A voir également:
- Configuration cisco
- Ethernet n'a pas de configuration ip valide - Guide
- Panneau de configuration - Guide
- Retablir configuration usine chromecast - Guide
- Connaitre configuration pc - Guide
- Configuration astra 19.2 e - Forum TNT / Satellite / Réception
39 réponses
Switch3750#show run
Building configuration...
Current configuration : 3867 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch3750
!
enable secret 5 $1$uniA$6pzOhF6kj8GcPbaep/jks0
!
no aaa new-model
clock timezone UTC 1
clock summer-time UTC recurring last Sun Mar 2:00 last Sun Oct 3:00
switch 1 provision ws-c3750g-48ps
system mtu routing 1500
udld aggressive
ip subnet-zero
ip routing
!
!
mls qos map cos-dscp 0 8 16 26 32 46
!
!
macro global description cisco-global
errdisable recovery cause link-flap
errdisable recovery interval 60
no file verify auto
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface GigabitEthernet1/0/1
switchport trunk encapsulation dot1q
macro description cisco-switch
auto qos voip trust
spanning-tree link-type point-to-point
!
interface GigabitEthernet1/0/2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard en
!
interface GigabitEthernet1/0/4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEt
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
--More--
00:58:06: %IP-4-DUPADDR: Duplicate address 192.168.0.2 on Vlan1, sourced by 001b
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface GigabitEthernet1/0/29
!
interface GigabitEthernet1/0/30
!
interface GigabitEthernet1/0/31
!
interface GigabitEthernet1/0/32
!
interface GigabitEthernet1/0/33
!
interface GigabitEthernet1/0/34
!
interface GigabitEthernet1/0/35
!
interface GigabitEthernet1/0/36
!
interface GigabitEthernet1/0/37
!
interface GigabitEthernet1/0/38
!
interface GigabitEthernet1/0/39
!
interface GigabitEthernet1/0/40
!
interface GigabitEthernet1/0/41
!
interface GigabitEthernet1/0/42
!
interface GigabitEthernet1/0/43
!
interface GigabitEthernet1/0/44
!
interface GigabitEthernet1/0/45
!
interface GigabitEthernet1/0/46
!
interface GigabitEthernet1/0/47
!
interface GigabitEthernet1/0/48
!
interface GigabitEthernet1/0/49
!
interface GigabitEthernet1/0/50
!
interface GigabitEthernet1/0/51
!
interface GigabitEthernet1/0/52
!
interface Vlan1
ip address 192.168.0.2 255.255.255.192
!
interface Vlan2
ip address 192.168.0.66 255.255.255.192
!
interface Vlan3
ip address 192.168.0.130 255.255.255.192
!
interface Vlan4
ip address 192.168.0.194 255.255.255.192
!
ip default-gateway 192.168.0.1
ip classless
ip http server
!
!
control-plane
!
!
line con 0
login
line vty 0 4
password network2
login
length 0
line vty 5 15
password network2
login
length 0
!
end
Switch3750#
Building configuration...
Current configuration : 3867 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch3750
!
enable secret 5 $1$uniA$6pzOhF6kj8GcPbaep/jks0
!
no aaa new-model
clock timezone UTC 1
clock summer-time UTC recurring last Sun Mar 2:00 last Sun Oct 3:00
switch 1 provision ws-c3750g-48ps
system mtu routing 1500
udld aggressive
ip subnet-zero
ip routing
!
!
mls qos map cos-dscp 0 8 16 26 32 46
!
!
macro global description cisco-global
errdisable recovery cause link-flap
errdisable recovery interval 60
no file verify auto
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface GigabitEthernet1/0/1
switchport trunk encapsulation dot1q
macro description cisco-switch
auto qos voip trust
spanning-tree link-type point-to-point
!
interface GigabitEthernet1/0/2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard en
!
interface GigabitEthernet1/0/4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEt
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
--More--
00:58:06: %IP-4-DUPADDR: Duplicate address 192.168.0.2 on Vlan1, sourced by 001b
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface GigabitEthernet1/0/29
!
interface GigabitEthernet1/0/30
!
interface GigabitEthernet1/0/31
!
interface GigabitEthernet1/0/32
!
interface GigabitEthernet1/0/33
!
interface GigabitEthernet1/0/34
!
interface GigabitEthernet1/0/35
!
interface GigabitEthernet1/0/36
!
interface GigabitEthernet1/0/37
!
interface GigabitEthernet1/0/38
!
interface GigabitEthernet1/0/39
!
interface GigabitEthernet1/0/40
!
interface GigabitEthernet1/0/41
!
interface GigabitEthernet1/0/42
!
interface GigabitEthernet1/0/43
!
interface GigabitEthernet1/0/44
!
interface GigabitEthernet1/0/45
!
interface GigabitEthernet1/0/46
!
interface GigabitEthernet1/0/47
!
interface GigabitEthernet1/0/48
!
interface GigabitEthernet1/0/49
!
interface GigabitEthernet1/0/50
!
interface GigabitEthernet1/0/51
!
interface GigabitEthernet1/0/52
!
interface Vlan1
ip address 192.168.0.2 255.255.255.192
!
interface Vlan2
ip address 192.168.0.66 255.255.255.192
!
interface Vlan3
ip address 192.168.0.130 255.255.255.192
!
interface Vlan4
ip address 192.168.0.194 255.255.255.192
!
ip default-gateway 192.168.0.1
ip classless
ip http server
!
!
control-plane
!
!
line con 0
login
line vty 0 4
password network2
login
length 0
line vty 5 15
password network2
login
length 0
!
end
Switch3750#
Bonjour,
Deja il faudrait, si je me souviens bien, affecter tes ports a un Vlan. Pour l'instant ils sont tous dans le Vlan1 (par defaut).
En somme, il faut que tu affectes par ex les ports 1 à 5 au vlan 1, 6 à 20 Vlan2 etc...
Apres la commande, je ne m'n souviens plus, je recherche ma doc. T'as de la chance si je la retrouve!
Courage
DC
Deja il faudrait, si je me souviens bien, affecter tes ports a un Vlan. Pour l'instant ils sont tous dans le Vlan1 (par defaut).
En somme, il faut que tu affectes par ex les ports 1 à 5 au vlan 1, 6 à 20 Vlan2 etc...
Apres la commande, je ne m'n souviens plus, je recherche ma doc. T'as de la chance si je la retrouve!
Courage
DC
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
OK mais ce qui veux dire que ses paquets ne sont pas reconnu dans le Vlan1 car ils portent l'adresse des autres Vlan. Il faudrait qu'il fassent des Vlan sur sont 3750 puis il interconnecte les Vlan 1 à 1 pour que la connection se fasse. Le mode Trunk n'est pas là pour faire du routage, ilest là pour utiliser 1 port au lieu de X ports pour X Vlan.
mais pourqoui je vais diviser les interfaces 3750 en vlans.
j'ai besoin de ces port pour un autre travail(serveur;...).
voici ma configuration au niveau 2960:
hostname Switch2960
!
enable secret 5 $1$C4ZL$/j7ts/zFeWlv0qaQ3dWx4/
!
no aaa new-model
udld aggressive
ip subnet-zero
!
!
mls qos map cos-dscp 0 8 16 26 32 46 46 56
!
!
macro global description cisco-global | cisco-global
errdisable recovery cause link-flap
errdisable recovery interval 60
no file verify auto
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/5
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security ag
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/6
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/7
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security agi
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/8
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/9
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/10
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/11
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/12
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/13
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/14
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/15
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/16
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/17
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/18
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/19
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/20
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/21
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/22
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/23
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/24
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet0/1
switchport mode trunk
macro description cisco-switch
auto qos voip trust
spanning-tree link-type point-to-point
!
interface GigabitEthernet0/2
switchport mode trunk
macro description cisco-switch
auto qos voip trust
spanning-tree link-type point-to-point
!
interface Vlan1
ip address 192.168.0.2 255.255.255.192
no ip route-cache
!
interface Vlan2
ip address 192.168.0.66 255.255.255.192
no ip route-cache
!
interface Vlan3
ip address 192.168.0.130 255.255.255.192
no ip route-cache
!
interface Vlan4
ip address 192.168.0.194 255.255.255.192
no ip route-cache
!
ip default-gateway 192.168.0.1
ip http server
!
control-plane
!
!
line con 0
line vty 0 4
password network1
login
line vty 5 15
password network1
login
!
end
j'ai besoin de ces port pour un autre travail(serveur;...).
voici ma configuration au niveau 2960:
hostname Switch2960
!
enable secret 5 $1$C4ZL$/j7ts/zFeWlv0qaQ3dWx4/
!
no aaa new-model
udld aggressive
ip subnet-zero
!
!
mls qos map cos-dscp 0 8 16 26 32 46 46 56
!
!
macro global description cisco-global | cisco-global
errdisable recovery cause link-flap
errdisable recovery interval 60
no file verify auto
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/5
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security ag
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/6
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/7
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security agi
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/8
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/9
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/10
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/11
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/12
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/13
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/14
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/15
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/16
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/17
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/18
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/19
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/20
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/21
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/22
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/23
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/24
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
macro description cisco-desktop
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet0/1
switchport mode trunk
macro description cisco-switch
auto qos voip trust
spanning-tree link-type point-to-point
!
interface GigabitEthernet0/2
switchport mode trunk
macro description cisco-switch
auto qos voip trust
spanning-tree link-type point-to-point
!
interface Vlan1
ip address 192.168.0.2 255.255.255.192
no ip route-cache
!
interface Vlan2
ip address 192.168.0.66 255.255.255.192
no ip route-cache
!
interface Vlan3
ip address 192.168.0.130 255.255.255.192
no ip route-cache
!
interface Vlan4
ip address 192.168.0.194 255.255.255.192
no ip route-cache
!
ip default-gateway 192.168.0.1
ip http server
!
control-plane
!
!
line con 0
line vty 0 4
password network1
login
line vty 5 15
password network1
login
!
end
tiens j'ai trouvé ça
http://www.lyc-vilgenis-massy.ac-versailles.fr/vilgenis/IMG/pdf/Catalyst3750.pdf
http://www.lyc-vilgenis-massy.ac-versailles.fr/vilgenis/IMG/pdf/Catalyst3750.pdf
pour mon 3750 je peux attribuer:
gi1/0/1 vlan1: 192.168.0.2 255.255.255.192
gi1/0/2 vlan2: 192.168.0.66 255.255.255.192
gi1/0/3 vlan3: 192.168.0.130 255.255.255.192
gi1/0/4 vlan4: 192.168.0.194 255.255.255.192
puis
je fais ip routing
gi1/0/1 vlan1: 192.168.0.2 255.255.255.192
gi1/0/2 vlan2: 192.168.0.66 255.255.255.192
gi1/0/3 vlan3: 192.168.0.130 255.255.255.192
gi1/0/4 vlan4: 192.168.0.194 255.255.255.192
puis
je fais ip routing
as tu lu le pdf?
tout est expliqué dedans. Pour faire du routage inter Vlan il te faut
1 @IP par Vlan et ensuite activer le routage. Par la suite tu etablit ta table de routage .
tout est expliqué dedans. Pour faire du routage inter Vlan il te faut
1 @IP par Vlan et ensuite activer le routage. Par la suite tu etablit ta table de routage .
désolé je suis obligé de decrocher car je m'occupe des enfants qui viennent de rentrer de l'ecole.
Mais vite on reprend.
Le but est d'effectuer du routage inter vlan avec un switch manageable cisco 3750.
A savoir qu'un switch manageable n'est pas un routeur, il n'apprend pas les reseaux et il faut donc lui indiquer les reseaux aini que les ports qui y sont reliés.
Si tu trouve une fonction qui te permets de definir le port trunk en X Vlan alors tant mieux.
Le port trunk ne sert qu'a transporter des paquets identifiés par vlan sur d'autres vlan du swich. si il n'y a pas de correspondance, tes paquets sont purement et simplement detruits.
Il te faut donc autant de Vlan sur ton 3750 que sur l'autre switch. Une fois tes Vlan créés, tu le interconnect par la fonction iprouting.
sommes nous bien d'accord?
Mais vite on reprend.
Le but est d'effectuer du routage inter vlan avec un switch manageable cisco 3750.
A savoir qu'un switch manageable n'est pas un routeur, il n'apprend pas les reseaux et il faut donc lui indiquer les reseaux aini que les ports qui y sont reliés.
Si tu trouve une fonction qui te permets de definir le port trunk en X Vlan alors tant mieux.
Le port trunk ne sert qu'a transporter des paquets identifiés par vlan sur d'autres vlan du swich. si il n'y a pas de correspondance, tes paquets sont purement et simplement detruits.
Il te faut donc autant de Vlan sur ton 3750 que sur l'autre switch. Une fois tes Vlan créés, tu le interconnect par la fonction iprouting.
sommes nous bien d'accord?
autant pour moi!
Mantenant que maman est revenu, c'est plus calme pour moi! lol
Extrait tiré du pdf en lien plus haut
"Remarque : Il faut créer tous les VLANs de l’entreprise dans le commutateur central même quand il n’y a aucun port assigné à ces VLAN. Parce que ce commutateur doit faire le routage entre eux."
extrai n°2
"6. configuration du routage inter-vlan
a. Activer le routage :
Switch#configure terminal
Switch(config)#ip routing
b. Configuration de l’interface virtuelle pour le VLAN 2
Switch#configure terminal
Switch(config)#interface Vlan2
Switch(config−if)#ip address 192.168.2.254 255.255.255.0
Switch(config−if)#no shutdown
c. Configuration de l’interface virtuelle pour le VLAN 3
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface Vlan3
Switch(config−if)#ip address 192.168.3.254 255.255.255.0
Switch(config−if)#no shutdown
Remarque :
◘ Il faut refaire l’opération pour tous les VLANs de l’entreprise (ou ceux qu’on veut router).
◘ Si le switch est relié à un routeur pour accéder à internet, par exemple dans notre cas le port 23, il faut configurer la passerelle par défaut pour tous les VLANs :
Switch(config)#interface FastEthernet 0/23
Switch(config−if)#no switchport
Switch(config−if)#ip address 192.168.16.254 255.255.255.0
Switch(config−if)#no shutdown
Puis ajouter la route par défaut :
Switch(config)#ip route 0.0.0.0 0.0.0.0 192.168.X.X"
je pense qu'on touche au but, non.?
Mantenant que maman est revenu, c'est plus calme pour moi! lol
Extrait tiré du pdf en lien plus haut
"Remarque : Il faut créer tous les VLANs de l’entreprise dans le commutateur central même quand il n’y a aucun port assigné à ces VLAN. Parce que ce commutateur doit faire le routage entre eux."
extrai n°2
"6. configuration du routage inter-vlan
a. Activer le routage :
Switch#configure terminal
Switch(config)#ip routing
b. Configuration de l’interface virtuelle pour le VLAN 2
Switch#configure terminal
Switch(config)#interface Vlan2
Switch(config−if)#ip address 192.168.2.254 255.255.255.0
Switch(config−if)#no shutdown
c. Configuration de l’interface virtuelle pour le VLAN 3
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface Vlan3
Switch(config−if)#ip address 192.168.3.254 255.255.255.0
Switch(config−if)#no shutdown
Remarque :
◘ Il faut refaire l’opération pour tous les VLANs de l’entreprise (ou ceux qu’on veut router).
◘ Si le switch est relié à un routeur pour accéder à internet, par exemple dans notre cas le port 23, il faut configurer la passerelle par défaut pour tous les VLANs :
Switch(config)#interface FastEthernet 0/23
Switch(config−if)#no switchport
Switch(config−if)#ip address 192.168.16.254 255.255.255.0
Switch(config−if)#no shutdown
Puis ajouter la route par défaut :
Switch(config)#ip route 0.0.0.0 0.0.0.0 192.168.X.X"
je pense qu'on touche au but, non.?
bah,
ça pourrait, mais tout cela a déjà été dit et je désespère un peu sur la comprenance de notre ami .
ça pourrait, mais tout cela a déjà été dit et je désespère un peu sur la comprenance de notre ami .
je te l'accorde et c'est vrai que j'en ai perdu mon latin. Je crois qu'il n'a pas fait son plan d'adressage ni son shema de principe.
Esperons qu'il s'en sorte.
Bonne soirée.
Esperons qu'il s'en sorte.
Bonne soirée.