Converter (GBIC)
  slots



             © 2004, Cisco Systems, Inc. All rights reserved.   4
LEDs


 Light-emitting diodes (LEDs)
 • help monitor system activity and performance;
 • on the front of a switch:
       - System LED
       - Remote Power Supply (RPS) LED
       - Port Mode LEDs
       - Port Status LEDs



        © 2004, Cisco Systems, Inc. All rights reserved.   5
LEDs
System LED
• shows whether the system is receiving power and functioning
  correctly;

RPS LED
• indicates whether or not the remote power supply is in use;

Mode LEDs
• indicate the current state of the Mode button;
• are used to determine how the Port Status LEDs are interpreted;
• to select or change the port mode, press the Mode button repeatedly
  until the Mode LEDs indicate the desired mode.

Port Status LEDs
•   have different meanings, depending on the current value of the
    Mode LED. © 2004, Cisco Systems, Inc. All rights reserved.       6
Mode LED




     © 2004, Cisco Systems, Inc. All rights reserved.   7
Verifying Port LEDs During Switch POST

  Power-On Self Test (POST)
  • runs automatically to verify that the switch
  functions correctly;
  •should not expect a reliable operation of the switch
  if POST fails.




        © 2004, Cisco Systems, Inc. All rights reserved.   8
Verifying Port LEDs During Switch POST

 Port Status LEDs during POST:
 turn amber - for about 30 seconds
 • the switch discovers the network topology and
   searches for loops;
 turn green
 • the switch has established a link between the
   port and a target, such as a computer;
 turn off
 • the switch has determined that nothing is
   plugged into the port.
            © 2004, Cisco Systems, Inc. All rights reserved.   9
Connecting Switch to PC




 © 2004, Cisco Systems, Inc. All rights reserved.   10
Console Connection




      © 2004, Cisco Systems, Inc. All rights reserved.   11
Console Connection




      © 2004, Cisco Systems, Inc. All rights reserved.   12
Console Connection




      Shows information about the switch:
      • details about POST status;
      • data about the switch hardware.
      © 2004, Cisco Systems, Inc. All rights reserved.   13
Switch CLI




© 2004, Cisco Systems, Inc. All rights reserved.   14
Command-Line Interface (CLI)




Command-line interface (CLI) for Cisco
 switches:
• is very similar to the CLI for Cisco routers.




        © 2004, Cisco Systems, Inc. All rights reserved.   15
“Help” command




      © 2004, Cisco Systems, Inc. All rights reserved.   16
Command Modes




                              • User EXEC
                              • Privileged EXEC




     © 2004, Cisco Systems, Inc. All rights reserved.   17
User EXEC mode

  User EXEC mode
  • default mode;
  • is recognized by its prompt, which
    ends in a greater-than character (>);
  • available commands are limited:
      - to change terminal settings;
      - to perform basic tests;
      - to display system information.

      © 2004, Cisco Systems, Inc. All rights reserved.   18
Privileged EXEC mode

Privileged EXEC mode
• to enter enable command is used from User EXEC
  mode;
• is recognized by its prompt, which ends in a pound-
  sign character (#);
• the command set includes the configure command:
     - allows other command modes to be accessed;
• should be password protected to prevent
  unauthorized use;
• the password does not appear on the screen, and is
  case sensitive.

         © 2004, Cisco Systems, Inc. All rights reserved.   19
Default Running Configuration




   © 2004, Cisco Systems, Inc. All rights reserved.   20
Default Running Configuration

 Default Running Configuration
 • when powered up for the first time, a switch
   has default data in the running configuration
   file;
 • default hostname - Switch;
 • no passwords are set on the console or
   virtual terminal (vty) lines;
 • the switch has no IP address (IP address for
  management purposes is configured on the virtual
  interface VLAN 1)

        © 2004, Cisco Systems, Inc. All rights reserved.   21
Verifying the Catalyst Switch Default
Configuration



               • show running-config
               • show interface
               • show vlan
               • show flash
               • show version


       © 2004, Cisco Systems, Inc. All rights reserved.   22
Default Running Configuration




       © 2004, Cisco Systems, Inc. All rights reserved.   23
Default Port Settings


  Default Running Configuration
  • the switch ports or interfaces are set to
    auto mode;
  • all switch ports are in VLAN 1;
  • VLAN 1 is known as the default
    management VLAN.


        © 2004, Cisco Systems, Inc. All rights reserved.   24
Default Port Settings




       © 2004, Cisco Systems, Inc. All rights reserved.   25
Default Port Settings




       © 2004, Cisco Systems, Inc. All rights reserved.   26
Default Flash Directory Content

                                                          IOS image




                                                          file env_vars


                                                          sub-directory
                                                          html




       © 2004, Cisco Systems, Inc. All rights reserved.                   27
Default Flash Directory Content

Default Running Configuration
• by default flash directory contains:
     - IOS image;
     - file env_vars;
     - sub-directory html.
• flash directory does not contain:
     - config.text – switch configuration file;
     - vlan.dat - VLAN database file.
         © 2004, Cisco Systems, Inc. All rights reserved.   28
IOS Version and Config. Register
             show version command – used to verify:
             • IOS version;
             • configuration register settings.




        © 2004, Cisco Systems, Inc. All rights reserved.   29
Configuring the Switch




© 2004, Cisco Systems, Inc. All rights reserved.   30
Hostname and Passwords Configuration




      © 2004, Cisco Systems, Inc. All rights reserved.   31
IP address and Default Gateway Configuration
      IP address Configuration:
      • allows the switch to be accessible by Telnet and other
      TCP/IP applications




          © 2004, Cisco Systems, Inc. All rights reserved.       32
VLAN1


Management VLAN:
• by default, VLAN 1 is the management
  VLAN;
• all internetworking devices should be in
  the management VLAN;
• allows a single management workstation
  to access, configure, and manage all the
  internetworking devices.

        © 2004, Cisco Systems, Inc. All rights reserved.   33
Port Speed and Duplex Settings Configuration




        © 2004, Cisco Systems, Inc. All rights reserved.   34
Port Speed and Duplex Settings Configuration


   Fast Ethernet switch ports:
   •by default set to auto-speed and auto-
   duplex (allows the interfaces to
   negotiate these settings);
   •Network administrators can manually
   configure the interface speed and
   duplex values


        © 2004, Cisco Systems, Inc. All rights reserved.   35
HTTP Service and Port Configuration

• Intelligent network devices can provide a web-based
  interface for configuration and management
  purposes;
• Once a switch is configured with an IP address and
  gateway, it can be accessed by a web-based
  interface;
HTTP services:
• can be access by a web browser using:
     - IP address;
     - port 80 - the default port for http.
• can be turned on or off, and the port address for the
  service can be chosen.
         © 2004, Cisco Systems, Inc. All rights reserved.   36
HTTP Service and Port Configuration




       © 2004, Cisco Systems, Inc. All rights reserved.   37
Configuring the Catalyst Switch




                                                             Web Management Interface




  Web Management Interface




          © 2004, Cisco Systems, Inc. All rights reserved.                              38
Managing the MAC Address Table




     © 2004, Cisco Systems, Inc. All rights reserved.   39
MAC Address Table


Switches
• examine the source address of frames that
  are received on the ports;
• learn the MAC addresses of PCs or
  workstations that are connected to their
  switch ports;
• record learned MAC addresses in a MAC
  address table.
       © 2004, Cisco Systems, Inc. All rights reserved.   40
Check Learned MAC Addresses




   show mac-address-table command - Privileged EXEC mode
   • examines the addresses that a switch has learned
         © 2004, Cisco Systems, Inc. All rights reserved.   41
MAC Address Table

Switches:
• dynamically learn and maintain thousands
  of MAC addresses;
• learned entries may be discarded from the
  MAC address table (to preserve memory and
  for optimal operation) ;
• the MAC address entry is automatically
  discarded or aged out after 300 seconds (if
 no frames are seen with a previously learned
 address).
       © 2004, Cisco Systems, Inc. All rights reserved.   42
Check Learned MAC Addresses




  Clear mac-address-table command - Privileged EXEC mode
  • used to remove dynamically learned MAC addresses;
  • used to remove static MAC address entries.
         © 2004, Cisco Systems, Inc. All rights reserved.   43
Managing the MAC Address Table




      © 2004, Cisco Systems, Inc. All rights reserved.   44
Static MAC Addresses


Static MAC address:
• permanently assigned to an interface;
Reasons for use a Static MAC address:
• will not be aged out automatically by the switch;
• a specific server or user workstation must be
  attached to the port and the MAC address is
  known;
• Security is enhanced.
         © 2004, Cisco Systems, Inc. All rights reserved.   45
Configuring Static MAC Addresses




       © 2004, Cisco Systems, Inc. All rights reserved.   46
Configuring Static MAC Addresses




       © 2004, Cisco Systems, Inc. All rights reserved.   47
Static MAC Addresses




  To configure:

  Switch(config)#mac-address-table static <mac-
  address of host > interface FastEthernet <Ethernet
  number > vlan <vlan name >
  To remove:

  Switch(config)# no mac-address-table static <mac-
  address of host > interface FastEthernet <Ethernet
  number > vlan <vlan name >
          © 2004, Cisco Systems, Inc. All rights reserved.   48
Port Security




© 2004, Cisco Systems, Inc. All rights reserved.   49
Port Security

  Port Security
  • It is possible to limit the number of
    addresses that can be learned on an
    interface;
  • the number of MAC addresses per port
    can be limited to 1;
  • the first address dynamically learned by
    the switch becomes the secure address.

        © 2004, Cisco Systems, Inc. All rights reserved.   50
Port Security Configuration




       © 2004, Cisco Systems, Inc. All rights reserved.   51
Configuring Port Security

Catalyst 2950 Series

 wg_sw_2950(config-if)#switchport port-security [mac-address
 mac-address] | [maximum value] | [violation {protect |
 restrict | shutdown}]




wg_sw_2950(config)#interface fa0/1
wg_sw_2950(config-if)#switchport mode access
wg_sw_2950(config-if)#switchport port-security
wg_sw_2950(config-if)#switchport port-security maximum 1
wg_sw_2950(config-if)#switchport port-security mac-address 0008.eeee.eeee
wg_sw_2950(config-if)#switchport port-security violation shutdown




            © 2004, Cisco Systems, Inc. All rights reserved.                52
Verifying Port Security
on the Catalyst 2950 Series

 wg_sw_2950#show port-security [interface interface-id] [address] [ |
 {begin | exclude | include} expression]




   wg_sw_2950#show port-security interface fastethernet 0/5
   Port Security              : Enabled
   Port Status                : Secure-up
   Violation Mode             : Shutdown
   Aging Time                 : 20 mins
   Aging Type                 : Absolute
   SecureStatic Address Aging : Disabled
   Maximum MAC Addresses      : 1
   Total MAC Addresses        : 1
   Configured MAC Addresses   : 0
   Sticky MAC Addresses       : 0
   Last Source Address        : 0000.0000.0000
   Security Violation Count   : 0




            © 2004, Cisco Systems, Inc. All rights reserved.            53
Verifying Port Security
on the Catalyst 2950 Series (Cont.)


wg_sw_2950#sh port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation
Security Action
                (Count)       (Count)          (Count)
----------------------------------------------------------------
----------
      Fa0/2        1             1                0
Shutdown
----------------------------------------------------------------
-----------
Total Addresses in System (excluding one mac per port)     : 0
Max Addresses limit in System (excluding one mac per port) :
1024




          © 2004, Cisco Systems, Inc. All rights reserved.         54
Port Security


    To configure port security :
    Switch(config-if)#switchport port-security


    To reverse port security:
    Switch(config-if)# no switchport port-
    security
    To verify port security status:
    Switch(config)#show port security


        © 2004, Cisco Systems, Inc. All rights reserved.   55
Adding and Moving Switches
      to the Network



   © 2004, Cisco Systems, Inc. All rights reserved.   56
Adding New Switch

     Adding New Switch
     Must be configured:
     • Switch name;
     • IP address for the switch in the
       management VLAN;
     • a default gateway;
     • Line passwords.

      © 2004, Cisco Systems, Inc. All rights reserved.   57
Adding New Switch




      © 2004, Cisco Systems, Inc. All rights reserved.   58
Moving a Switch


Host is moved:
• from one port or switch to another;
• configurations that can cause unexpected
  behavior should be removed;
• configuration that is required can then be
  added.


       © 2004, Cisco Systems, Inc. All rights reserved.   59
Managing Switch Operation




  © 2004, Cisco Systems, Inc. All rights reserved.   60
Managing Switch Operation


• An administrator should document and
  maintain the operational configuration
  files for networking devices;
• The most recent running-configuration file
  should be backed up on a server or disk;
• The Cisco IOS Software should also be
  backed up to a local server. The Cisco IOS
  Software can then be reloaded to Flash
  memory if needed.

       © 2004, Cisco Systems, Inc. All rights reserved.   61

More Related Content

What's hot

CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1Shobhit Sharma
 
CLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.pptCLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.pptsuman yadav
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptxssusere578aa
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)ISMT College
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster ConfigurationKashif Latif
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)Naveen Soni
 
Internal & External of Routers
Internal & External of RoutersInternal & External of Routers
Internal & External of RoutersKishore Kumar
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
STP Protection
STP ProtectionSTP Protection
STP ProtectionNetwax Lab
 

What's hot (20)

CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
CLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.pptCLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.ppt
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
 
Internal & External of Routers
Internal & External of RoutersInternal & External of Routers
Internal & External of Routers
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
VLAN
VLANVLAN
VLAN
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 

Similar to Switch configuration

Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
Лекц 8
Лекц 8Лекц 8
Лекц 8Muuluu
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2Waqas Ahmed Nawaz
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2limenih muluneh
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6Waqas Ahmed Nawaz
 
1627478708347_Chapter 1.pptx
1627478708347_Chapter 1.pptx1627478708347_Chapter 1.pptx
1627478708347_Chapter 1.pptxTesfaMinuyelet
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1Waqas Ahmed Nawaz
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5Chaing Ravuth
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemBetselove
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2Chaing Ravuth
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksYaser Rahmati
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalFisal Anwari
 

Similar to Switch configuration (20)

Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
Лекц 8
Лекц 8Лекц 8
Лекц 8
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
 
Basic switch management
Basic switch managementBasic switch management
Basic switch management
 
Redes
RedesRedes
Redes
 
1627478708347_Chapter 1.pptx
1627478708347_Chapter 1.pptx1627478708347_Chapter 1.pptx
1627478708347_Chapter 1.pptx
 
Day 13.1 startingaswitch
Day 13.1 startingaswitchDay 13.1 startingaswitch
Day 13.1 startingaswitch
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5
 
CCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptxCCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptx
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
 

More from Muuluu

Lecture 2
Lecture 2Lecture 2
Lecture 2Muuluu
 
Lecture 5
Lecture 5Lecture 5
Lecture 5Muuluu
 
Lecture 3
Lecture 3Lecture 3
Lecture 3Muuluu
 
Өгөгдлийн бүтэц
Өгөгдлийн бүтэцӨгөгдлийн бүтэц
Өгөгдлийн бүтэцMuuluu
 
Basic software
Basic software Basic software
Basic software Muuluu
 
Wide area networks
Wide area networksWide area networks
Wide area networksMuuluu
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PATMuuluu
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocolMuuluu
 
Firewall
FirewallFirewall
FirewallMuuluu
 
User practical
User practicalUser practical
User practicalMuuluu
 
Active directory
Active directoryActive directory
Active directoryMuuluu
 
Hardware
HardwareHardware
HardwareMuuluu
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003Muuluu
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектурMuuluu
 
6 network devices
6 network devices6 network devices
6 network devicesMuuluu
 
Бие даалт
Бие даалтБие даалт
Бие даалтMuuluu
 
Лекц 15
Лекц 15Лекц 15
Лекц 15Muuluu
 
Лекц 14
Лекц 14Лекц 14
Лекц 14Muuluu
 
Лекц 16
Лекц 16Лекц 16
Лекц 16Muuluu
 
Лекц 15
Лекц 15Лекц 15
Лекц 15Muuluu
 

More from Muuluu (20)

Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Өгөгдлийн бүтэц
Өгөгдлийн бүтэцӨгөгдлийн бүтэц
Өгөгдлийн бүтэц
 
Basic software
Basic software Basic software
Basic software
 
Wide area networks
Wide area networksWide area networks
Wide area networks
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PAT
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Firewall
FirewallFirewall
Firewall
 
User practical
User practicalUser practical
User practical
 
Active directory
Active directoryActive directory
Active directory
 
Hardware
HardwareHardware
Hardware
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектур
 
6 network devices
6 network devices6 network devices
6 network devices
 
Бие даалт
Бие даалтБие даалт
Бие даалт
 
Лекц 15
Лекц 15Лекц 15
Лекц 15
 
Лекц 14
Лекц 14Лекц 14
Лекц 14
 
Лекц 16
Лекц 16Лекц 16
Лекц 16
 
Лекц 15
Лекц 15Лекц 15
Лекц 15
 

Switch configuration

  • 1. Switch Configuration © 2004, Cisco Systems, Inc. All rights reserved. 1
  • 2. Objectives © 2004, Cisco Systems, Inc. All rights reserved. 2
  • 3. Starting the Switch Switches: • have several ports that hosts can connect to; • have specialized ports for the purpose of management; • can be managed and the configuration can be viewed and changed through the console port ; • typically have no power switch to turn them on and off - simply connect or disconnect from a power source; © 2004, Cisco Systems, Inc. All rights reserved. 3
  • 4. Catalyst 2950 series Switches Features • Fixed configuration symmetrical switches with all ports being FastEthernet or 10/100; • Asymmetrical switches with two fixed fiber or copper Gigabit Ethernet ports; • Asymmetrical switches with modular Gigabit Interface Converter (GBIC) slots © 2004, Cisco Systems, Inc. All rights reserved. 4
  • 5. LEDs Light-emitting diodes (LEDs) • help monitor system activity and performance; • on the front of a switch: - System LED - Remote Power Supply (RPS) LED - Port Mode LEDs - Port Status LEDs © 2004, Cisco Systems, Inc. All rights reserved. 5
  • 6. LEDs System LED • shows whether the system is receiving power and functioning correctly; RPS LED • indicates whether or not the remote power supply is in use; Mode LEDs • indicate the current state of the Mode button; • are used to determine how the Port Status LEDs are interpreted; • to select or change the port mode, press the Mode button repeatedly until the Mode LEDs indicate the desired mode. Port Status LEDs • have different meanings, depending on the current value of the Mode LED. © 2004, Cisco Systems, Inc. All rights reserved. 6
  • 7. Mode LED © 2004, Cisco Systems, Inc. All rights reserved. 7
  • 8. Verifying Port LEDs During Switch POST Power-On Self Test (POST) • runs automatically to verify that the switch functions correctly; •should not expect a reliable operation of the switch if POST fails. © 2004, Cisco Systems, Inc. All rights reserved. 8
  • 9. Verifying Port LEDs During Switch POST Port Status LEDs during POST: turn amber - for about 30 seconds • the switch discovers the network topology and searches for loops; turn green • the switch has established a link between the port and a target, such as a computer; turn off • the switch has determined that nothing is plugged into the port. © 2004, Cisco Systems, Inc. All rights reserved. 9
  • 10. Connecting Switch to PC © 2004, Cisco Systems, Inc. All rights reserved. 10
  • 11. Console Connection © 2004, Cisco Systems, Inc. All rights reserved. 11
  • 12. Console Connection © 2004, Cisco Systems, Inc. All rights reserved. 12
  • 13. Console Connection Shows information about the switch: • details about POST status; • data about the switch hardware. © 2004, Cisco Systems, Inc. All rights reserved. 13
  • 14. Switch CLI © 2004, Cisco Systems, Inc. All rights reserved. 14
  • 15. Command-Line Interface (CLI) Command-line interface (CLI) for Cisco switches: • is very similar to the CLI for Cisco routers. © 2004, Cisco Systems, Inc. All rights reserved. 15
  • 16. “Help” command © 2004, Cisco Systems, Inc. All rights reserved. 16
  • 17. Command Modes • User EXEC • Privileged EXEC © 2004, Cisco Systems, Inc. All rights reserved. 17
  • 18. User EXEC mode User EXEC mode • default mode; • is recognized by its prompt, which ends in a greater-than character (>); • available commands are limited: - to change terminal settings; - to perform basic tests; - to display system information. © 2004, Cisco Systems, Inc. All rights reserved. 18
  • 19. Privileged EXEC mode Privileged EXEC mode • to enter enable command is used from User EXEC mode; • is recognized by its prompt, which ends in a pound- sign character (#); • the command set includes the configure command: - allows other command modes to be accessed; • should be password protected to prevent unauthorized use; • the password does not appear on the screen, and is case sensitive. © 2004, Cisco Systems, Inc. All rights reserved. 19
  • 20. Default Running Configuration © 2004, Cisco Systems, Inc. All rights reserved. 20
  • 21. Default Running Configuration Default Running Configuration • when powered up for the first time, a switch has default data in the running configuration file; • default hostname - Switch; • no passwords are set on the console or virtual terminal (vty) lines; • the switch has no IP address (IP address for management purposes is configured on the virtual interface VLAN 1) © 2004, Cisco Systems, Inc. All rights reserved. 21
  • 22. Verifying the Catalyst Switch Default Configuration • show running-config • show interface • show vlan • show flash • show version © 2004, Cisco Systems, Inc. All rights reserved. 22
  • 23. Default Running Configuration © 2004, Cisco Systems, Inc. All rights reserved. 23
  • 24. Default Port Settings Default Running Configuration • the switch ports or interfaces are set to auto mode; • all switch ports are in VLAN 1; • VLAN 1 is known as the default management VLAN. © 2004, Cisco Systems, Inc. All rights reserved. 24
  • 25. Default Port Settings © 2004, Cisco Systems, Inc. All rights reserved. 25
  • 26. Default Port Settings © 2004, Cisco Systems, Inc. All rights reserved. 26
  • 27. Default Flash Directory Content IOS image file env_vars sub-directory html © 2004, Cisco Systems, Inc. All rights reserved. 27
  • 28. Default Flash Directory Content Default Running Configuration • by default flash directory contains: - IOS image; - file env_vars; - sub-directory html. • flash directory does not contain: - config.text – switch configuration file; - vlan.dat - VLAN database file. © 2004, Cisco Systems, Inc. All rights reserved. 28
  • 29. IOS Version and Config. Register show version command – used to verify: • IOS version; • configuration register settings. © 2004, Cisco Systems, Inc. All rights reserved. 29
  • 30. Configuring the Switch © 2004, Cisco Systems, Inc. All rights reserved. 30
  • 31. Hostname and Passwords Configuration © 2004, Cisco Systems, Inc. All rights reserved. 31
  • 32. IP address and Default Gateway Configuration IP address Configuration: • allows the switch to be accessible by Telnet and other TCP/IP applications © 2004, Cisco Systems, Inc. All rights reserved. 32
  • 33. VLAN1 Management VLAN: • by default, VLAN 1 is the management VLAN; • all internetworking devices should be in the management VLAN; • allows a single management workstation to access, configure, and manage all the internetworking devices. © 2004, Cisco Systems, Inc. All rights reserved. 33
  • 34. Port Speed and Duplex Settings Configuration © 2004, Cisco Systems, Inc. All rights reserved. 34
  • 35. Port Speed and Duplex Settings Configuration Fast Ethernet switch ports: •by default set to auto-speed and auto- duplex (allows the interfaces to negotiate these settings); •Network administrators can manually configure the interface speed and duplex values © 2004, Cisco Systems, Inc. All rights reserved. 35
  • 36. HTTP Service and Port Configuration • Intelligent network devices can provide a web-based interface for configuration and management purposes; • Once a switch is configured with an IP address and gateway, it can be accessed by a web-based interface; HTTP services: • can be access by a web browser using: - IP address; - port 80 - the default port for http. • can be turned on or off, and the port address for the service can be chosen. © 2004, Cisco Systems, Inc. All rights reserved. 36
  • 37. HTTP Service and Port Configuration © 2004, Cisco Systems, Inc. All rights reserved. 37
  • 38. Configuring the Catalyst Switch Web Management Interface Web Management Interface © 2004, Cisco Systems, Inc. All rights reserved. 38
  • 39. Managing the MAC Address Table © 2004, Cisco Systems, Inc. All rights reserved. 39
  • 40. MAC Address Table Switches • examine the source address of frames that are received on the ports; • learn the MAC addresses of PCs or workstations that are connected to their switch ports; • record learned MAC addresses in a MAC address table. © 2004, Cisco Systems, Inc. All rights reserved. 40
  • 41. Check Learned MAC Addresses show mac-address-table command - Privileged EXEC mode • examines the addresses that a switch has learned © 2004, Cisco Systems, Inc. All rights reserved. 41
  • 42. MAC Address Table Switches: • dynamically learn and maintain thousands of MAC addresses; • learned entries may be discarded from the MAC address table (to preserve memory and for optimal operation) ; • the MAC address entry is automatically discarded or aged out after 300 seconds (if no frames are seen with a previously learned address). © 2004, Cisco Systems, Inc. All rights reserved. 42
  • 43. Check Learned MAC Addresses Clear mac-address-table command - Privileged EXEC mode • used to remove dynamically learned MAC addresses; • used to remove static MAC address entries. © 2004, Cisco Systems, Inc. All rights reserved. 43
  • 44. Managing the MAC Address Table © 2004, Cisco Systems, Inc. All rights reserved. 44
  • 45. Static MAC Addresses Static MAC address: • permanently assigned to an interface; Reasons for use a Static MAC address: • will not be aged out automatically by the switch; • a specific server or user workstation must be attached to the port and the MAC address is known; • Security is enhanced. © 2004, Cisco Systems, Inc. All rights reserved. 45
  • 46. Configuring Static MAC Addresses © 2004, Cisco Systems, Inc. All rights reserved. 46
  • 47. Configuring Static MAC Addresses © 2004, Cisco Systems, Inc. All rights reserved. 47
  • 48. Static MAC Addresses To configure: Switch(config)#mac-address-table static <mac- address of host > interface FastEthernet <Ethernet number > vlan <vlan name > To remove: Switch(config)# no mac-address-table static <mac- address of host > interface FastEthernet <Ethernet number > vlan <vlan name > © 2004, Cisco Systems, Inc. All rights reserved. 48
  • 49. Port Security © 2004, Cisco Systems, Inc. All rights reserved. 49
  • 50. Port Security Port Security • It is possible to limit the number of addresses that can be learned on an interface; • the number of MAC addresses per port can be limited to 1; • the first address dynamically learned by the switch becomes the secure address. © 2004, Cisco Systems, Inc. All rights reserved. 50
  • 51. Port Security Configuration © 2004, Cisco Systems, Inc. All rights reserved. 51
  • 52. Configuring Port Security Catalyst 2950 Series wg_sw_2950(config-if)#switchport port-security [mac-address mac-address] | [maximum value] | [violation {protect | restrict | shutdown}] wg_sw_2950(config)#interface fa0/1 wg_sw_2950(config-if)#switchport mode access wg_sw_2950(config-if)#switchport port-security wg_sw_2950(config-if)#switchport port-security maximum 1 wg_sw_2950(config-if)#switchport port-security mac-address 0008.eeee.eeee wg_sw_2950(config-if)#switchport port-security violation shutdown © 2004, Cisco Systems, Inc. All rights reserved. 52
  • 53. Verifying Port Security on the Catalyst 2950 Series wg_sw_2950#show port-security [interface interface-id] [address] [ | {begin | exclude | include} expression] wg_sw_2950#show port-security interface fastethernet 0/5 Port Security : Enabled Port Status : Secure-up Violation Mode : Shutdown Aging Time : 20 mins Aging Type : Absolute SecureStatic Address Aging : Disabled Maximum MAC Addresses : 1 Total MAC Addresses : 1 Configured MAC Addresses : 0 Sticky MAC Addresses : 0 Last Source Address : 0000.0000.0000 Security Violation Count : 0 © 2004, Cisco Systems, Inc. All rights reserved. 53
  • 54. Verifying Port Security on the Catalyst 2950 Series (Cont.) wg_sw_2950#sh port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action (Count) (Count) (Count) ---------------------------------------------------------------- ---------- Fa0/2 1 1 0 Shutdown ---------------------------------------------------------------- ----------- Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 1024 © 2004, Cisco Systems, Inc. All rights reserved. 54
  • 55. Port Security To configure port security : Switch(config-if)#switchport port-security To reverse port security: Switch(config-if)# no switchport port- security To verify port security status: Switch(config)#show port security © 2004, Cisco Systems, Inc. All rights reserved. 55
  • 56. Adding and Moving Switches to the Network © 2004, Cisco Systems, Inc. All rights reserved. 56
  • 57. Adding New Switch Adding New Switch Must be configured: • Switch name; • IP address for the switch in the management VLAN; • a default gateway; • Line passwords. © 2004, Cisco Systems, Inc. All rights reserved. 57
  • 58. Adding New Switch © 2004, Cisco Systems, Inc. All rights reserved. 58
  • 59. Moving a Switch Host is moved: • from one port or switch to another; • configurations that can cause unexpected behavior should be removed; • configuration that is required can then be added. © 2004, Cisco Systems, Inc. All rights reserved. 59
  • 60. Managing Switch Operation © 2004, Cisco Systems, Inc. All rights reserved. 60
  • 61. Managing Switch Operation • An administrator should document and maintain the operational configuration files for networking devices; • The most recent running-configuration file should be backed up on a server or disk; • The Cisco IOS Software should also be backed up to a local server. The Cisco IOS Software can then be reloaded to Flash memory if needed. © 2004, Cisco Systems, Inc. All rights reserved. 61

Editor's Notes

  1. Layer 2 of 2 Note: When the switch-sticky learns a MAC address on a secured port, the switch will make that MAC address a permanent address.
  2. Layer 2 of 2 Emphasize: The default action is “suspend.”
  3. Layer 2 of 2 Emphasize: The default action is “suspend.”