cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1043
Views
0
Helpful
9
Replies

Help to build a network 69 for students.

Jhon Taker
Level 1
Level 1

Dear people,

In this discussion il add some cli for fellow employees which wil also ad some commands.

My first one is

Vlan-database maken:

(IP routing moet aan staan)

Vlan 10

Name Balie

Exit

Int vlan 10

Ip address 172.16.10.1 255.255.255.0

Exit

Do wr

Hopefully someone can use this

9 Replies 9

Bob420
Level 1
Level 1

heyy i saw you post and i have some info hope ist helpfull

VTP configuration:

VTP domain Singularity.nl

VTP mode Server of Client

Trunkpoorten aan maken:

INT Gig0/1

(switchport trunk encapsulation [dot1q | isl] )

Switchport mode trunk

Switchport trunk allowed vlan all

Exit

Do wr

Int range Fa0/1-10

(switchport trunk encapsulation [dot1q | isl] )

Switchport mode trunk

Switchport trunk allowed vlan all

Exit

Do wr

Jhon Taker
Level 1
Level 1

I to found some we could use. il post them beneath here.
Let me know if it was helpfull.

Spanning-Tree:

Spanning-Tree vlan 1-1000 Root

Spannig-Tree priority (8192-4096)

Exit

Poortindeling (access vlan):

Int gig 0/1 (de poort hang van het schema af)

Switchport mode access

Switchport access vlan 10

DHCP pools aanmaken:

IP dhcp pool Balie

Network 172.16.10.0 255.255.255.0

Default router 172.16.10.1

DNS server 180.115.0.6

Exit

Do wr

Hey man look at thiss my friend sended me:

DHCP pools aanmaken:

IP dhcp pool Balie

Network 172.16.10.0 255.255.255.0

Default router 172.16.10.1

DNS server 180.115.0.6

Exit

Do wr

Access control list:

Access-list 101 deny ip 172.16.60.0 0.0.0.255 172.16.10.0 0.0.0.255

Access-list 101 deny ip 172.16.60.0 0.0.0.255 172.16.20.0 0.0.0.255

Access-list 101 permit ip any any

Int vlan 60

Ip access-group 101 in

 

Jhon Taker
Level 1
Level 1

I to got some code from a developer friend from my company.
These lines of code are very importend to use.

Concetie maken tussen de router en de switch:

Int gig1/1/1

No switchport

Ip address 172.16.0.2 255.255.255.0 (switch)

Ip address 172.16.0.1 255.255.255.0 (router)

OSPF:

Router OSPF:

Router ospf 1

Log-adjacency-changes

Network 172.16.0.0 0.0.255.255 area 0

Default-information originate

Exit

Do wr

Switch OSPF:

Log-adjacency-changes

Network 172.16.0.0 0.0.255.255 area 0

Exit

Do wr

Wan config:

Via isp moet met dhcp

Int gig0/0

Ip add dhcp

Yes so this is reaaaallly helpfull

 

Wan config:

Via isp moet met dhcp

Int gig0/0

Ip add dhcp

NAT:

Int gig 0/0

Ip nat outside

Gig 0/1

Ip nat inside

(ip nat inside source list 1 int gog 0/0 overload access-list 1 permit any)

Jhon Taker
Level 1
Level 1

I have some SSh code wich can be used to make the network safer.
it goes like the following.

SSH:

Er moet een domain name zijn

IP domain-name Beheer_Singularity.nl

crypto key generate rsa (1024 bits)

IP ssh version 2

line vty 0 4

transport input ssh

login local

username xxx password xxx

Jhon Taker
Level 1
Level 1

And before i forget to test SSH you need to use the command.
SSH -l user-name Ip-switch

Bob420
Level 1
Level 1

 

lldp neighbors multi layer switch or other switches

ssh -ladmin <ipadress from where you like to connect to (other switches)>

show start up config / copy running config

TFTP service / CLI show interface status\

cmd ping to other vlans NTP service server / show clock show port-security

other configs:

Vlan-database maken: 

(IP routing moet aan staan) 

Vlan 10  

Name Balie 

Exit  

Int vlan 10  

Ip address 172.16.10.1 255.255.255.0 

Exit 

Do wr 

VTP configuration: 

VTP domain Singularity.nl 

VTP mode Server of Client 

Trunkpoorten aan maken: 

INT Gig0/1  

(switchport trunk encapsulation [dot1q | isl] ) 

Switchport mode trunk 

Switchport trunk allowed vlan all 

Exit 

Do wr 

Int range Fa0/1-10  

(switchport trunk encapsulation [dot1q | isl] ) 

Switchport mode trunk 

Switchport trunk allowed vlan all 

Exit 

Do wr 

Spanning-Tree: 

Spanning-Tree vlan 1-1000 Root 

Spannig-Tree priority (8192-4096) 

Exit 

Poortindeling (access vlan): 

Int gig 0/1 (de poort hang van het schema af) 

Switchport mode access  

Switchport access vlan 10  

DHCP pools aanmaken: 

IP dhcp pool Balie 

Network 172.16.10.0 255.255.255.0 

Default router 172.16.10.1 

DNS server 180.115.0.6 

Exit  

Do wr 

Access control list: 

Access-list 101 deny ip 172.16.60.0 0.0.0.255 172.16.10.0 0.0.0.255 

Access-list 101 deny ip 172.16.60.0 0.0.0.255 172.16.20.0 0.0.0.255 

Access-list 101 permit ip any any 

Int vlan 60 

Ip access-group 101 in 

Concetie maken tussen de router en de switch: 

Int gig1/1/1 

No switchport  

Ip address 172.16.0.2 255.255.255.0 (switch) 

Ip address 172.16.0.1 255.255.255.0 (router) 

OSPF: 

Router OSPF: 

Router ospf 1 

Log-adjacency-changes 

Network 172.16.0.0 0.0.255.255 area 0 

Default-information originate  

Exit 

Do wr 

Switch OSPF: 

Log-adjacency-changes 

Network 172.16.0.0 0.0.255.255 area 0 

Exit  

Do wr 

Wan config: 

Via isp moet met dhcp 

Int gig0/0 

Ip add dhcp 

NAT: 

Int gig 0/0 

Ip nat outside 

Gig 0/1 

Ip nat inside 

(ip nat inside source list 1 int gog 0/0 overload access-list 1 permit any) 

SSH: 

Er moet een domain name zijn 

IP domain-name Beheer_Singularity.nl 

crypto key generate rsa (1024 bits) 

IP ssh version 2 

line vty 0 4 

transport input ssh 

login local 

username xxx password xxx

 <peeps in the stuff>

 

Bob420
Level 1
Level 1

lldp neighbors multi layer switch or other switches

ssh -ladmin <ipadress from where you like to connect to (other switches)>

show start up config / copy running config

TFTP service / CLI show interface status\

cmd ping to other vlans NTP service server / show clock show port-security

Review Cisco Networking for a $25 gift card