CCNPR
Bastian Andres Aranda CisternasDocumentos de Investigación15 de Abril de 2019
1.079 Palabras (5 Páginas)127 Visitas
CONFIGURACION TODA LA MATERIA
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
MODOS DE CONFIGURACION
> = MODO USUARIO -router > "enable"
# = MODO PRIVILEGIADO -router # "configure terminal"
(config)# = MODO CONFIGURACION GLOBAL -router (config)#
______________________________________________________________________________________________________________
NOMBRE DE ROUTER O SWITCH
hostname "BORDE"
______________________________________________________________________________________________________________
CLAVE MD5
router(config)# enable secret "cisco"
______________________________________________________________________________________________________________
MENSAJE DE BIENVENIDA
router(config)# Banner motd "BIENVENIDO"
_____________________________________________________________________________________________________________
GUARDAR CONFIGURACION EN ROUTER O SWITCH
router# copy startup-config
router(config)# do wr
_____________________________________________________________________________________________________________
LINEA DE CONSOLA
line console 0
-password "cisco"
-login
-exit
______________________________________________________________________________________________________________
LINEA VTY O LINEA REMOTA
line vty 0 4
-password "cisco"
-login
-exit
______________________________________________________________________________________________________________
SEGURIDAD MINIMA DE CARACTER
security passwords min-length "NUMERO MINIMO DE CARACTERES DE PASSWORD"
______________________________________________________________________________________________________________
ENCRIPTACION DE CLAVES
service password-encryption
______________________________________________________________________________________________________________
CONFIGURACION DE VLAN
vlan "NUMERO DE VLAN"
-name "NOMBRE DE VLAN"
-exit
______________________________________________________________________________________________________________
ASOCIAR VLAN A LA INTERFACE
interface fasethernet 0/0
- Switch(config-if)#switchport mode access
- Switch(config-if)#switchport access vlan 20
- Exit
_______________________________________________________________________________________________________________
SEGURIDAD DE PUERTO
Switch(config)#interface f0/1
Switch(config-if)#switchport port-security
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
Switch(config-if)#switchport port-security
Switch(config-if)#switchport port-security maximum 2
Switch(config-if)#switchport port-security mac-address sticky
Switch(config-if)#switchport port-security violation shutdown
Switch(config-if)#exit
______________________________________________________________________________________________________________
HABILITAR ENRUTAMIENTO IPV6
Router(config)#ipv6 unicast-routing
_______________________________________________________________________________________________________________
CONFIGURACION DE SUB-INTERFACE
Router(config-if)#interface fastethernet 0/1.10
Router(config-subif)#encapsulation dot1q 10
Router(config-subif)#ip address "192.168.2.1 255.255.255.0"
Router(config-subif)#exit
_______________________________________________________________________________________________________________
RIP V2
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 192.168.2.0
Router(config-router)#no auto-summary
Router(config-router)#exit
______________________________________________________________________________________________________________
CONFIGURACION SSH
ip domain-name "nombre del dominio"
username "nombre" password "contraseña"
line vty 0 4
-transport input ssh
-login local
-exit
crypto key generate rsa
______________________________________________________________________________________________________________
Seguridad minimo de caracter
security password min-leght "numero"
______________________________________________________________________________________________________________
RUTA ESTATICA POR DEFECTO IPV4
ip route 0.0.0.0 0.0.0.0 + "numero de interface de salidad"
_______________________________________________________________________________________________________________
RUTA ESTATICA POR DEFECTO IPV6
ipv6 route ::/0 + "numero interface de salidad"
_______________________________________________________________________________________________________________
RUTA ESTATICA IPV4
ip route "direccion destino + mascara" + "interface de salidad o siguiente salto"
_______________________________________________________________________________________________________________
RUTA ESTATICA IPV6
ipv6 route "direccion destino + prefijo" + "interface o siguiente salto"
_______________________________________________________________________________________________________________
RUTAS FLOTANTES
ip route 0.0.0.0 0.0.0.0 g0/0
ip route 0.0.0.0 0.0.0.0 g0/1 500
_______________________________________________________________________________________________________________
INTERFACE VIRTUAL
interface loopback "numero"
ip address "ip + mascara"
exit
________________________________________________________________________________________________________________
REDISTRIBUCION EN OSPF V2
default-information originate (Para rutas por defecto)
________________________________________________________________________________________________________________
REDISTRIBUCION OSPF V3
default-information originate (Para rutas por defecto)
redistribute static subnets (tag 10 "opcional)
________________________________________________________________________________________________________________
LISTA DE ACCESO (ACL) extendida
access-list "100" "permit/deny" "TCP/UDP/ICMP/IP" 192.168.1.0 0.0.255.255 host 200.0.0.1 eq 80
"numero acl" "permite o deniega" "protocolo" "red de origen y wildcard "red o host de destino" "eq + puerto
PERMITIR EL RESTO DE LAS COMUNICACIONES:
access-list 100 ip any any
*Luego de ingresa a la interfaz vlan donde se genera la negacion"
interface f0/0.10
ip access-group 100 in
exit
__________________________________________________________________________________________________________________
PAT
access-list 1 permit "IP + wilcard" (IP GLOBAL) EJEMPLO: 172.16.0.0 0.0.0.255
ip nat inside source list 1 "interface s0/0/1" (interface que va hacia el ISP) overload
*Luego se separa la red interna y externa.
-interface f0/0
ip nat inside "REDES INTERNA"
exit
-interface s0/0/1
ip nat outside "RED EXTERNA"
exit
___________________________________________________________________________________________________________________
DHCP
ip dhcp excluded-address 172.16.1.1 172.16.1.5 (UN RANGO)
ip dhcp pool "NOMBRE DEL POOL"
network "ip de la red + mascara"
default-router 172.16.1.1
dns-server "ip dns"
exit
____________________________________________________________________________________________________________________
DHCP RELAY
interface f0/0.10 (LO MAS CERCA DEL CLIENTE)
ip helper-address "IP DEL DHCP" (La IP DE LA PUERTA DEL DHCP)
____________________________________________________________________________________________________________________
STP
spanning-tree vlan "1" priority 0 (FORMA 1)
spanning-tree vlan "1" root "primary/secondary" (FORMA 2)
____________________________________________________________________________________________________________________
Configurar Link-local
interface s0/0/0
ipv6 address FE80::1 LINK-LOCAL
____________________________________________________________________________________________________________________
...