Topology Diagram
Addressing Table
Port Assignments (Switches 2 and 3)
Learning Objectives
Addressing Table
Device
(Hostname)
|
Interface
|
IP Address
|
Subnet Mask
|
Default Gateway
|
S1
|
VLAN 99
|
172.17.99.11
|
255.255.255.0
|
N/A
|
S2
|
VLAN 99
|
172.17.99.12
|
255.255.255.0
|
N/A
|
S3
|
VLAN 99
|
172.17.99.13
|
255.255.255.0
|
N/A
|
PC1
|
NIC
|
172.17.10.21
|
255.255.255.0
|
172.17.10.1
|
PC2
|
NIC
|
172.17.20.22
|
255.255.255.0
|
172.17.20.1
|
PC3
|
NIC
|
172.17.30.23
|
255.255.255.0
|
172.17.30.1
|
PC4
|
NIC
|
172.17.10.24
|
255.255.255.0
|
172.17.10.1
|
PC5
|
NIC
|
172.17.20.25
|
255.255.255.0
|
172.17.20.1
|
PC6
|
NIC
|
172.17.30.26
|
255.255.255.0
|
172.17.30.1
|
Port Assignments (Switches 2 and 3)
Ports
|
Assignment
|
Network
|
Fa0/1 –
0/5
|
802.1q
Trunks (Native VLAN 99)
|
172.17.99.0
/24
|
Fa0/6 –
0/10
|
VLAN 30
– Guest (Default)
|
172.17.30.0
/24
|
Fa0/11 –
0/17
|
VLAN 10
– Faculty/Staff
|
172.17.10.0
/24
|
Fa0/18 –
0/24
|
VLAN 20
– Students
|
172.17.20.0
/24
|
Learning Objectives
Upon completion of this lab, you will be able to:
·
Cable a network according to the topology
diagram
·
Erase the startup configuration and reload a
switch to the default state
·
Perform basic configuration tasks on a switch
·
Configure VLAN Trunking Protocol (VTP) on all
switches
·
Enable trunking on inter-switch connections
·
Verify trunk configuration
·
Modify VTP modes and observe the impact
·
Create VLANs on the VTP server, and distribute
this VLAN information to switches in the network
·
Explain the differences in operation between VTP
transparent mode, server mode, and client mode
·
Assign switch ports to the VLANs
·
Save the VLAN configuration
·
Enable VTP pruning on the network
·
Explain how pruning reduces unnecessary
broadcast traffic on the LAN
Task 1: Prepare the Network
Step 1: Cable a network that is similar to the one in the
topology diagram.
You can use any current switch in your lab as long as it
has the required interfaces shown in the topology. The output shown in this lab
is based on 2960 switches. Other switch types may produce different output. If you are using older switches, then some
commands may be different or unavailable.
You will notice in the Addressing Table that the PCs have
been configured with a default gateway IP address. This would be the IP address
of the local router which is not included in this lab scenario. The default
gateway, the router would be needed for PCs in different VLANS to be able to
communicate. This is discussed in a later chapter.
Set up console connections to all three switches.
Step 2: Clear any existing configurations on the switches.
If necessary, refer to Lab 2.5.1, Appendix 1, for the
procedure to clear switch configurations and VLANs. Use the show vlan command to confirm that only
default VLANs exist and that all ports are assigned to VLAN 1.
Switch#show
vlan
VLAN Name Status Ports
----
-------------------------------- --------- -----------------------------
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15,Fa0/16
Fa0/17, Fa0/18, Fa0/19,Fa0/20
Fa0/21, Fa0/22, Fa0/23,Fa0/24
Gig1/1, Gig1/2
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
Step 3: Disable all ports by using the shutdown
command.
Switch(config)#interface range fa0/1-24
Switch(config-if-range)#shutdown
Swtich(config-if-range)#interface range gi0/1-2
Swtich(config-if-range)#shutdown
Task 2: Perform Basic Switch
Configurations
Step 1: Complete basic configuration of switches S1, S2, and S3.
Configure the S1, S2, and S3 switches according to the
following guidelines and save all your configurations:
·
Configure the switch hostname as indicated on
the topology.
·
Disable DNS lookup.
·
Configure an EXEC mode password of class.
·
Configure a password of cisco for console connections.
·
Configure a password of cisco for vty connections.
(Output for S1
shown)
Switch>enable
Switch#configure
terminal
Enter configuration commands, one per
line. End with CNTL/Z.
Switch(config)#hostname S1
S1(config)#enable secret class
S1(config)#no ip domain-lookup
S1(config)#line console 0
S1(config-line)#password cisco
S1(config-line)#login
S1(config-line)#line vty 0 15
S1(config-line)#password cisco
S1(config-line)#login
S1(config-line)#end
%SYS-5-CONFIG_I: Configured from console by
console
S1#copy
running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
Step 2: Re-enable
the user ports on S2 and S3.
Configure the user ports in
access mode. Refer to the topology diagram to determine which ports are
connected to end-user devices.
S2(config)#interface
fa0/6
S2(config-if)#switchport
mode access
S2(config-if)#no
shutdown
S2(config-if)#interface
fa0/11
S2(config-if)#switchport
mode access
S2(config-if)#no
shutdown
S2(config-if)#interface
fa0/18
S2(config-if)#switchport
mode access
S2(config-if)#no
shutdown
S3(config)#interface
fa0/6
S3(config-if)#switchport
mode access
S3(config-if)#no
shutdown
S3(config-if)#interface
fa0/11
S3(config-if)#switchport
mode access
S3(config-if)#no
shutdown
S3(config-if)#interface
fa0/18
S3(config-if)#switchport
mode access
S3(config-if)#no
shutdown
Step 3: Re-enable
the trunk ports on S1, S2 and S3
S1(config)#interface
fa0/1 S1(config-if)#no shutdown S1(config)#interface fa0/2 S1(config-if)#no shutdown
S2(config)#interface
fa0/1 S2(config-if)#no shutdown
S3(config)#interface
fa0/2 S3(config-if)#no shutdown
Task 3: Configure the Ethernet Interfaces on the Host PCs
Configure the Ethernet interfaces of PC1, PC2, PC3, PC4,
PC5, and PC6 with the IP addresses and default gateways indicated in the
addressing table at the beginning of the lab.
Verify that PC1 can ping PC4, PC2 can ping PC5, and that
PC3 can ping PC6.
Task 4: Configure VTP on the Switches
VTP allows the network administrator to control the
instances of VLANs on the network by creating VTP domains. Within each VTP domain, one or more switches are configured as
VTP servers. VLANs are then created on the VTP server and pushed to the other
switches in the domain. Common VTP configuration tasks are setting the
operating mode, domain, and password. In this lab, you will be using S1 as the
VTP server, with S2 and S3 configured as VTP clients or in VTP transparent
mode.
Step 1: Check the current VTP settings on the three switches.
S1#show vtp status
VTP Version : 2
Configuration
Revision : 0
Maximum VLANs
supported locally : 255
Number of existing
VLANs : 5
VTP Operating
Mode : Server
VTP Domain
Name :
VTP Pruning
Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps
Generation : Disabled
MD5 digest :
0x57 0xCD 0x40 0x65 0x63 0x59 0x47 0xBD
Configuration last
modified by 0.0.0.0 at 0-0-00 00:00:00
Local updater ID is
0.0.0.0 (no valid interface found)
S2#show
vtp status
VTP Version : 2
Configuration
Revision : 0
Maximum VLANs
supported locally : 255
Number of existing
VLANs : 5
VTP Operating
Mode : Server
VTP Domain
Name :
VTP Pruning
Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps
Generation : Disabled
MD5 digest :
0x57 0xCD 0x40 0x65 0x63 0x59 0x47 0xBD
Configuration last
modified by 0.0.0.0 at 0-0-00 00:00:00
Local updater ID is
0.0.0.0 (no valid interface found)
S3#show vtp status
VTP Version : 2
Configuration
Revision : 0
Maximum VLANs
supported locally : 255
Number of existing
VLANs : 5
VTP Operating
Mode : Server
VTP Domain
Name :
VTP Pruning
Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps
Generation : Disabled
MD5 digest : 0x57 0xCD 0x40 0x65 0x63 0x59 0x47 0xBD
Configuration last
modified by 0.0.0.0 at 0-0-00 00:00:00
Note that all three switches are in
server mode. Server mode is the default VTP mode for most Catalyst switches.
Step 2: Configure the operating mode, domain name, and VTP
password on all three switches.
Set the VTP domain name to Lab4 and the VTP password to cisco
on all three switches. Configure S1
in server mode, S2 in client mode, and S3 in transparent mode.
S1(config)#vtp
mode server
Device mode already VTP SERVER.
S1(config)#vtp
domain Lab4
Changing VTP domain name from NULL to Lab4
S1(config)#vtp
password cisco
Setting device VLAN database password to cisco
S1(config)#end
S2(config)#vtp
mode client
Setting device to VTP CLIENT mode
S2(config)#vtp
domain Lab4
Changing VTP domain name from NULL to Lab4
S2(config)#vtp
password cisco
Setting device VLAN database password to cisco
S2(config)#end
S3(config)#vtp
mode transparent
Setting device to VTP TRANSPARENT mode.
S3(config)#vtp
domain Lab4
Changing VTP domain name from NULL to Lab4
S3(config)#vtp
password cisco
Setting device VLAN database password to cisco
S3(config)#end
Note: The VTP domain name can be learned by a client
switch from a server switch, but only if the client switch domain is in the
null state. It does not learn a new name if one has been previously set. For
that reason, it is good practice to manually configure the domain name on all
switches to ensure that the domain name is configured correctly. Switches in
different VTP domains do not exchange VLAN information.
Step 3: Configure trunking and the native VLAN for the trunking
ports on all three switches.
Use the interface range command
in global configuration mode to simplify this task.
S1(config)#interface range fa0/1-5
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk native vlan 99
S1(config-if-range)#no shutdown
S1(config-if-range)#end
S2(config)# interface
range fa0/1-5
S2(config-if-range)#switchport mode trunk
S2(config-if-range)#switchport trunk native vlan 99
S2(config-if-range)#no shutdown
S2(config-if-range)#end
S3(config)#
interface range fa0/1-5
S3(config-if-range)#switchport mode trunk
S3(config-if-range)#switchport trunk native vlan 99
S3(config-if-range)#no shutdown
S3(config-if-range)#end
Step 4: Configure port security on the S2 and S3 access layer
switches.
Configure ports fa0/6, fa0/11, and fa0/18 so that they
allow only a single host and learn the MAC address of the host
dynamically.
S2(config)#interface
fa0/6
S2(config-if)#switchport port-security
S2(config-if)#switchport port-security maximum 1
S2(config-if)#switchport port-security mac-address sticky
S2(config-if)#interface fa0/11
S2(config-if)#switchport port-security
S2(config-if)#switchport port-security maximum 1
S2(config-if)#switchport port-security mac-address sticky
S2(config-if)#interface fa0/18
S2(config-if)#switchport port-security
S2(config-if)#switchport port-security maximum 1
S2(config-if)#switchport port-security mac-address sticky
S2(config-if)#end
S3(config)#interface
fa0/6
S3(config-if)#switchport port-security
S3(config-if)#switchport port-security maximum 1
S3(config-if)#switchport port-security mac-address sticky
S3(config-if)#interface fa0/11
S3(config-if)#switchport port-security
S3(config-if)#switchport port-security maximum 1
S3(config-if)#switchport port-security mac-address sticky
S3(config-if)#interface fa0/18
S3(config-if)#switchport port-security
S3(config-if)#switchport port-security maximum 1
S3(config-if)#switchport port-security mac-address sticky
S3(config-if)#end
Step 5: Configure VLANs on the VTP server.
There are four additional
VLANS required in this lab:
·
VLAN 99
(management)
·
VLAN 10
(faculty/staff)
·
VLAN 20
(students)
·
VLAN 30
(guest)
Configure these on
the VTP server.
S1(config)#vlan 99
S1(config-vlan)#name management
S1(config-vlan)#exit
S1(config)#vlan 10
S1(config-vlan)#name faculty/staff
S1(config-vlan)#exit
S1(config)#vlan 20
S1(config-vlan)#name students
S1(config-vlan)#exit
S1(config)#vlan 30
S1(config-vlan)#name guest
S1(config-vlan)#exit
Verify that the VLANs have been created on S1 with the show vlan brief command.
Step 6: Check if the VLANs created on S1 have been distributed to
S2 and S3.
Use the show vlan brief command on S2 and S3 to determine if the VTP server has pushed its VLAN
configuration to all the switches.
S2#show vlan brief
VLAN Name Status Ports
VLAN Name Status Ports
---- -------------------------------- ---------
-----------------------------
1 default active Fa0/1, Fa0/2, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12,Fa0/13
Fa0/14, Fa0/15, Fa0/16,Fa0/17
Fa0/18, Fa0/19,
Fa0/20,Fa0/21
Fa0/22, Fa0/23, Fa0/24, Gi0/1
Gi0/2
10
faculty/staff active
20
students
active
30
guest
active
99
management
active
S3#show vlan brief
VLAN Name
Status Ports
---- -------------------------------- ---------
-----------------------------
1 default active Fa0/1, Fa0/2, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12,Fa0/13
Fa0/14, Fa0/15, Fa0/16,Fa0/17
Fa0/18, Fa0/19, Fa0/20,Fa0/21
Fa0/22, Fa0/23, Fa0/24, Gi0/1
Gi0/2
1002
fddi-default
act/unsup
1003
token-ring-default
act/unsup
1004
fddinet-default
act/unsup
1005
trnet-default
act/unsup
Are the same
VLANs configured on all switches? ________________________ no
Explain why S2
and S3 have different VLAN configurations at this point.
__________________________
____________________________________________________________________________________
____________________________________________________________________________________
S2 is
in VTP client mode and accepts VLAN configurations advertised by a VTP server.
S3 is in VTP transparent mode, so it forwards VTP advertisements but does not
implement the advertised VLANs locally.
Step 7: Create a new VLAN on switch 2 and 3.
S2(config)#vlan
88
%VTP VLAN configuration not allowed when device is
in CLIENT mode.
S3(config)#vlan
88
S3(config-vlan)#name
test
S3(config-vlan)#
Why
are you prevented from creating a new VLAN on S2 but not S3?
____________________________
____________________________________________________________________________________
VLANs can only be created on
switches in VTP server mode or transparent mode.
Delete VLAN 88 from S3.
S3(config)#no vlan 88
Step 8: Manually configure VLANs.
Configure the four VLANs identified in Step 5 on switch
S3.
S3(config)#vlan 99
S3(config-vlan)#name management
S3(config-vlan)#exit
S3(config)#vlan 10
S3(config-vlan)#name faculty/staff
S3(config-vlan)#exit
S3(config)#vlan 20
S3(config-vlan)#name students
S3(config-vlan)#exit
S3(config)#vlan 30
S3(config-vlan)#name guest
S3(config-vlan)#exit
Here you see one of the advantages
of VTP. Manual configuration is tedious and error prone, and any error
introduced here could prevent intra-VLAN communication. In addition, these
types of errors can be difficult to troubleshoot.
Step 9: Configure the management interface address on all three
switches.
S1(config)#interface vlan 99
S1(config-if)#ip address 172.17.99.11 255.255.255.0
S1(config-if)#no shutdown
S2(config)#interface vlan 99
S2(config-if)#ip address 172.17.99.12 255.255.255.0
S2(config-if)#no shutdown
S3(config)#interface vlan 99
S3(config-if)#ip address 172.17.99.13 255.255.255.0
S3(config-if)#no shutdown
Verify that the switches are
correctly configured by pinging between them. From S1, ping the management
interface on S2 and S3. From S2, ping the management interface on S3.
Were the pings successful?
___________________________________________yes
If not, troubleshoot the switch
configurations and try again.
Step 10: Assign switch ports to VLANs.
Refer to the port assignment table at the beginning
of the lab to assign ports to the VLANs. Use the interface range command
to simplify this task. Port assignments are not configured through VTP. Port
assignments must be configured on each switch manually or dynamically using a
VMPS server. The commands are shown for S3 only, but both S2 and S1 switches
should be similarly configured. Save the configuration when you are done.
S3(config)#interface range fa0/6-10
S3(config-if-range)#switchport access vlan 30
S3(config-if-range)#interface range fa0/11-17
S3(config-if-range)#switchport access vlan 10
S3(config-if-range)#interface range fa0/18-24
S3(config-if-range)#switchport access vlan 20
S3(config-if-range)#end
S3#copy running-config startup-config
Destination
filename [startup-config]? [enter]
Building
configuration...
[OK]
S3#
Task 5: Configure VTP Pruning on the Switches
VTP pruning
allows a VTP server to suppress IP broadcast traffic for specific VLANs
to switches that do not have any ports in that VLAN. By default, all unknown unicasts and broadcasts in a VLAN are flooded
over the entire VLAN. All switches in the network receive all broadcasts, even
in situations in which few users are connected in that VLAN. VTP pruning is
used to eliminate or prune this
unnecessary traffic. Pruning
saves LAN bandwidth because broadcasts do not have to be sent to switches that
do not need them.
Pruning is
configured on the server switch with the vtp
pruning command in global
configuration mode. The configuration is pushed to client switches.
Confirm VTP
pruning configuration on each switch using the show vtp status command. VTP pruning mode should be enabled on each
switch.
S1#show vtp
status
VTP Version : 2
Configuration Revision : 17
Maximum VLANs supported locally : 255
Number of existing VLANs : 9
VTP Operating Mode : Server
VTP Domain Name : Lab4
VTP Pruning
Mode : Enabled
<output omitted>
Task 6: Clean Up
Erase the configurations and reload the switches.
Disconnect and store the cabling. For PC hosts that are normally connected to
other networks (such as the school LAN or to the Internet), reconnect the
appropriate cabling and restore the TCP/IP settings.
Final Configurations
Note that
the S2 and S3 configurations are identical, with the exception of the IP
address assigned to the management VLAN (VLAN 99). The VTP configuration is not
saved in the configuration file. It is saved in the vlan.dat file in flash
memory.
S1 Configuration
hostname
S1
enable
secret class
no ip
domain-lookup
!
interface
FastEthernet0/1
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/2
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/3
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/4
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/5
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/6
shutdown
!
<output
omitted – FastEthernet 0/7 through 0/24 are the same as FastEthernet 0/6>
!
interface
GigabitEthernet0/1
shutdown
!
interface
GigabitEthernet0/2
shutdown
!
interface
Vlan1
no ip address
shutdown
!
ip address 172.17.99.11 255.255.255.0
no shutdown
!
line con
0
password cisco
login
line vty
0
no login
line vty
1 4
password cisco
login
line vty
5 15
password cisco
login
!
end
S1#show
vtp status
VTP
Version : 2
Configuration
Revision : 17
Maximum
VLANs supported locally : 255
Number of
existing VLANs : 9
VTP
Operating Mode : Server
VTP
Domain Name : Lab4
VTP
Pruning Mode : Enabled
VTP V2
Mode : Disabled
VTP Traps
Generation : Disabled
MD5
digest : 0xD4 0x02
0x75 0x41 0x70 0x62 0x36 0x3A
Configuration
last modified by 172.17.10.11 at 3-1-93 17:52:49
Local
updater ID is 172.17.10.11 on interface Vl10 (lowest numbered VLAN interface
found)
S2 Configuration
hostname
S2
enable
secret class
no ip
domain-lookup
!
interface
FastEthernet0/1
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/2
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/3
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/4
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/5
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/6
switchport access vlan 30
switchport mode access
switchport port-security
switchport port-security mac-address sticky
!
interface
FastEthernet0/7
switchport access vlan 30
shutdown
!
interface
FastEthernet0/8
switchport access vlan 30
shutdown
!
interface
FastEthernet0/9
switchport access vlan 30
shutdown
!
interface
FastEthernet0/10
switchport access vlan 30
shutdown
!
interface
FastEthernet0/11
switchport access vlan 10
switchport mode access
switchport port-security
switchport port-security mac-address sticky
!
interface
FastEthernet0/12
switchport access vlan 10
shutdown
!
interface
FastEthernet0/13
switchport access vlan 10
shutdown
!
interface
FastEthernet0/14
switchport access vlan 10
shutdown
!
interface
FastEthernet0/15
switchport access vlan 10
shutdown
!
interface
FastEthernet0/16
switchport access vlan 10
shutdown
!
interface
FastEthernet0/17
switchport access vlan 10
shutdown
!
interface
FastEthernet0/18
switchport access vlan 20
switchport mode access
switchport port-security mac-address sticky
!
interface
FastEthernet0/19
switchport access vlan 20
shutdown
!
interface
FastEthernet0/20
switchport access vlan 20
shutdown
!
interface
FastEthernet0/21
switchport
access vlan 20
shutdown
!
interface
FastEthernet0/22
switchport access vlan 20
shutdown
!
interface
FastEthernet0/23
switchport access vlan 20
shutdown
!
interface
FastEthernet0/24
switchport access vlan 20
shutdown
!
interface
GigabitEthernet0/1
shutdown
!
interface
GigabitEthernet0/2
switchport mode trunk
!
interface
Vlan1
no ip address
no ip route-cache
!
interface
Vlan99
ip address 172.17.99.12 255.255.255.0
no shutdown
!
ip http
server
!
line con
0
exec-timeout 0 0
password cisco
logging synchronous
login
line vty
0 4
password cisco
login
line vty
5 15
password cisco
S3 Configuration
hostname
S3
enable
secret class
no ip
domain-lookup
!
vtp domain Lab4
vtp mode transparent
!
vlan 10
name faculty/staff
!
vlan 20
name students
!
vlan 30
name guest
!
vlan 99
name mangement
!
interface
FastEthernet0/1
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/2
switchport
trunk native vlan 99
switchport
mode trunk
!
interface
FastEthernet0/3
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/4
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/5
switchport trunk native vlan 99
switchport mode trunk
!
interface
FastEthernet0/6
switchport access vlan 30
switchport mode access
switchport port-security
switchport port-security mac-address sticky
!
interface
FastEthernet0/7
switchport access vlan 30
!
interface
FastEthernet0/8
switchport access vlan 30
!
interface
FastEthernet0/9
switchport access vlan 30
!
interface
FastEthernet0/10
switchport access vlan 30
!
interface
FastEthernet0/11
switchport access vlan 20
switchport mode access
switchport port-security
switchport port-security mac-address sticky
!
interface
FastEthernet0/12
switchport access vlan 20
!
interface
FastEthernet0/13
switchport access vlan 20
!
interface
FastEthernet0/14
switchport access vlan 20
!
interface
FastEthernet0/15
switchport access vlan 20
!
interface
FastEthernet0/16
switchport access vlan 20
!
interface
FastEthernet0/17
switchport access vlan 20
!
interface
FastEthernet0/18
switchport access vlan 10
switchport mode access
switchport port-security
switchport port-security mac-address sticky
interface
FastEthernet0/19
switchport access vlan 10
!
interface
FastEthernet0/20
switchport access vlan 10
!
interface
FastEthernet0/21
switchport access vlan 10
!
interface
FastEthernet0/22
switchport access vlan 10
!
interface
FastEthernet0/23
switchport access vlan 10
!
interface
FastEthernet0/24
switchport access vlan 10
!
interface
GigabitEthernet0/1
!
interface
GigabitEthernet0/2
!
interface
Vlan1
no ip address
no ip route-cache
shutdown
!
interface
Vlan99
ip address 172.17.99.13 255.255.255.0
no shutdown
!
line con
0
password cisco
login
line vty
0 4
password cisco
login
line vty
5 15
password cisco
login
end
1 comments:
Great work. chemical wash aircon
Post a Comment