Configuration example of cisco router and layer-3 Switch environment, cisco layer-3 SwitchSimple environment configuration instance for cisco router layer-3
network respectively. The following describes the products of these series: 1. Low-end products: 1900 and 2900 are typical low-end products. In fact, Cisco does not take a special advantage in the low-end switch market, because 3Com, Dlink and other companies have better performance and price ratios. The 1900 vswitch is a typical low-end product for desktop computer access at the end of the network. It pro
describes the products of these series:
1. Low-end products
Let's talk about low-end products. 1900 and 2900 are typical low-end products. In fact, Cisco does not take a special advantage in the low-end switch market, because 3Com, Dlink and other companies have better performance and price ratios.
The 1900 vswitch is a typical low-end product for desktop computer access at the end of the network. It provi
Simply put: Layer-1 switchOnly physical layer protocols are supported (one phone-controlled switch can be called ???)L2 SwitchSupports physical layer and data link layer protocols, such as Ethernet switches.L3 SwitchSupports physical
enterprises hope to deploy a high-intelligence, high-availability, and high-reliability storage network (SAN) on the basis of cost control ), or, if you want to extend your SAN infrastructure from an entry-level network to enterprise-level deployment, try to protect your SAN infrastructure investment. Cisco's upcoming CiscoMDS9100 series of multi-layer smart Optical Fiber switches will make customers' wishes a reality.
cannot connect the LAN to the WAN or the Internet, because the routing protocols supported by layer-3 switches are very limited. After all, this is not its main function. We know that on the LAN, a layer-2 switch identifies the packet sender through the source MAC address and forwards the packet according to the desti
Layer-3 Switch for Cisco switches
Although single-arm routing solves the communication problem between different VLANs, it also has its fatal defects:
-The single arm itself is the Backbone link of the network, which is easy to form a network bottleneck.
-The sub-interface relies on physical interfaces, and the application is not flexible
-You need to view the r
Branch switches.The Cisco switch can support any media as a trunk line. To achieve relay, you can use its unique isl tag. Isl (inter-switch link) is a protocol for transmitting vlan information and vlan data streams between switches, between switches and routers, and between switches and servers, by configuring isl encapsulation on the port directly connected to
, adding switches and end devices1, double-click switch into switch command line (CLI) mode, switch configuration mode by command2 in most cases for security reasons, you need to configure the switch privileged mode passwordValidation test3 Configuring the telnet login switchTo achieve remote login, first need to confi
Three-layer switch compared to routers in a large LAN, this function is perfect, to master the three-layer switch is very helpful, but now some manufacturers of switches can also directly connect the Internet to provide router capabilities.
Comparison of three-layer
[Cisco] DHCP relay, layer-3 Switch VLAN Routing PracticeThe experiment topology uses the GNS3 0.8.6 simulator to build a DHCP server using Red Hat 6.5. The experiment requires configuring a layer-3 Switch VLAN routing so that VLAN10 and VLAN20 members can access each other.
) set Spantree Fwddelay delay_# [vlan_#] Sets the time interval from the listening state to the learning state to the forwarding state (default 15 seconds, the value range is 4-30 seconds)4000> (enable) set Spantree Hello Interval_time [vlan_#] Sets the time interval for the root node switch to send BPDUs (default 2 seconds, the value range is 1-10 seconds)4000> (enable) set Spantree maxage agingtime [vlan_
First, network description
The PC1 is connected to the Cisco3550 F0/1 and the rate is 100M;
CISCO3550 's G0/1 for export.
Second, the detailed configuration process
Note: This configuration: Improve the reprint of some of the incorrect configuration.
Each interface supports only one policy in each direction, and one policy can be used for multiple interfaces. Therefore, the download rate limit for all PCs should be defined in the same policy (in this case, Policy-map User-down), while the d
Example:
3026
2012
5012. The value of 2nd bits is 0 ~ 4 indicates that it is a layer-2 switch.
3550. The fifth digit is 5 ~ 9 indicates that it is a layer-3 switch.
LI (LitesoftwareImage) indicates that the device is a weak feature version.
SI (StandardsoftwareImage) i
describe how to combine and deploy the above technologies on CISCO switches for typical Layer 2 attacks and spoofing, to prevent man-in-the-middle attacks, MAC/CAM attacks, DHCP attacks, and address spoofing in the exchange environment, more importantly, address management can be simplified through the deployment of the above technologies, track user IP addresse
the above technologies on CISCO switches to address typical Layer 2 attacks and spoofing, to prevent man-in-the-middle attacks, MAC/CAM attacks, DHCP attacks, and address spoofing in the exchange environment, more importantly, address management can be simplified through the deployment of the above technologies, track user IP addresses and corresponding
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.