Brest. Backup : copy flash:ppe_brest1 running-config



Similar documents
CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0

Lab Configuring Syslog and NTP (Instructor Version)

Simple MPLS network topology for Dynamips/Olive

Ejemplo de configuración de punta a punta SBC en un Cisco 7600 Series Router

TotalCloud Phone System

Skills Assessment Student Training (Answer Key)

CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration...

and 2, implemented With Cisco Unified Border Control Element (CUBE)

How To Configure A Cisco Router With A Cio Router

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Configuring Voice and Data Support on VWIC3s

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Motorola TEAM WSM - Cisco Unified Communications Manager Express (CME) Integration

ICND IOS CLI Study Guide (CCENT)

Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Lab Configure Local AAA on Cisco Router

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Lab 5.3.9b Managing Router Configuration Files Using TFTP

SIP Trunking Configuration Guide for Cisco Unified Communications Manager (CUCM) Version with Cisco Unified Border Element (CUBE)

Juniper Networks WX Series Large. Integration on Cisco

Configurazione Rete VoIP

Case Study 1: Registering IP Phones with a remote Call

TP : Configuration de routeurs CISCO

Configurazione Rete VoIP

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuring the MNLB Forwarding Agent

IDT / Net2phone SIP Trunking Configuration Guide for Cisco Business Edition 3000 (BE3000) Release with Cisco Unified Border Element Release 8.8.

ICND1 Lab Guide Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by

IPSec. User Guide Rev 2.2

Lab Configure Basic AP Security through IOS CLI

APNIC Members Training Course Security workshop. 2-4 July, Port Vila Vanuatu. In conjunction with PACNOG 4

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Configuring a Cisco 2509-RJ Terminal Router

Skills Assessment Student Training Exam

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

BRI to PRI Connection Using Data Over Voice

How To Configure A Cisco Vpn On A Cell Phone With A Pkv On A Safd On A Pv On An Asda On A Network With A Network On A Pc Or Ipv On The Ipv (Svv

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Virtual Private Network Setup

Configuring Clocking and Timing

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Configuring Fax Pass-Through

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

Proposal for implementation of VoIP at XYZ hospital.

Virtual Fragmentation Reassembly

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Lab Configure Syslog on AP

Cisco Routers and Switches

LAN-Cell to Cisco Tunneling

CCT vs. CCENT Skill Set Comparison

- The PIX OS Command-Line Interface -

Lab Creating a Network Map using CDP Instructor Version 2500

Remote Access VPN Business Scenarios

Cisco ASA Configuration Guidance

Basic Router Configuration

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

One-Step Lockdown with Cisco SDM

Securing the Connected Enterprise

Enabling Management Protocols: NTP, SNMP, and Syslog

Network Security Knowledge is Everything! Network Operations

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Configuring Modem Transport Support for VoIP

Configuring Static and Dynamic NAT Simultaneously

Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption

TotalCloud Phone System

Deployment Guidelines for QoS Configuration in DSL Environment

Basic Router Configuration Using Cisco Configuration Professional

Configuring Role-Based Access Control

Installation of the On Site Server (OSS)

HOW TO CONFIGURE CISCO FIREWALL PART I

Configuring InterVLAN Routing and ISL/802.1Q Trunking on Catalyst 2900XL/3500XL/2940/2950/2970 Series Switches Using an External Router

Network Simulator Lab Study Plan

Switch Configuration Required to Support Cisco ISE Functions

Document ID: Introduction

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME Rev. A

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Lab 8: Confi guring QoS

Using Link Layer Discovery Protocol in Multivendor Networks

Network Security 2. Module 6 Configure Remote Access VPN

Network Security and AAA

System Components PBX Model. Configuration Tasks

Troubleshooting the Firewall Services Module

Network Diagram Scalability Testbed and Configuration Files

Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440

Flow-Based per Port-Channel Load Balancing

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS

ADTRAN SBC and Cisco Call Manager Express SIP Trunk Interoperability

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Cisco 2621 Gateway-PBX Interoperability: Lucent/Avaya Definity G3si V7 PBX with Cisco CallManager Using T1 PRI NI-2 for an H.

!! Last configuration change at 15:00:48 gmt Thu Oct by admin! NVRAM config last updated at 03:07:42 gmt Wed Nov by admin!

WiNG 5.X How-To Guide

Configuring System Message Logging

Configuring a Leased Line

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Welcome to Todd Lammle s CCNA Bootcamp

EIGRP Routing Protocol & Configuration

Securing Networks with PIX and ASA

Transcription:

Brest Backup : copy flash:ppe_brest1 running-config Cisco SF300-08 Mise en place des services : - Serveurs : 10.3.50.0/24 VLAN 2 (port 1) - DSI : 10.3.51.0/24 VLAN 3 (port 2) - Direction : 10.3.52.0/24 VLAN 4 (port 3) - Finances : 10.3.53.0/24 VLAN 5 (port 4) - Marketing : 10.3.54.0/24 VLAN 6 (port 5) - RH : 10.3.55.0/24 VLAN 7 (port 6) - Accueil : 10.3.56.0/24 VLAN 8 (port 7) Le port 8 est configuré pour dialoguer vers tous les ports VLAN par défaut 1 vers le routeur central «BREST» Il faut spécifier les différentes routes sur le Cisco SF300-08 :

Mise en place du routage entre les différents services afin de limiter les domaines de diffusion. Comment nos VLAN ont été mis en place : VLAN 2 : VLAN 3 : VLAN 4 : VLAN 5 : VLAN 6 : VLAN 7 : VLAN 8 : Pour fini le VLAN par défaut 1 :

Puis, pour finir la configuration des routes : Configuration du routeur Cisco 1941 brest : brest#show run Building configuration... Current configuration : 2126 bytes Last configuration change at 15:39:05 UTC Thu Dec 19 2013 version 15.1 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname brest boot-start-marker boot-end-marker no aaa new-model no ipv6 cef ip source-route ip cef multilink bundle-name authenticated crypto pki token default removal timeout 0 license udi pid CISCO1941/K9 sn FCZ1648C1SF

interface Embedded-Service-Engine0/0 shutdown interface GigabitEthernet0/0 ip address 10.3.0.254 255.255.255.0 ip nat inside ip virtual-reassembly in duplex auto speed auto interface GigabitEthernet0/1 ip address 10.3.2.2 255.255.255.252 ip nat inside ip virtual-reassembly in duplex auto speed auto interface Serial0/0/0 shutdown clock rate 2000000 interface Serial0/0/1 shutdown clock rate 2000000 interface GigabitEthernet0/1/0 interface GigabitEthernet0/1/1 interface GigabitEthernet0/1/2 interface GigabitEthernet0/1/3 switchport access vlan 2 interface Vlan1 interface Vlan2 ip address 172.16.60.1 255.255.240.0 ip nat outside ip nat enable ip virtual-reassembly in ip forward-protocol nd no ip http server no ip http secure-server ip nat inside source list 1 interface Vlan2 overload ip nat inside source static tcp 10.3.0.1 80 172.16.60.1 80 extendable ip route 0.0.0.0 0.0.0.0 172.16.48.152 ip route 10.3.50.0 255.255.255.0 10.3.2.1 ip route 10.3.51.0 255.255.255.0 10.3.2.1 ip route 10.3.52.0 255.255.255.0 10.3.2.1 ip route 10.3.53.0 255.255.255.0 10.3.2.1 ip route 10.3.54.0 255.255.255.0 10.3.2.1 ip route 10.3.55.0 255.255.255.0 10.3.2.1 ip route 10.3.56.0 255.255.255.0 10.3.2.1 access-list 1 permit any control-plane line con 0 line aux 0

line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 login transport input all scheduler allocate 20000 1000 end Puis, la configuration du Switch CISCO SF300-08 interface ethernet e1 switchport mode general vlan database vlan 2-8 interface ethernet e1 switchport general pvid 2 interface ethernet e1 switchport general allowed vlan add 2 untagged switchport trunk allowed vlan add 2 interface ethernet e2 switchport trunk native vlan 3 switchport trunk allowed vlan add 3 interface ethernet e3 switchport trunk native vlan 4 switchport trunk allowed vlan add 4 interface ethernet e4 switchport trunk native vlan 5 switchport trunk allowed vlan add 5 interface ethernet e5 switchport trunk native vlan 6 switchport trunk allowed vlan add 6 interface ethernet e6 switchport trunk native vlan 7 switchport trunk allowed vlan add 7 interface ethernet e7 switchport trunk native vlan 8 switchport trunk allowed vlan add 8 interface vlan 2 name Serveurs interface vlan 3 name DSI interface vlan 4 name Direction interface vlan 5 name Finances

interface vlan 6 name Marketing interface vlan 7 name RH interface vlan 8 name Accueil voice vlan oui-table add 0001e3 Siemens_AG_phone voice vlan oui-table add 00036b Cisco_phone voice vlan oui-table add 00096e Avaya voice vlan oui-table add 000fe2 H3C_Aolynk voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone voice vlan oui-table add 00d01e Pingtel_phone voice vlan oui-table add 00e075 Polycom/Veritel_phone voice vlan oui-table add 00e0bb 3Com_phone interface vlan 1 ip address 10.3.2.1 255.255.255.252 interface vlan 2 ip address 10.3.50.254 255.255.255.0 interface vlan 3 ip address 10.3.51.254 255.255.255.0 interface vlan 4 ip address 10.3.52.254 255.255.255.0 interface vlan 5 ip address 10.3.53.254 255.255.255.0 interface vlan 6 ip address 10.3.54.254 255.255.255.0 interface vlan 7 ip address 10.3.55.254 255.255.255.0 interface vlan 8 ip address 10.3.56.254 255.255.255.0 ip route 0.0.0.0 0.0.0.0 10.3.2.2 ip route 10.3.0.0 255.255.255.0 10.3.2.2 interface vlan 1 dhcp bonjour mode include bonjour service enable csco-sb bonjour service enable http bonjour service enable https bonjour service enable ssh bonjour service enable telnet bonjour interface range vlan-range 1 hostname switchcce2e7 username cisco password 95fbdb3e3d93f62058f8c18acd1d01130b16296c level 15 encrypted no snmp-server enable Après test, on peut accéder depuis le réseau 172.16.48.0/20 au serveur de la DMZ de brest :