First, network description
The PC1 is connected to the Cisco3550 F0/1 and the rate is 100M;
CISCO3550 's G0/1 for export.
Second, the detailed configuration process
Note: This configuration: Improve the reprint of some of the incorrect configuration.
Each interface supports only one policy in each direction, and one policy can be used for multiple interfaces. Therefore, the download rate limit for all PCs should be defined in the same policy (in this case, Policy-map User-down), while the d
; (enable) Set MLS include Rp_ip_address tells the switch which IP address is correct6500> (enable) Show MLS include displays a list of IP addresses for the external routing processor6500> (enable) Set MLS flow [Destination|destination-source|full] tells the MLS switch what information to cache the candidate packets6500> (enable) Show MLS entry show third-tier cache table6500> (enable) Set MLS Agingtime agi
downstream interfaceLimit rate speed, calculated as follows:assuming that 2960 is the port, so the simple set speed limit is*15=720 Note: IP DHCP snooping limit rate needs to be set only if the DHCP snooping converged switch or core is enabled. If there is a large number of access layer switches under a core or aggregation switch, the speed limit setting needs
Layer-3 switches of Cisco devices practice communication between different VLANs.
Layer-3 switches of Cisco devices practice communication between different VLANs.
Cisco device
The comparison between a layer-3 Switch and a router is in a large LAN. This function is perfect and helpful for understanding the layer-3 Switch. However, some manufacturers' switches can also directly connect to the Internet to
when he cannot find the address, and the hub is only responsible for forwarding the email regardless of the Bounce Message.
Vro
A Router operates at the network layer, the third layer in the OSI Layer-7 network model. It works by removing the information of the second layer (data link
This article briefly introduces the composition of a layer-3 Switching Network and the responsibilities of each layer. Cisco layer-3 switch is a typical
of using Server Load balancer to improve the scalability, availability, and manageability of Server clusters. This chapter mainly discusses the deployment of Server Load balancer and several solutions for deploying Server Load balancer in the existing network. We will also discuss how to design highly available solutions to implement fault tolerance for different network components throughout the network, including Load balancer.
Before discussing the network structure, we need to understa
Performance Tests on layer-2 and layer-3 vswitches with 24 ports and all-gigabit vswitches have encountered many problems recently. Experts have said that QoS ensures port congestion, high-priority data is processed first. It makes sense to improve the utilization of 24 fully-gigabit switches with insufficient bandwidth.
Three-tier competition
Experts tell you what a layer-3 switch is. Now every household has their own computer and understands what a layer-3 switch is. At that time, the layer-
Comprehensive introduction to layer-3 Switch configuration instances: with detailed command explanations, have you ever encountered layer-3 Switch configuration? Are you familiar with the detailed commands? Does your
know that in order to cope with the increasing data traffic, shared media networks have been replaced by switching networks. This change has a direct impact on the traditional routers used for network segmentation. In view of the large traffic that spans the IP address or IPX subnet, the router has actually become the bottleneck of network transmission. The reason is that traditional routers focus more on multiple media types and transmission speeds. Currently, data buffering and conversion cap
, as the core of the network, there is no substantial breakthrough in the router technology that acts as the interconnection between networks. Therefore, a new routing technology came into being-layer-3 switching technology, which is a routing technology because it works on the layer-3 network protocol, the two-
/100 Mpbs adaptive ports and 1 Gigabit expansion slot. You can purchase different types of Gigabit modules provided by youkang to achieve the function of connecting to a gigabit network. The UGS-7324RS has 15 Gbps non-blocking back-board bandwidth, in the layer-2 switch, the packet forwarding rate reaches the line speed value of Fast Ethernet; As a layer-
of G.703-ETH bridge converter for access, the price is equivalent to G/V converter, therefore, with the new network access solution, the larger the scale, the more nodes that are connected to the downlink, the more cost savings.
When the center end of the uplink uses a layer-3 Switch for access, the downlink branch node does not need any grade router, only need
Enable // enter private Mode
Configure terminal // enter global Mode
Service password-encryption // encrypt the password
Hostname Catalyst 3550-12T1 // define the name for the layer-3 Switch
Enable password 123456. // enable password
Enable secret 654321 // The encryption password of enable (it should be garbled, not 6
China 3 layer Switch VLAN isolation192.168.1.0---------g1/0/1 S SW g1/0/2-------192.168.2.0192.168.3.0-----------------------|192.168.4.0-----------------------|Prohibition of 1.0, 3.0, 4.0 and 2.0 visits[H3c]acl Num 3000[H3c-acl-adv-3000]rule deny IP source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255//Forbidden 1.0 Access 2.0[H3c-acl-adv-3000]rule de
There are many things worth learning about security switches. Here we mainly introduce the meanings and new functions of the layer-3 security switch. Security Switch-the new darling of the network industry, the gatekeeper of the network entry, is aiming to raise a large knife to all insecure factors. With the advent of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.