设为首页 收藏本站
查看: 656|回复: 0

[经验分享] Cisco3750配置(生产环境)

[复制链接]

尚未签到

发表于 2018-7-12 08:26:03 | 显示全部楼层 |阅读模式
  !
  version 12.2
  no service pad
  service timestamps debug datetime localtime
  service timestamps log datetime localtime
  service password-encryption
  !
  hostname beijiao3750
  !
  boot-start-marker
  boot-end-marker
  !
  no logging console
  enable secret 5 $1$asmC$OBSeNMMe6xQdRV6321rvE1
  enable password 7 030752180500721B1B59090404011C03162AE
  !
  !
  !
  no aaa new-model
  clock timezone beijing 8
  switch 1 provision ws-c3750g-12s
  system mtu routing 1500
  ip routing
  no ip domain-lookup
  ip name-server 192.168.100.100
  no ip dhcp conflict logging
  ip dhcp excluded-address 192.168.198.0
  ip dhcp excluded-address 192.168.198.255
  ip dhcp excluded-address 192.168.199.0
  ip dhcp excluded-address 192.168.198.1 192.168.198.50
  !
  ip dhcp pool beijiao
  network 192.168.198.0 255.255.254.0
  default-router 192.168.199.254
  dns-server 202.98.0.68 202.98.5.68
  lease 0 1
  !
  !
  ip dhcp snooping vlan 109
  no ip dhcp snooping information option
  ip dhcp snooping
  ip arp inspection vlan 109
  ip arp inspection filter beijiao vlan  109
  ipv6 unicast-routing
  !
  mls qos
  !
  crypto pki trustpoint TP-self-signed-2705099264
  enrollment selfsigned
  subject-name cn=IOS-Self-Signed-Certificate-2705099264
  revocation-check none
  rsakeypair TP-self-signed-2705099264
  !
  !
  crypto pki certificate chain TP-self-signed-2705099264
  certificate self-signed 01
  30820244 308201AD A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 32373035 30393932 3634301E 170D3933 30333031 30303031
  34335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 37303530
  39393236 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  8100CA53 DD5DBB4F 50CE86E1 F9D56795 99B22464 AD20DC15 5C641635 CF1200AD
  121033F4 5C833DA4 E2138FB1 C9D38453 B7A60505 E7EB5435 3B3ABD73 87E0DC58
  F2A7424A 9D7E1E26 D3A507B7 EBD96FE3 304184F2 367CE517 6524357C 2B4EE5C5
  08776685 1A19D201 1B63AA7C 3F360051 43256218 B7517ABF E9C2D94F 93701F97
  65950203 010001A3 6C306A30 0F060355 1D130101 FF040530 030101FF 30170603
  551D1104 10300E82 0C626569 6A69616F 33373530 2E301F06 03551D23 04183016
  80147B7A 802DAE52 2C369C7B 53E2E827 86306934 E984301D 0603551D 0E041604
  147B7A80 2DAE522C 369C7B53 E2E82786 306934E9 84300D06 092A8648 86F70D01
  01040500 03818100 9A64C55E 8FA1357D 42F2BAB3 1D2E14A1 B80EEB47 327B9D7B
  E97F2DCA A418B0C6 FE48522A E2F69C86 0D4F25AF 80559994 B8877962 ADC3090B
  9CBE026C CAB1212F ACB00DB9 D5585DA5 D037A1B2 C1E468E4 0772BBCC DACFFE4D
  33AEDB37 24366AC2 EA7A55A9 DCBEBDBE D53C4154 45A07D4F 840ED964 04996897
  7A7AE69A 6EE310BA
  quit
  !
  !
  !
  errdisable recovery cause udld
  errdisable recovery cause bpduguard
  errdisable recovery cause security-violation
  errdisable recovery cause channel-misconfig (STP)
  errdisable recovery cause pagp-flap
  errdisable recovery cause dtp-flap
  errdisable recovery cause link-flap
  errdisable recovery cause sfp-config-mismatch
  errdisable recovery cause gbic-invalid
  errdisable recovery cause l2ptguard
  errdisable recovery cause psecure-violation
  errdisable recovery cause dhcp-rate-limit
  errdisable recovery cause vmps
  errdisable recovery cause storm-control
  errdisable recovery cause inline-power
  errdisable recovery cause arp-inspection
  errdisable recovery cause loopback
  !
  spanning-tree mode pvst
  spanning-tree portfast default
  spanning-tree extend system-id
  spanning-tree vlan 1,109,602 priority 24576
  !
  vlan internal allocation policy ascending
  !
  !

  class-map match-all>  match access-group name limitudp
  !
  !
  policy-map policylimitudp

  class>  police 100000 8000 exceed-action drop
  !
  !
  !
  !
  interface Tunnel0
  no ip address
  !
  interface GigabitEthernet1/0/1
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection limit none
  ipv6 traffic-filter ACCESS_PORT in
  spanning-tree portfast
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/2
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection limit none
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/3
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection limit none
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/4
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection limit none
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/5
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection limit none
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/6
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection limit none
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/7
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/8
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/9
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection limit none
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/10
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ipv6 traffic-filter ACCESS_PORT in
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/11
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ipv6 traffic-filter ACCESS_PORT in
  spanning-tree portfast trunk
  service-policy input policylimitudp
  !
  interface GigabitEthernet1/0/12
  switchport trunk encapsulation dot1q
  switchport mode trunk
  ip arp inspection trust
  ipv6 traffic-filter ACCESS_PORT in
  spanning-tree bpdufilter enable
  !
  interface Vlan1
  ip address 192.168.100.70 255.255.255.128
  ipv6 address 1001:CC0:2020:1::3/64
  ipv6 enable
  ipv6 nd ra suppress
  ipv6 ospf 1 area 0
  !
  interface Vlan109
  ip address 192.168.199.254 255.255.254.0
  ipv6 address 1001:CC0:2020:3001::1/64
  ipv6 enable
  ipv6 nd router-preference High
  ipv6 ospf 1 area 0
  !
  router ospf 1
  log-adjacency-changes
  passive-interface default
  no passive-interface Vlan1
  network 192.168.199.254 0.0.0.0 area 0
  network 192.168.100.70 0.0.0.0 area 0
  !
  no ip http server
  ip http access-class 10
  ip http secure-server
  !
  !
  ip access-list extended limitudp
  deny   udp any any eq domain bootpc bootps snmp snmptrap
  deny   ip 192.168.100.0 0.0.0.255 any
  deny   ip any 192.168.100.0 0.0.0.255
  deny   udp host 192.168.198.10 any
  deny   udp any host 192.168.30.71
  permit udp any any
  ip access-list extended match_all
  permit ip any any
  !
  ip sla enable reaction-alerts
  logging 192.168.100.45
  access-list 10 permit 192.168.100.0 0.0.0.255
  access-list 115 permit ip host 192.168.198.1 host 192.168.30.70
  access-list 115 permit ip host 192.168.30.70 host 192.168.198.1
  access-list 115 deny   udp any any eq 1434
  access-list 115 deny   udp any any eq 1433
  access-list 115 deny   tcp any any eq 135
  access-list 115 deny   udp any any eq 135
  access-list 115 deny   udp any any eq netbios-ns
  access-list 115 deny   udp any any eq netbios-dgm
  access-list 115 deny   tcp any any eq 139
  access-list 115 deny   udp any any eq netbios-ss
  access-list 115 deny   tcp any any eq 445
  access-list 115 deny   tcp any any eq 593
  access-list 115 deny   tcp any any eq 3389
  access-list 115 deny   tcp any any eq 1025
  access-list 115 deny   tcp any any eq 2745
  access-list 115 deny   tcp any any eq 3127
  access-list 115 deny   tcp any any eq 6129
  access-list 115 deny   tcp any any eq 4444
  access-list 115 deny   tcp any any eq 5554
  access-list 115 deny   tcp any any eq 9996
  access-list 115 deny   tcp any any eq 1068
  access-list 115 deny   udp any any eq 8000
  access-list 115 deny   icmp any any
  access-list 115 permit ip any any
  !
  arp access-list beijiao
  permit ip host 192.168.198.1 mac host 001c.25c9.dfdb
  permit ip host 192.168.198.2 mac host 00e0.b800.0570 log
  arp 192.168.198.1 001c.25c9.dfdb ARPA
  arp 192.168.198.2 00e0.b800.0580 ARPA
  ipv6 router ospf 1
  log-adjacency-changes
  !
  !
  !
  snmp-server community rcode RO 10
  snmp-server community public RO
  snmp-server enable traps tty
  snmp-server enable traps license
  snmp-server enable traps stpx root-inconsistency loop-inconsistency
  snmp ifmib ifindex persist
  !
  ipv6 access-list ACCESS_PORT
  remark Block all traffic DHCP server -> client
  deny udp any eq 547 any eq 546
  remark Block Router Advertisements
  deny icmp any any router-advertisement
  permit ipv6 any any
  !
  ipv6 access-list vty-v6-acl
  permit ipv6 1001:CC0:2020:1::/64 1001:CC0:2020:1::/64
  permit ipv6 1001:CC0:2020:1001::/64 1001:CC0:2020:1::/64
  !
  !
  line con 0
  line vty 0 4
  access-class 10 in
  password 7 01100F1758045558741C5E080A16001D19058
  ipv6 access-class vty-v6-acl in
  login
  line vty 5 15
  access-class 10 in
  password 7 01100F1758045558741C5E080A16001D19058
  ipv6 access-class vty-v6-acl in
  login
  !
  ntp clock-period 36028805
  ntp server 192.168.100.45
  end

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-536324-1-1.html 上篇帖子: CISCO交换机常见接口查询相关命令 下篇帖子: Cisco4506 ROMMON 版本升级
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表