Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SwitchB(config-mst)# revision 1
SwitchB(config-mst)# instance 1 vlan 11, 21, 31
SwitchB(config-mst)# instance 2 vlan 12, 22,32
SwitchB(config)# spanning-tree mst 2 root
primary
Configuring and Verifying Root Guard on Cisco IOSBased Catalyst Switches
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# interface FastEthernet 5/8
Switch(config-if)# spanning-tree guard root
Switch(config-if)# end
Displaying Root-Inconsistent Interfaces on Cisco IOSBased Catalyst Switches
Switch# show spanning-tree inconsistentports
Configuration and Verification of UDLD on Cisco Switches
SwitchA# configure terminal
SwitchA(config)# interfacegigabitEthernet 5/1
SwitchA(config-if)# udld port aggressive
SwitchA(config-if)# end
FastEthernet0/0
switch(config)# interface FastEthernet 4/2
switch(config-if)# switchport trunk encapsulation dot1q
switch(config-if)# switchport mode trunk
switch(config-if)# end
Inter-VLAN Routing Using SVIs
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# ip routing
Switch(config)# router rip
Switch(config-router)# network 10.0.0.0
Switch(config)# interface vlan 10
Switch(config-if)# ip address 10.10.1.1 255.0.0.0
Switch(config-if)# no shutdown
Switch(config-if)# interface vlan 20
Switch(config-if)# ip address 10.20.1.1 255.255.255.0
Switch(config-if)# no shutdown
Configuration of Routed Ports in Cisco IOS
Core(config)# interface GigabitEthernet 1/1
Core(Coreonfig-if)# no switchport
Core(config-if)# ip address 10.10.1.1 255.255.255.252
Core(config-if)# exit
Core(config)# interface GigabitEthernet 1/2
Core(config-if)# ip address 10.20.1.254
255.255.255.252
% IP addresses may not be configured on L2 links.
Core(config-if)# no switchport
Core(config-if)# ip address 10.20.1.254
255.255.255.252
To verify the DHCP operation, use the following two commands:
Switch# show ip dhcp binding
Switch# debug ip dhcp server packet
show ip cef Command
Switch# show ip cef
Prefix Next Hop Interface
0.0.0.0/32 receive
1.0.0.0/24 attached GigabitEthernet0/2
1.0.0.0/32 receive
1.0.0.1/32 receive
1.0.0.55/32 1.0.0.55 GigabitEthernet0/2
show ip cef detail Command
Switch# show ip cef vlan 10 detail
IP CEF with switching (Table Version 11), flags=0x0
(severity=2)
debugging Debugging messages
(severity=7)
discriminator Establish MD-Buffer association
emergencies System is unusable
(severity=0)
errors Error conditions
(severity=3)
informational Informational messages
(severity=6)
notifications Normal but significant conditions
(severity=5)
warnings Warning conditions
(severity=4)
xml Enable logging in XML to XML logging buffer
Displaying Filtered System Log Messages
sw# show logging| inc LINK-3
2d20h: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
2d20h: %LINK-3-UPDOWN: Interface FastEthernet0/2, changed state to up
2d20h: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
Configuring SNMP
sw(config)# access-list 100 permit ip 10.1.1.0 0.0.0.255 any
sw(config)# snmp-server community cisco RO 100
sw(config)# snmp-server community xyz123 RW 100
sw(config)# snmp-server trap 10.1.1.50
Cisco IP SLA Configuration
SwitchB(config)# ip sla monitor 11
SwitchB(config-sla)# type echo prot ipIcmpEcho 10.1.1.1 source-int
fa0/1
SwitchB(config-sla)# frequncy 10
SwitchB(config0sla)# exit
SwitchB(config)# ip sla monitor schedule 11 life forever start-time now
SwitchB(config)# track 1 ip sla 11 reachability
Verifying IP SLA
sw# show ip sla statistics
Verifying IP SLA Configuration
sW# sh ip sla configuration
Configuring and Verifying RPR+ Redundancy
Switch# configure terminal
Switch(config)# redundancy
Switch(config-red)# mode rpr-plus
Switch(config-red)# end
Chapter 6
A protected port does not forward any traffic to any other port that is also a protected port on the same
switch.
Switch(config-if)# switchport protected
PAgP Modes
LACP Modes
Passive: passive
Active: active
A good practice is to start by shutting down these interfaces, so that incomplete configuration will not start
to create activity on the link:
Switch(config)# interface range
Switch(config-if-range)# channel-protocol
Switch(config-if-range)# channel-group number mode
Switch(config)# interface port-channel number
Here the EtherChannel load-balancing mechanism is configured to use source and destination IP address
pairs.
This rule is applied to IPv4 and IPv6 traffic, whereas the non-IP load-balancing mechanism uses source
and destination MAC address pairs.
port-channel load-balance src-dst-ip
Use the spanning-tree portfast interface command to enable the PortFast feature.
Use the spanning-tree portfast default global configuration mode command to enable the PortFast
feature on all nontrunking interfaces
Use the spanning-tree portfast trunk interface command to enable the PortFast feature on a
trunk port.
Switch(config-mst)# exit
Assign root bridge for MST instance. This syntax makes the switch root primary or secondary (only
active if primary fails). It sets primary priority to 24576 and secondary to 28672.
BPDU Guard puts an interface configured for STP PortFast in the err-disable state upon receipt of a
BPDU. BPDU guard disables interfaces as a preventive step to avoid potential bridging loops
BPDU filtering prevents a Cisco switch from sending BPDUs on PortFast-enabled interfaces, preventing
unnecessary BPDUs from being transmitted to host devices.
The global configuration can be overridden on a per-port basis. To enable Loop Guard globally, use the
following global configuration command:
Switch(config)# spanning-tree loopguard default