[go: up one dir, main page]

0% found this document useful (0 votes)
62 views6 pages

SW2 Configuration Overview and Settings

The document provides the current configuration of a network switch identified as 'sw2' with IP address 10.9.16.2. It includes settings for VLANs, authentication profiles, DHCP, telnet, and various interfaces configured for trunk and access modes. Additionally, it details security features such as DHCP snooping and SSH settings.

Uploaded by

kolokoalex342
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views6 pages

SW2 Configuration Overview and Settings

The document provides the current configuration of a network switch identified as 'sw2' with IP address 10.9.16.2. It includes settings for VLANs, authentication profiles, DHCP, telnet, and various interfaces configured for trunk and access modes. Additionally, it details security features such as DHCP snooping and SSH settings.

Uploaded by

kolokoalex342
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

<sw2 10.9.16.

2>display current-configuration
!Software Version V200R022C00SPC500
#
sysname sw2 [Link]
#
vlan batch 2 to 7
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name multi_authen_profile
authentication-profile name portal_authen_profile
#
telnet server enable
telnet server-source all-interface
#
dhcp enable
#
dhcp snooping enable
#
radius-server template default
#
pki realm default
certificate-check none
#
free-rule-template name default_free_rule
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme default
authentication-mode local

<sw2 [Link]>
<sw2 [Link]>
<sw2 [Link]>display current-configuration
!Software Version V200R022C00SPC500
#
sysname sw2 [Link]
#
vlan batch 2 to 7
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name multi_authen_profile
authentication-profile name portal_authen_profile
#
telnet server enable
telnet server-source all-interface
#
dhcp enable
#
dhcp snooping enable
#
radius-server template default
#
pki realm default
certificate-check none
#

<sw2 [Link]>display current-configuration


!Software Version V200R022C00SPC500
#
sysname sw2 [Link]
#
vlan batch 2 to 7
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name multi_authen_profile
authentication-profile name portal_authen_profile
#
telnet server enable
telnet server-source all-interface
#
dhcp enable
#
dhcp snooping enable
#
radius-server template default
#
pki realm default
certificate-check none
#
free-rule-template name default_free_rule
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme default
authentication-mode local
authentication-scheme radius
authentication-mode radius
authorization-scheme default
authorization-mode local
accounting-scheme default
accounting-mode none
local-aaa-user password policy administrator
password history record number 0
password expire 0
domain default
authentication-scheme radius
accounting-scheme default
radius-server default
domain default_admin
authentication-scheme default
accounting-scheme default
#
interface Vlanif1
ip address [Link] [Link]
#
interface GigabitEthernet0/0/1
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/2
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/3
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/4
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/5
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/6
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/7
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/8
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/9
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/10
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/11
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/12
description to AP
port link-type access
port default vlan 2
stp edged-port enable
#
interface GigabitEthernet0/0/13
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/14
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/15
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/16
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/17
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/18
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/19
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/20
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/21
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/22
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/23
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/24
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/25
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface GigabitEthernet0/0/26
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface GigabitEthernet0/0/27
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface GigabitEthernet0/0/28
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface NULL0
#
undo icmp name timestamp-request receive
#
ip route-static [Link] [Link] [Link]
#
ssh server cipher aes256_ctr aes128_ctr
ssh server hmac sha2_256
ssh server key-exchange dh_group16_sha512 dh_group15_sha512 dh_group14_sha256
dh_group_exchange_sha256
ssh client cipher aes256_ctr aes128_ctr
ssh client hmac sha2_256
ssh client key-exchange dh_group16_sha512 dh_group15_sha512 dh_group14_sha256
dh_group_exchange_sha256
ssh server dh-exchange min-len 2048
ssh server publickey rsa_sha2_512 rsa_sha2_256
#
user-interface con 0
authentication-mode password
set authentication password cipher $1a$9K96>XON.4$r[0)%v}GZLDU~2XOF6ZUjy0xUqAy
%CBM}&O$EEtO$
user-interface vty 0 4
authentication-mode password
user privilege level 15
set authentication password cipher $1a$pQ]dH0`#5K$HH-!'@o;@S<}D,GmX=+
$CYqxK+<PE6DHCyVl3j>W$
protocol inbound telnet
user-interface vty 16 20
#
dot1x-access-profile name dot1x_access_profile
#
mac-access-profile name mac_access_profile
#
ops
#
remote-unit
#
return

You might also like