method:
Sw port-security violation [protect | restrict | shutdown]
Protect discards packets from an invalid source address without warning
Restrict discards packets from an Invalid Source Address and sends a syslog alarm.
Shutdown (default) closes the port and sends an SNMP trap or Syslog alarm. Unless the Administrator executes the command shut/no shut, the port
192.168.3.0, The subnet mask is 255.255.255.0, And the Gateway: 192.168.3.1 is named work01, vlan4 is the network of client 2, work02, IP address segment is 192.168.4.0, subnet mask: 255.255.255.0, Gateway: 192.168.4.1.
3550 Ports 1-8 are allocated to VLAN 2, ports 9-16 are divided into VLAN 3, and ports 17-24 are allocated to VLAN 4.
To configure DHCP for a CISCO
#十二步 Save ConfigurationDestination filename [startup-config]?Building configuration ...[OK]switch#-=--------Switch#reload#重新启动-----------Press RETURN to get started!00:00:14:%spantree-5-extended_sysid:extended sysid enabled for type VLAN00:00:17:%sys-5-config_i:configured from memory by console00:00:17:%sys-5-restart:system restarted--Cisco Internetwork Operating System SoftwareIOS (tm) C2950 software (c2950-i6q4l2-m), Version 12.1 (9) EA1, RELEASE So
In Cisco 3550, dhcp configuration is often discussed on the network, but there are mostly errors and omissions. According to the configuration described on the internet, after "ip helper-address dhcp server ADDRESS, in the project, I found that the client could not obtain the IP address from the DHCP server. I recently configured 3550 as the DHCP server relay pro
Cisco 3550 switch stp learning notes STP (Spanning Tree Protocol) (IEEE 802.1D) Spanning Tree Protocol-review the working principles of SW: 1. the frame it forwards cannot be modified. create a MAC-PORT ing table based on source MAC learning. forward the frames in the target MAC ing table directly from the corresponding port
to each VLAN, VLAN starts up */"t. E 9U B Kw86 ": 8 www.2cto.comStep 3: Set the port global parameter {tsf-cx kE w _ 0] T-% 0 Switch (Config) interface Range Fa 0/1-24 _ | dT % ZI1 Switch (Config-if-range) Switchport Mode Access /* Add Port 9-16 to VLAN 3 */fq tFe % t Switch (Config) Interface Range Fa 0/9-16 7O [2 # 7n) Switch (Config-if-range) switchport Acce
For complete syntax and application information about this chapter, seeCatalyst 3550 Multilayer Switch Command ReferenceAnd Cisco IOS Interface Command Reference For Release 12.1.
Understanding Interface Types
This section describes different interface types and some reference content for configuring these interfaces in detail in other sections. Other sections describe the configuration process of physi
(config) #no monitor session 1Switch (config) #endSwitch#wrSwitch#show MonitorNo SPAN configuration is present in the system.3. Other(1) Port image filtering, port mirroring can do filter.Monitor session session_number Filter VLAN Vlan-id [, |-]* * Specifies which VLANs belong to the traffic that the source port is entering, and can be emitted from the destinati
GNS3. Eve-ng should also be used with VMware workstation.Eve-ng Installation Tutorial:Software needed: VMware, Eve-ng.ova, WINSCP, SECURECRT, IOU, browser.1: Import the Eve-ng.ova file into VMware. and modify some configuration: memory, CPU, network adapter to change to host-only mode. Network segment to set why you own the same network segment.2: The look after boot. Input Username:root,passwd:eveGet started with some configuration: Modify ROOT_PASSWDConfirm again:Modify hostname:This is follo
Introduction to Cisco Port Channel)Port trunking is used to bind multiple low-bandwidth ports of a vswitch to a high-bandwidth link to achieve load balancing. Avoid link congestion. Through configuration, You can bind two or four ports to forward data on specific ports to prevent packet loss when the forwarding rate of a single link is too low. Advantages of Trun
24-port full-Gigabit Switch forwarding performance and line-end congestion tests. The current 24-port full-Gigabit Switch market is in great competition, some may not know the forwarding Performance Test and line congestion test of 24 full gigabit switches. After reading the
We have explained a lot about the configurations of CISCO switches. Here we will mainly explain the port security configurations of CISCO 3550 switches. Scenario: There is a CISCO3550 switch in a certain unit. For the sake of network security, the security requirements for some ports are high, that is, only the specifi
Server, web server, email server, network device, SQL Server, file server, and printer.
3. view all network devices in one graph
Prtg network monitor can be used to monitor network devices, classify these devices, and view them in a unified graph. In other words, in a graph, you can immediately view the alarms, CPU loads, and response times displayed on the Windows network.
4. Use email or short message service to send a warning
5. Monitor applications on the network and other servers, such as
In order to manage a network, the network grasping the packet Analyzer is essential, but now is no longer the hub era, grab bag is not so easy, but there is always a way to mirror the port, the other port data copy to the port you specify, so you can grab the bag. Today is not about grabbing bags, It is mainly about how to configure the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.