Basic Switch Configuration Objective • • • •
Investigate the default configuration of a 1900 series switch. Configure a switch with a name and an IP address. Configure passwords to ensure that access to the CLI is secured. Save the active configuration.
Background / Preparation Cable a network similar to the one in the diagram. We will use this diagram for following labs. Start a HyperTerminal session. General Configuration Tips • Using the question mark (?) and arrow keys help to enter commands. • Each command mode restricts the set of available commands. If there is difficulty entering a command, check the prompt and then enter the question mark (?) for a list of available commands. The problem might be a wrong command mode or using the wrong syntax. • To disable a feature, enter the keyword no before the command; for example, no ip address Before starting labs, erase and reload the switch using following procedure: > enable # delete vtp This command resets the switch with VTP parameters set to factory defaults. All other parameters will be unchanged. Reset system with VTP parameters set to factory defaults, [Y]es or [N]o? Enter y and press [Enter] At the privileged exec mode enter the command erase startup-config as follows: # delete nvram This command resets the switch with factory defaults. All system parameters will revert to their default factory settings. All static and dynamic addresses will be removed.
Reset system with factory defaults, [Y]es or [N]o? Enter y and press [Enter] Erase of nvram: complete At the privileged exec mode enter the reload command as follows: # reload System configuration has been modified. Save? [yes/no]: Type n and then press Enter. Proceed with reload? [confirm] [enter] Step 1 Examine the switch a. What indicator lights (LEDs) are on the front of the switch? SYSTEM: Switch is on, led colors: Green – all post test passed, there are 13 tests and port led indicates, which test is switch executing Orange, but switch is functional – post detected one or more non-fatal failures, switch is forwarding packets, but is operating at degraded fashion Orange + one or more LEDs are orange – post detected one or more fatal failures, switch is not operational and management console is not available RPS: Remote Power Supply, led colors: Green – operational Flashing Green – RPS and local power supply are both powered, only one power source can be supplying power to switch Orange – RPS failure b. What button is on the front of the switch? What is it used for? MODE button changes among these modes: STAT – Port Status, led colors: Off – no link Green – link present Flashing Green – port operational Alternating Green / Orange – error frames, excessive collisions, CRC error packets Orange – port is not forwarding or is disabled in management console, suspended due to MAC address violation or by STP due to loops. During first 30 seconds since the switch boots-up or cable is connected to switch port, the port is not forwarding because switch and host are agreeing on connection parameters UTL – Utilization of the switch, led colors: First one third of switch ports indicate low utilization of switch, second indicate medium utilization, third indicate high-to-very high utilization of switch. FDUP – which ports operates at Full Duplex, led colors: Off – port is operating at Half Duplex Green – port is operating at Full Duplex 100 – which ports operates at 100Mbps Step 2 Enter privileged mode
a. Privileged mode gives access to all the switch commands. Many of the privileged commands configure operating parameters. Therefore, privileged access should be password-protected to prevent unauthorized use. The privileged command set includes those commands contained in user EXEC mode, as well as the configure command through which access to the remaining command modes are gained. > enable # b. Notice the prompt changed in the configuration to reflect privileged exec mode. Step 3 Examine the current switch configuration a. Examine the following current running configuration file. # show running-config b. How many Ethernet or Fast Ethernet interfaces does the switch have? c. What is the range of values shown for the VTY lines? d. Issue the following to show the current IP address of the switch. # show ip Step 4 Get IOS information a. Examine the following version information that the switch reports. # show version b. What is the IOS version that the switch is running? c. What is the system image file name? d. What is the base MAC address of this switch? e. Is the switch running enterprise edition software? Step 5 Examine the Ethernet interfaces a. Examine the default properties of the Ethernet interfaces, e.g. fourth port: # show interface ethernet 0/4 b. Is the interface up or down? c. What event would make the interface go up? d. What is the MAC address of the interface? e. What is the speed and duplex setting of the interface? Step 6 Examine VLAN information a. Examine the following default VLAN settings of the Switch # show vlan b. What is the name of VLAN 1? c. Which ports are in this VLAN? d. Is VLAN 1 active? e. What type of VLAN is the default VLAN? Step 7 Assign a name to the switch a. Enter enable and then the configuration mode. The configuration mode allows the management of the switch. Enter AL Switch, the name this switch will be referred to in the following # configure terminal
Enter the configuration commands, one for each line. End by pressing Ctrl + Z. (config)# hostname 1900 Step 8 Set the command mode passwords a. Set the enable password to class and the enable secret password to cisco as follows: 1900(config)# enable password level 15 class 1900(config)# enable secret cisco b. Which password takes precedence, the enable password or enable secret password? _______ Step 9 Configure the layer 3 access to the switch a. Set the IP address of the switch and default-gateway based on information from Windows “ipconfig” command: 1900(config)# ip address 1900(config)# ip default-gateway b. Now list the configuration using: 1900# show ip Step 10 Examine the configuration file a. Commands entered on Catalyst 1900 series switches are directly written into NVRAM. To see the configuration stored there use: 1900# show running-config b. What is displayed? c. Are all the changes that were entered recorded in the file?