View Single Post
Sitat av mroek Vis innlegg
Men hva har du bak Ciscoen, og hvordan er det satt opp i dag? Er ikke noe poeng å bare dele en konfig, den vil neppe passe dine behov uansett.
Vis hele sitatet...
Hei Mroek,

Bak ciscoen har jeg en brannur i en router on the stick konfigurasjon. Har lagt en del vlan utenom de som lyse har for å separere ett gjeste-nett fra resten av de vlanene som jeg har hjemme. Jeg bruker 5 cisco smb200-10. Har en trunk med de forskjellige vlanene som jeg sender rundt i huset. Det er jeg bare lurer litt på er de nye config endringene og hvordan jeg får satt dem. Vedlegger config slik den er nå:


WARNING !!!!!!
This is a private computer facility. Access to it for any reason must be
specifically authorized. Your continued access or further enquiry may
expose you to criminal and/or civil proceedings.

All information in this computer system, including messages, is the property
of the company. The company reserves the right to access and disclose all
information sent through or stored in this computer system, for any purposes.




User Name:cisco
Password:********

Password is about to expire in 5 days.


coreswitch#show running-config
config-file-header
coreswitch
v1.4.1.3 / R800_NIK_1_4_194_194
CLI v1.0
set system mode router

file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
port jumbo-frame
vlan database
vlan 2,5,7,100-102
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network VLAN 1
address low 192.168.1.100 high 192.168.1.149 255.255.255.0
default-router 192.168.1.254
dns-server 92.220.228.70
exit
ip dhcp pool network VLAN 2
address low 192.168.2.100 high 192.168.2.220 255.255.255.0
default-router 192.168.2.254
dns-server 92.220.228.70
exit
ip dhcp pool network VLAN 5
address low 192.168.5.100 high 192.168.5.149 255.255.255.0
default-router 192.168.5.254
dns-server 109.247.114.4
exit
ip dhcp pool network VLAN 7
address low 192.168.7.100 high 192.168.7.149 255.255.255.0
default-router 192.168.7.254
dns-server 109.247.114.4
exit
bonjour interface range vlan 1
qos trust cos-dscp
ip access-list extended Guest
permit ip 192.168.5.0 0.0.0.255 192.168.2.11 0.0.0.0 ace-priority 1
permit ip 192.168.5.0 0.0.0.255 192.168.2.12 0.0.0.0 ace-priority 2
permit ip 192.168.5.0 0.0.0.255 192.168.2.13 0.0.0.0 ace-priority 3
permit ip 192.168.5.0 0.0.0.255 192.168.2.14 0.0.0.0 ace-priority 4
permit ip 192.168.5.0 0.0.0.255 192.168.2.15 0.0.0.0 ace-priority 5
deny ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255 ace-priority 6 log-input
deny ip 192.168.5.0 0.0.0.255 192.168.2.0 0.0.0.255 ace-priority 7 log-input
exit
priority-queue out num-of-queues 2
wrr-queue bandwidth 2 1
hostname coreswitch
logging file debugging
aaa authentication login authorization SSH local
aaa authentication enable authorization SSH enable
line ssh
login authentication SSH
enable authentication SSH
password da39a3ee5e6b4b0d3255bfef95601890afd80709 encrypted
exit
enable password level 15 encrypted 1a06f7b8041dd010398636f0e408e167bd6ae0fa
no passwords complexity not-current
passwords aging 0
username cisco password encrypted 1a06f7b8041dd010398636f0e408e167bd6ae0fa privilege 15
username torgeir password encrypted 58ce77d049d90266edab69f856f66d2c71a370e4 privilege 15
ip ssh server
snmp-server server
snmp-server location "xxxxxxxxx"
snmp-server contact "xxxxxxxxxx"
snmp-server community cisco_core rw 192.168.2.35 view Default
snmp-server host 192.168.2.35 traps version 2c cisco_core
clock timezone " " 2
clock source sntp
clock source browser
ip name-server 109.247.114.4 92.220.228.70
!
interface vlan 1
ip address 192.168.1.254 255.255.255.0
no ip address dhcp
!
interface vlan 2
name hjemme-nett
ip address 192.168.2.254 255.255.255.0
!
interface vlan 5
name Guest
ip address 192.168.5.254 255.255.255.0
service-acl input Guest default-action permit-any
!
interface vlan 7
name TV
ip address 192.168.7.254 255.255.255.0
!
interface vlan 101
name IPTV
!
interface vlan 102
name LyseInternett
!
interface gigabitethernet1
switchport mode access
!
interface gigabitethernet2
description Trunk
switchport trunk allowed vlan add 2,5,7,101
!
interface gigabitethernet3
shutdown
no snmp trap link-status
switchport mode access
!
interface gigabitethernet4
shutdown
no snmp trap link-status
!
interface gigabitethernet5
shutdown
no snmp trap link-status
!
interface gigabitethernet6
description IPTV
no spanning-tree portfast
switchport mode access
switchport access vlan 101
!
interface gigabitethernet7
shutdown
description "TV-dekoder stue"
no snmp trap link-status
no spanning-tree portfast
no macro auto smartport
!
interface gigabitethernet8
description Til_Firewall
no spanning-tree portfast
switchport mode access
switchport access vlan 102
macro description "cisco-desktop "
no macro auto smartport
!
interface gigabitethernet9
description Lyse-Fiber
switchport trunk allowed vlan add 101-102
macro description "cisco-switch "
!
interface gigabitethernet10
shutdown
no snmp trap link-status
!
exit
banner login ^C
WARNING !!!!!!
This is a private computer facility. Access to it for any reason must be
specifically authorized. Your continued access or further enquiry may
expose you to criminal and/or civil proceedings.
All information in this computer system, including messages, is the property
of the company. The company reserves the right to access and disclose all
information sent through or stored in this computer system, for any purposes.
^C
ip default-gateway 192.168.1.1