.
The vswitch gateway configuration method is as follows:
Switch#config tSwitch(config)#interface vlan 1Switch(config-if)#ip address 192.168.1.254 255.255.255.0Switch(config-if)#no shutdownSwitch(config-if)#exitSwitch(config)#
After a L2 Switch is configured with a management IP address, you can use "Tel
routing protocols to generate route tables, and running ARP to parse IP addresses; set the cache IP Forwarding Table item. As a basic network, the IP network is evolving into a multi-service network. Therefore, network devices must provide a data operation platform for different policies. In the smart architecture of the three-tier vswitch in the harbor, each data packet can be processed according to the policy through a fast filter engine.
2.
Layer-3 egress connection to the internal port of the firewall
It is recommended that layer-3 core switches use VLAN1 to connect to the firewall's internal port. The Intranet access to the Internet may be slow due to IP redirection !!
The specific examples and solutions are
eth1.200 hw ether 00: 05: 5D: 61: 00: 31, ifup eth1
A complete VLAN (interface) is successfully added. This function is equivalent to executing vlan 200, ip address 192.168.200.1 255.255.0 on a layer-3 switch.
Configurations on L2 Switches
The configuration on the L2
There are many things worth learning about layer-3 router switches. Here we mainly introduce the solutions to soft faults in layer-3 router switches. Two days ago, our company's network was upgraded, and the core device adopted the INTEL550 series L3 route switch. The 500 se
Enable // enter private Mode
Configure terminal // enter global Mode
Service password-encryption // encrypt the password
Hostname Catalyst 3550-12T1 // define the name for the layer-3 Switch
Enable password 123456. // enable password
Enable secret 654321 // The encryption password of enable (it should be garbled, not 654321)
Ip subnet-zero // allow all 0 subnets
) # switchport mode trunk
SW2 (config-if) # no sh
# Configure the VTP client (After configuring the VTP client, you can learn the vlan created on the layer-3 Switch)
SW2 # vlan database
SW2 (vlan) # vtp domain test
SW2 (vlan) # vtp client
SW2 (vlan) # vtp password 123
SW2 (vlan) # vtp pruning
# Add the specified interface to the corresponding vlan
SW2 (config) #
The h3c layer-3 Switch acl is an example of a new library that can only access the electronic reading room, and cannot access other hosts on the Intranet, so as to avoid security impact. the IP address of the On-Internet www.2cto.com electronic reading room is not opened to
Idea: Configure The VTP host and client, enable IP routing, and divide VLAN -----> define IP addresses for each VLAN port, and enable trunk ------> enable DHCP on The vtp server, and define IP-pool, set different CIDR blocks to VLAN interface IP addresses as gateways ------> Add ports to corresponding VLANs -------> set management IP addresses and passwords of vswitches
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/4C/42/wKiom1Q6Ms_AiVU2AAH5SP-f5do600.jpg "Title =" Capture 2.jp
I. Overview:On the forum, I saw someone asking how to prevent long-distance fiber lines from being eavesdropped or connected to other illegal switches. If they are the same, port security is used to prevent random access, log on to the rack to perform the test and record the test results. Forum question link: Workshop.Ii. Basic Ideas:A. assume that the vswitch is a laye
Preface:
It has been three months since the publication of the [Layer 2] in the blog series of "men are down to Layer 3, according to the previous visits and comments, many of my friends still like practical blog posts. After all, we are all called "siege lions", so we should check whether the "siege lions" are qualified and whether we can "build a house" instead
Recently I saw an article on the anti-three layer, and my hands are also itchy. I will sacrifice some time to discuss this old topic.
1. What is Layer 3?
Many people love to confuse the three-layer architecture with MVC, but we can consider their differences from the simples
Recently I saw an article about anti-L3ArticleWhen my hands itch, I will sacrifice some time to discuss this old topic.
1. What is Layer 3?
Many people love to confuse the three-layer architecture with MVC, but we can consider their differences from the simplest perspective:
In the design pattern, there
In some low-end switch markets, layer-3 switching has gradually become the mainstream in the market. Its biggest difference is that it integrates the advantages of layer-2 switches and layer-3
performance improvement is greater than the performance reduction.
2. design your applications based on the N-layer architecture.
3. The cost of deploying and maintaining physically distributed applications is high. You need more than one server first. You also need network hardware to connect to these servers. In
Let's talk about the three-tier architecture today. When it comes to a three-tier architecture, some programs may know the concept of a three-tier architecture. However, the essence of Layer 3 may not be very well understood.
First, let's talk about my understanding of Layer 3, that
Write a program that receives a number and displays dependent information based on user input. The switch statement is required, for example, 1, 2, 3, display, Monday, Tuesday, and Wednesday,
// Author: Janushu // Date: 2017/9/20/* function: write a program that can receive a number and display dependent information based on user input, the
by Vikas Singh on SepIn 3-layer architecture
3-layer architecture separates the application into 3 components which consists of Presentation layer business layer and D ATA Acc
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.