This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021I Putu Hariyadi
Soal Network Actual & Future Network untuk lomba Information Technology Network System Administration (ITNSA) pada LKS SMK Tingkat Provinsi NTB tahun 2021
Free CCNP switching workbook by networkershome pdfNetworkershome
ccnp workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNP switching workbook when it comes Cisco certification which is why we offered free CCNP switching workbook.
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021I Putu Hariyadi
Soal Network Actual & Future Network untuk lomba Information Technology Network System Administration (ITNSA) pada LKS SMK Tingkat Provinsi NTB tahun 2021
Free CCNP switching workbook by networkershome pdfNetworkershome
ccnp workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNP switching workbook when it comes Cisco certification which is why we offered free CCNP switching workbook.
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco Ebook Belajar Perangkat Cisco
Network topology is the topological structure of a system and might be portrayed physically or sensibly. It is an utilization of chart hypothesis wherein conveying gadgets are demonstrated as hubs and the associations between the gadgets are displayed as connections or lines between the hubs.
LAN to LAN VPN also known as Site to Site VPN is the most basic and the most simplest of all the VPN’s used on CISCO devices. It helps in connecting networks in different geographical location.
VLAN, Trunk and 802.1q Router Configuration Objectiv.docxdickonsondorris
VLAN, Trunk and 802.1q Router Configuration
Objectives
Initial Configuration
VLAN Trunking Configuration
802.1q Router/Switch trunking
Topology
You can click the Show Lab Content button to download the lab or you can download the l ab from
[email protected] in Content.
VLAN, Trunk and 802.1q Router Configuration
Step 1: Initial Switch Configuration
Configure hostnames on the switches
Configure enable secret, console and vty (Telnet) passwords as uwstout
Configure VLANs 10, 20 and 30 on StoutSW1 and StoutSW2
Configure the ports the PCs are connected to in the proper vlans
Shutdown the fa0/4 interfaces on each switch
Configure an IEEE 802.1Q trunk between StoutSW1 and StoutSW2 using the fa0/1 interfaces
Configure the IP addresses and subnet masks on PC1a, PC1b and PC2 according to the topology
diagram
Verify your configuration before moving on to Step 2
If you need help remembering the commands for the initial configuration steps, try using ? or refer to the
previous labs.
Before moving to Step 2 verify your trunk and VLAN configuration, PC IP addresses and that the switchports
for the PCs are in the correct vlans. Use “show” commands and ipconfig to verify the initial configuration.
VLAN, Trunk and 802.1q Router Configuration
Step 2: Configure 802.1 trunk between Menomonie and StoutSW1
Data from one vlan cannot cross into another vlan without the help of a router to route the data. Currently
the PCs cannot successfully send to each other because they are on different VLANs. In this step you will
configure a trunk between the Menomonie router and the StoutSW1 switch. (This type of configuration is
referred to as “Router-on-a-Stick”) so the router can be used to route traffic between the VLANs. The
physical interface on the router that is connected to StoutSW1 is fastethernet0/1 so you will configure the
trunked sub-interfaces on the fastethernet0/1 interface. Then configure fastethernet0/8 on StoutSW1 to trunk.
Configure the Router:
Configure the hostname on the router to Menomonie:
In global configuration mode type, hostname Menomonie
Configure the first sub-interface on Menomonie to route vlan 10
In global configuration mode type, interface fastethernet0/1.10
In interface configuration mode for fa0/1.10 type, encapsulation dot1q 10
Configure the second sub-interface on Menomonie to route vlan 20
In global configuration mode type, interface fastethernet0/1.20
In interface configuration mode for fa0/1.20 type, encapsulation dot1q 20
Configure the third sub-interface on Menomonie to route vlan 30
In global configuration mode type, interface fastethernet0/1.30
In interface configuration mode for fa0/1.30 type, encapsulation dot1q 30
Now that the virtual trunked interfaces have been configured you can assign an IP address to the
interfaces. The addresses for each inter ...
The QinQ technology is called VLAN dot1q tunnel, 802.1Q tunnel, VLAN Stacking technology. The standard comes from IEEE 802.1ad and it is the expansion of the 802.1Q protocol. QinQ adds one layer of 802.1Q tag (VLAN tag) based on the original 802.1Q packet head. With the double layers of tags, the VLAN quantity is increased to 802.1Q.
How to configure the QinQ? Here we will list two occasions and they can be applied to Huawei switches higher level than Quidway S2700 and with EI version, Huawei S3700 switches and Quidway S5700, etc.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
"Impact of front-end architecture on development cost", Viktor Turskyi
How to configure inband management for huawei ma5616
1. How to Configure Inband Management for
Huawei MA5616?
This topic describes how to use Telnet or secure shell (SSH) mode to log in to
the MA5616 through an upstream port (inband management port) of the MA5616 for
inband management. The SSH provides authentication, encryption, and authorization
to ensure the network communication security. When a user logs in to the Huawei
SmartAx mini DSLAM MA5616 remotely over an insecure network, SSH provides
security guarantee and powerful authentication to protect the MA5616 against attacks
such as IP address spoofing and interception of plain text password. The SSH mode is
recommended.
Prerequisites
You must be logged in to the system through a local serial port.
The IP address of the maintenance terminal must be properly configured.
NOTE:
In the following operations, the configurations of the MA5616 must be performed
through a local serial port.
In inband management mode, use either of the following isolation mechanism to
separate the management channel from the data channel:
1. ACL: Configure firewall through ACL so that only specific IP addresses can
be used to log in to the MA5616, such as the IP address of the NMS.
2. VLAN: Ensure that the management VLAN is different from the service
VLAN. In addition, do not add a service port to the management VLAN.
Networking - LAN
The figure1 shows an example network for configuring inband management over a
LAN.
Figure1Example network for configuring inband management over a LAN
1
2. Data Plan - LAN
Table 1 and Table 2 provide the data plan for configuring inband management over a
LAN.
Table 1 Data plan for configuring inband management over a LAN in the telnet mode
Item Data
Upstream port of
the MA5616
VLAN ID: 30
Port ID: 0/0/1
IP address: 10.10.20.2/24
Ethernet port of the
maintenance terminal
IP address: 10.10.20.3/24
Table 2 Data plan for configuring inband management over a LAN in the SSH mode
Item Data
Upstream port of
the MA5616
VLAN ID: 30
Port ID: 0/0/1
IP address: 10.10.20.2/24
User authentication mode: RSA public key authentication
RSA key name: key
New user User name/Password: huawei/test01
Authority: Operator
Permitted reenter number: 4
Ethernet port of the
maintenance terminal
IP address: 10.10.20.3/24
Networking - WAN
2
3. The figure2 shows an example network for configuring inband management over a
WAN.
Figure2 Example network for configuring inband management over a WAN
Data Plan - WAN
Table 3 and Table 4 provide the data plan for configuring inband management over a
WAN.
Table 3 Data plan for configuring inband management over a WAN in the telnet mode
Item Data
Upstream port of the MA5616 VLAN ID: 30
Port ID: 0/0/1
IP address: 10.10.20.2/24
Ethernet port of the maintenance terminal IP address: 10.10.21.3/24
Port of the LAN switch connected to the router IP address: 10.10.20.3/24
Table 4 Data plan for configuring inband management over a WAN in the SSH mode
Item Data
Upstream port of the MA5616 VLAN ID: 30
Port ID: 0/0/1
IP address: 10.10.20.2/24
User authentication mode:
RSA public key
authentication
RSA key name: key
New user User name/Password:
huawei/test01
3
4. Table 3 Data plan for configuring inband management over a WAN in the telnet mode
Item Data
Upstream port of the MA5616 VLAN ID: 30
Port ID: 0/0/1
IP address: 10.10.20.2/24
Ethernet port of the maintenance terminal IP address: 10.10.21.3/24
Authority: Operator
Permitted reenter number: 4
Ethernet port of the maintenance terminal IP address: 10.10.21.3/24
Router port connecting to the LAN Switch IP address: 10.10.20.3/24
Configuration Flowchart
Figure 3 and Figure 4 show the flowchart for configuring inband management.
Figure 3 Flowchart for configuring inband management in the telnet mode
Figure 4 Flowchart for configuring inband management in the SSH mode
4
5. NOTE:
The blue-shaded configuration procedures are the difference in the SSH mode and the
telent mode.
Procedure
Set up the configuration environment.
Figure 1 or Figure 2 shows how to set up the configuration environment according to
the actual requirements and conditions.
5
6. Configure the IP address of the VLAN L3 interface.
Run the vlan command to create a VLAN.
huawei(config)#vlan 30 smart
Run the port vlan command to add an upstream port to the VLAN.
huawei(config)#port vlan 30 0/0 1
In the VLANIF mode, run the ip address command to configure the IP address
and subnet mask of the VLAN L3 interface.
huawei(config)#interface vlanif 30
huawei(config-if-vlanif30)#ip address 10.10.20.2 255.255.255.0
huawei(config-if-vlanif30)#quit
Add a route.
If the configuration environment is set up as shown in Figure 1, you need not add
a route.
If the remote WAN management environment is set up as shown in Figure 2, run
the ip route-static command to add a route to the next hop.
huawei(config)#ip route-static 10.10.21.0 24 10.10.20.3
Save the data.
Run the save command to save the data.
huawei(config)#save
Perform the following operations based on the login mode.
If you login in the telnet mode, perform the following operations:
Start Telnet.
Choose Start > Run on the maintenance terminal. In the Open address bar, enter telnet
10.10.20.2 (10.10.20.2 is the IP address of the VLAN L3 interface of the MA5616), as
shown in Figure 5 (considering the Windows OS as an example). Click OK, and the
telnet interface is displayed.
Figure 5 Starting Telnet
Log in to the MA5616.
On the telnet interface, enter the user name and the password. By default, the super
user name is root and the password is mduadmin. When the login is successful, the
system displays the following information:
>>User name:root
6
7. >>User password:
Huawei Integrated Access Software (MA5616).
Copyright(C) Huawei Technologies Co., Ltd. 2002-2013. All rights reserved.
If you login in the SSH mode, perform the following operations:
Create a user.
Run the terminal user name command to create a user.
huawei(config)#terminal user name
User Name(length<6,15>):huawei
User Password(length<6,15>):test01 //The password is not displayed on the
maintenance terminal.
Confirm Password(length<6,15>):test01 //The password is not displayed on the
maintenance terminal.
User profile name(<=15 chars)[root]:
User's Level:
1. Common User 2. Operator:2
Permitted Reenter Number(0--4):4
User's Appended Info(<=30 chars):
Adding user succeeds
Repeat this operation? (y/n)[n]:n
Create the local RSA key pair.
Run the rsa local-key-pair create command to create the local RSA key pair.
NOTICE:
The prerequisite for the login through SSH is that the local RSA key pair must be
configured and generated. Therefore, before performing other SSH configurations,
make sure that the local RSA key pair is generated.
huawei(config)#rsa local-key-pair create
The key name will be: Host
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Input the bits in the modulus[default = 512]:
Generating keys...
..++++++++++++
....................++++++++++++
...............................++++++++
...........++++++++
Set the SSH user authentication mode.
7
8. Run the ssh user huawei authentication-type rsa command to choose the
authentication mode of the SSH user.
There are four authentication modes for SSH users, as shown in the following. In this
topic, authentication mode rsa is considered as an example.
password: authentication based on a password.
rsa: authentication based on an RSA public key.
all: authentication based on a password or an RSA public key. The user can log in
to the device either by the password or the RSA public key.
password-publickey: authentication based on a password and a public key. The
user can log in to the device only after both the password and the RSA public key
authentication.
huawei(config)#ssh user huawei authentication-type
{ all<K>|password-publickey<K>|password<K>|rsa<K> }:rsa
Command:
ssh user huawei authentication-type rsa
%Authentication type setted, and will be in effect next time.
Generate the RSA public key.
Run the key generator.
Run the client software key generator Puttygen.exe. Figure 6 shows the interface of
the key generator.
Figure 6 Interface of the key generator
8
9. Generate the client key.
Select SSH-2 RSA as the key type under Parameters, click Generate, and move the
cursor according to the prompt on the interface to generate the client key, as shown
in Figure 7.
Figure 7 Interface of the key generator
9
10. Click Save public key and Save private key to save the public key and the private key
respectively after they are generated, as shown in Figure 8.
Figure 8 Save the public key and the private key
10
11. Generate the RSA public key.
Open sshkey.exe, click Browse, and choose the public key file saved in the preceding
step. Then, click Convert to change the client public key to the RSA public key, as
shown in Figure 9.
Figure 9 Interface of converting the client public key to the RSA public key
11
12. Generate the public key for the SSH user.
Create RSA public key. Copy the RSA public key to the server in the config-rsa-key-
code command line mode.
huawei(config)#rsa peer-public-key key
Enter "RSA public key" view, return system view with "peer-public-key end".
NOTE: The number of the bits of public key must be between 769 and 2048.
huawei(config-rsa-public-key)#public-key-code begin
Enter "RSA key code" view, return last view with "public-key-code end".
huawei(config-rsa-key-code)#30818702 81810098 933744B6 7C864EC7 A86A84CC
198BAC15
huawei(config-rsa-key-code)#D32834F7 365CFD17 E7FE4041 3266E416
710D13ED 22BD4D59
12
13. huawei(config-rsa-key-code)#DF0C3E46 A995CC61 DC4CB179 F6888B8C
3F8A3085 51EDB5C7
huawei(config-rsa-key-code)#5DEBDBE1 3AB4A256 0D0B9AA8 9A419D85
35C0E562 AE0BBFAB
huawei(config-rsa-key-code)#515299F9 D2803E84 3AE36C20 949367EA 0697EB20
2594A774
huawei(config-rsa-key-code)#9A0EFF04 26928874 FF9124C4 D28F0702 0125
huawei(config-rsa-key-code)#public-key-code end
huawei(config-rsa-public-key)#peer-public-key end
Assign the public key to the SSH user.
Run the ssh user assign rsa-key command to assign the RSA public key to the SSH
user.
huawei(config)#ssh user huawei assign rsa-key key
Log in to the system.
Run the client software.
Run the SSH client software putty.exe, choose SSH > Auth from the navigation tree,
and assign a file for the RSA private key, as shown in Figure 10. Click Browse to
display the window for selecting the file. In the window, select the file for the private
key, and click OK.
Figure 10 Interface of the SSH client software
13
14. Log in to the system.
Choose Session from the navigation tree, and then input the IP address of
the MA5616 in the Host Name (or IP address) field, as shown in Figure 11. Then,
click Open to log in to the system.
NOTE:
The port in the Figure 11 generally uses the default number 22, you can also use
the display sysman service state command to query and then to configure.
Figure 11 Interface for logging in to the system using the SSH client software
14
15. The user authentication mode is set to the RSA authentication mode, and the system
therefore displays the prompt, as shown in Figure 12. Input the user name to log in to
the system (here, the user name is huawei).
Figure 12 Interface for logging in to the system using the SSH client software
Result
15
16. After logging in to the MA5616, you can manage the MA5616.
The more information about technical support you can consult with our engineer the
e-mail address is as below:
support@huanetwork.com
More related topics
Basic Layout of OLT
Huawei SmartAX MA5616 Overview
Example for Configuring Local Attack Defense
How to Add and Delete ONT on the OLT Device
How to Configure the Auto-save Function for Huawei OLT
More Huawei products and Reviews you can visit: http://www.huanetwork.com/blog
Huanetwork.com is a world leading Huawei networking products supplier, we supply original new
Huawei networking equipments, including Huawei switches, Huawei routers, Huaweisymantec
security products, Huawei IAD, Huawei SFP and other Huawei networking products. Our
customers include telecom operators, Huawei resellers, ISP and system integrators. Right now
most of our sales are contributed by regular customers.
In Huanetwork Lab, also we have Huawei OLT, MDU, DSLAM and switch for customer do
remote testing, any potential customer are welcome to login to our lab. If you need a total Huawei
FTTx solution or Huawei ADSL solution for your network, also you may feel free to contact us.
Our website: http://www.huanetwork.com
Telephone: +852-30501940
Email: sales@huanetwork.com
Address: 23/F Lucky Plaza, 315-321 Lockhart Road, Wanchai, Hongkong
16