Enable // enter private Mode
Configure terminal // enter global Mode
Service password-encryption // encrypt the password
Hostname Catalyst 3550-12T1 // define the name for the layer-3 Switch
Enable password 123456. // enable password
Enable secret 654321 // The encryption password of enable (it should be garbled, not 654321)
Ip subnet-zero // allow all 0 subnets
domain, or transmit the VTP broadcast information sent by other vswitches In The VTP domain, but it is not involved in the synchronization and allocation of The VTP domain, it does not pass its own VLAN configuration to other switches in The VTP domain. Its VLAN configuration only affects itself.The switch is in Server mode by default.4) create a VLAN. By default, the switch only has VLAN 1. You can use co
) # switchport mode trunk
SW2 (config-if) # no sh
# Configure the VTP client (After configuring the VTP client, you can learn the vlan created on the layer-3 Switch)
SW2 # vlan database
SW2 (vlan) # vtp domain test
SW2 (vlan) # vtp client
SW2 (vlan) # vtp password 123
SW2 (vlan) # vtp pruning
# Add the specified interface to the corresponding vlan
SW2 (config) #
[Cisco] DHCP relay, layer-3 Switch VLAN Routing PracticeThe experiment topology uses the GNS3 0.8.6 simulator to build a DHCP server using Red Hat 6.5. The experiment requires configuring a layer-3 Switch VLAN routing so that VLAN
The h3c layer-3 Switch acl is an example of a new library that can only access the electronic reading room, and cannot access other hosts on the Intranet, so as to avoid security impact. the IP address of the On-Internet www.2cto.com electronic reading room is not opened to 10.0.1.9, the new library plans to divide vlan 11, network segment 10.1.11.0/25, and vlan-
Layer-3 egress connection to the internal port of the firewall
It is recommended that layer-3 core switches use VLAN1 to connect to the firewall's internal port. The Intranet access to the Internet may be slow due to IP redirection !!
The specific examples and solutions are as follows:
The core of a certain Enterprise
eth1.200 hw ether 00: 05: 5D: 61: 00: 31, ifup eth1
A complete VLAN (interface) is successfully added. This function is equivalent to executing vlan 200, ip address 192.168.200.1 255.255.0 on a layer-3 switch.
Configurations on L2 Switches
The configuration on the L2 Switch is the same as before. Take AVAYA P334 as
Layer-3 Switch ACLs are used to isolate different VLANs. Create three VLANs: vlan10 vlan20 vlan30 www.2cto.com PC1 PC3 vlan10 PC2 PC4 vlan20 PC5 vlan30Vlan10 vlan20 vlan30 cannot communicate with each other but can access the Internet Pc1: 172.16.10.2 pc2: 172.16.20.2 pc3: 172.16.10.3 pc4: 172.16.20.3 pc5: 172.16.30.2 configure R1Int f0/0Ip add 192.168.1.2 255.25
Idea: Configure The VTP host and client, enable IP routing, and divide VLAN -----> define IP addresses for each VLAN port, and enable trunk ------> enable DHCP on The vtp server, and define IP-pool, set different CIDR blocks to VLAN interface IP addresses as gateways ------> Add ports to corresponding VLANs -------> set management IP addresses and passwords of vswitches
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/4C/42/wKiom1Q6Ms_AiVU2AAH5SP-f5do600.jpg "Title =" Capture 2.jp
Two-layer switching technology is a mature development, two-layer switch is a data link layer device, can identify the Mac in the packet
Address information, forwarding based on MAC addresses, and recording these MAC addresses with corresponding ports in one of their own.
Address table. The specific work flow is as fol
Today, the tutor told me about the company's network topology, related to the switch, the basic concept of routers and principles, I am not very clear, so on the internet to learn the information to learn a bit, and then feel that this article is good, so it reproduced, but I reproduced not the original text, and did not attach the original link.
Here I posted a link to my reprinted article: http://blog.csdn.net/herostarone/article/details/8256235
Two
Many SME internal network structures are simple, with only one switch connecting all employees and servers together and then accessing the Internet through fiber optics. Of course, in order to ensure the security of some hosts and split the internal broadcast packet to improve the network transmission speed, take such as partition VLAN, the allocation of different subnets to achieve. By partitioning VLANs, clients on different ports on the same
Two-tier switch:The second layer switching technology is more mature, two layer switch is a data link layer device, can identify the MAC address information in the packet, according to the MAC address to forward, and these MAC addresses and corresponding ports recorded in their own internal table of addresses. Specific
transmission and commerce far exceeds the improvement of computer processing power. Offloading content to a web switch balances the entire site's infrastructure.
------------------Layer 3 switch is to lead the switch by feature!! The 2-tier is based on MAC address access!--
Two-layer switch:
Two-layer switching technology is a mature development, two-layer switch is a data link layer device, can identify the MAC address information in the packet, according to the MAC address forwarding, and the MAC
How does a multi-layer switch realize interconnection between different network segments ?, Multi-layer switch
Lab Name:How does a multi-layer switch implement intercommunication between different network segments?
Lab requirement
" IP address broadcast an ARP request, if the third switch module in the previous communication process has obtained B's MAC address, then to send station a reply to B's MAC address; otherwise the third Layer switch module broadcasts an ARP request to the destination station based on the routing information, and B gets the ARP request to The third
Let's take a look at the differences between Layer 2 switches, Layer 3 switches, and Layer 4 switches.
(1) Differences Between Layer 2 switches, Layer 3 switches, and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.