<sw2 10.9.16.
2>display current-configuration
!Software Version V200R022C00SPC500
#
sysname sw2 [Link]
#
vlan batch 2 to 7
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name multi_authen_profile
authentication-profile name portal_authen_profile
#
telnet server enable
telnet server-source all-interface
#
dhcp enable
#
dhcp snooping enable
#
radius-server template default
#
pki realm default
certificate-check none
#
free-rule-template name default_free_rule
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme default
authentication-mode local
<sw2 [Link]>
<sw2 [Link]>
<sw2 [Link]>display current-configuration
!Software Version V200R022C00SPC500
#
sysname sw2 [Link]
#
vlan batch 2 to 7
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name multi_authen_profile
authentication-profile name portal_authen_profile
#
telnet server enable
telnet server-source all-interface
#
dhcp enable
#
dhcp snooping enable
#
radius-server template default
#
pki realm default
certificate-check none
#
<sw2 [Link]>display current-configuration
!Software Version V200R022C00SPC500
#
sysname sw2 [Link]
#
vlan batch 2 to 7
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name multi_authen_profile
authentication-profile name portal_authen_profile
#
telnet server enable
telnet server-source all-interface
#
dhcp enable
#
dhcp snooping enable
#
radius-server template default
#
pki realm default
certificate-check none
#
free-rule-template name default_free_rule
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme default
authentication-mode local
authentication-scheme radius
authentication-mode radius
authorization-scheme default
authorization-mode local
accounting-scheme default
accounting-mode none
local-aaa-user password policy administrator
password history record number 0
password expire 0
domain default
authentication-scheme radius
accounting-scheme default
radius-server default
domain default_admin
authentication-scheme default
accounting-scheme default
#
interface Vlanif1
ip address [Link] [Link]
#
interface GigabitEthernet0/0/1
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/2
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/3
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/4
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/5
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/6
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/7
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/8
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/9
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/10
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/11
description to AP
port link-type trunk
port trunk allow-pass vlan 2 to 4094
#
interface GigabitEthernet0/0/12
description to AP
port link-type access
port default vlan 2
stp edged-port enable
#
interface GigabitEthernet0/0/13
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/14
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/15
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/16
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/17
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/18
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/19
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/20
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/21
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/22
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/23
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/24
description to CCTV
port link-type access
port default vlan 4
stp edged-port enable
dhcp snooping enable
dhcp snooping trusted
#
interface GigabitEthernet0/0/25
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface GigabitEthernet0/0/26
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface GigabitEthernet0/0/27
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface GigabitEthernet0/0/28
description to trunk
port link-type trunk
port trunk allow-pass vlan 2 to 4049
#
interface NULL0
#
undo icmp name timestamp-request receive
#
ip route-static [Link] [Link] [Link]
#
ssh server cipher aes256_ctr aes128_ctr
ssh server hmac sha2_256
ssh server key-exchange dh_group16_sha512 dh_group15_sha512 dh_group14_sha256
dh_group_exchange_sha256
ssh client cipher aes256_ctr aes128_ctr
ssh client hmac sha2_256
ssh client key-exchange dh_group16_sha512 dh_group15_sha512 dh_group14_sha256
dh_group_exchange_sha256
ssh server dh-exchange min-len 2048
ssh server publickey rsa_sha2_512 rsa_sha2_256
#
user-interface con 0
authentication-mode password
set authentication password cipher $1a$9K96>XON.4$r[0)%v}GZLDU~2XOF6ZUjy0xUqAy
%CBM}&O$EEtO$
user-interface vty 0 4
authentication-mode password
user privilege level 15
set authentication password cipher $1a$pQ]dH0`#5K$HH-!'@o;@S<}D,GmX=+
$CYqxK+<PE6DHCyVl3j>W$
protocol inbound telnet
user-interface vty 16 20
#
dot1x-access-profile name dot1x_access_profile
#
mac-access-profile name mac_access_profile
#
ops
#
remote-unit
#
return