0% found this document useful (0 votes)
20 views12 pages

Leyenda Cisco

The document contains configurations for 6 switches and 2 routers. The configurations set hostnames, passwords, SSH settings, IP addresses, VLAN interfaces, default gateways and descriptions for each device. RSA keys are generated and other security settings are applied across all devices to secure management access.

Uploaded by

Juan Diego LF
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views12 pages

Leyenda Cisco

The document contains configurations for 6 switches and 2 routers. The configurations set hostnames, passwords, SSH settings, IP addresses, VLAN interfaces, default gateways and descriptions for each device. RSA keys are generated and other security settings are applied across all devices to secure management access.

Uploaded by

Juan Diego LF
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CONFIGURACION DEL SWITCH 1

Switch(config-if)#ip default-gateway 192.168.1.11


Switch(config)#hostname SW-1
SW-1(config)#ip domain-name redes.com
SW-1(config)#crypto key generate rsa
The name for the keys will be: SW-1.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-1(config)#line vty 0 15
*Mar 1 2:2:55.753: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-1(config-line)#transport input ssh
SW-1(config-line)#password cisco
SW-1(config-line)#login local
SW-1(config-line)#username Admin privilege 15 secret Admin
SW-1(config)#do wr
Building configuration...
[OK]
SW-1(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-1(config)#do wr
Building configuration...
[OK]
SW-1(config)#service password-encryption
SW-1(config)#do wr
Building configuration...
[OK]

CONFIGURACION DEL SWITCH 2

Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip address 192.168.3.1 255.255.255.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up


Switch(config-if)#ip address 192.168.3.10 255.255.255.0
Switch(config-if)#no shutdown
Switch(config-if)#ip default-gateway 192.168.3.1
Switch(config)#hostname SW-2
SW-2(config)#ip domain-name redes.com
SW-2(config)#crypto key generate rsa
The name for the keys will be: SW-2.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-2(config)#line vty 0 15
*Mar 1 2:6:14.684: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-2(config-line)#transport input ssh
SW-2(config-line)#password cisco
SW-2(config-line)#login local
SW-2(config-line)#username Admin privilege 15 secret Admin
SW-2(config)#do wr
Building configuration...
[OK]
SW-2(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-2(config)#do wr
Building configuration...
[OK]
SW-2(config)#service password-encryption
SW-2(config)#do wr
Building configuration...
[OK]
CONFIGURACION DE SWITCH 3
Switch>ENABLE
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip address 10.0.0.10 255.0.0.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up


Switch(config-if)#ip default-gateway 10.0.0.1
Switch(config)#hostname SW-3
SW-3(config)#ip domain-name redes.com
SW-3(config)#crypto key generate rsa
The name for the keys will be: SW-3.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-3(config)#line vty 0 15
*Mar 1 2:11:36.669: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-3(config-line)#transport input ssh
SW-3(config-line)#password cisco
SW-3(config-line)#login local
SW-3(config-line)#username Admin privilege 15 secret Admin
SW-3(config)#do wr
Building configuration...
[OK]
SW-3(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-3(config)#do wr
Building configuration...
[OK]
SW-3(config)#service password-encryption
SW-3(config)#do wr
Building configuration...
[OK]
CONFIGURACION DEL SWITCH 4
Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip addess 40.0.0.10 255.0.0.0
^
% Invalid input detected at '^' marker.
Switch(config-if)#ip address 40.0.0.10 255.0.0.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up

Switch(config-if)#hostname SW-4
SW-4(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-4(config)#service password-encryption
SW-4(config)#line vty 0 15
SW-4(config-line)#password cisco
SW-4(config-line)#transport input ssh
SW-4(config-line)#login local
SW-4(config-line)#exit
SW-4(config)#interface vlan1
SW-4(config-if)#ip default-gateway 40.0.0.1
SW-4(config)#ip domain-name redes.com
SW-4(config)#crypto key generate rsa
The name for the keys will be: SW-4.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-4(config)#username Admin privilege 15 secret Admin


*Mar 2 2:22:41.133: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-4(config)#do wr
Building configuration...
[OK]

CONFIGURACION DEL SWITCH 5

Switch(config-if)#ip default-gateway 150.200.10.1


Switch(config)#hostname SW-5
SW-5(config)#ip domain-name redes.com
SW-5(config)#ip ssh version 2
Please create RSA keys (of at least 768 bits size) to enable SSH v2.
SW-5(config)#crypto key generate rsa
The name for the keys will be: SW-1.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
SW-5(config)#line vty 0 15
*Mar 1 1:47:22.962: %SSH-5-ENABLED: SSH 2 has been enabled
SW-5(config-line)#transport input ssh
SW-5(config-line)#password cisco
SW-5(config-line)#login local
SW-5(config-line)#username Admin privilege 15 secret Admin
SW-5(config)#do wr
Building configuration...
[OK]
SW-5(config)#service password-encryption
SW-5(config)#do wr
Building configuration...
[OK]
SW-5(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-5(config)#do wr
Building configuration...
[OK]
CONFIGURACION DEL SWITCH 6

Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip address 170.31.10.0 255.255.0.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up

Switch(config-if)#ip default-gateway 170.31.10.1


Switch(config)#hostname SW-6
SW-6(config)#ip domain-name redes.com
SW-6(config)#crypto key generate rsa
The name for the keys will be: SW-6.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-6(config)#line vty 0 15
*Mar 2 2:30:47.957: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-6(config-line)#password cisco
SW-6(config-line)#transport input ssh
SW-6(config-line)#login local
SW-6(config-line)#exit
SW-6(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-6(config)#service password-encryption
SW-6(config)#username Admin privilege 15 secret Admin
SW-6(config)#do wr
Building configuration...
[OK]
SW-6(config)#
CONFIGURACION R.PRINCIPAL
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R-PRINCIPAL
R-PRINCIPAL(config)#enable secret cisco
R-PRINCIPAL(config)#line console 0
R-PRINCIPAL(config-line)#password cisco
R-PRINCIPAL(config-line)#login local
R-PRINCIPAL(config-line)#exit
R-PRINCIPAL(config)#line vty 0 15
R-PRINCIPAL(config-line)#password cisco
R-PRINCIPAL(config-line)#login local
R-PRINCIPAL(config-line)#transport input ssh
R-PRINCIPAL(config-line)#exit
R-PRINCIPAL(config)#username Admin privilege 15 secret Admin
R-PRINCIPAL(config)#service password-encryption
R-PRINCIPAL(config)#banner motd "SOLO PERSONAL AUTORIZADO"
R-PRINCIPAL(config)#interface g0/0
R-PRINCIPAL(config-if)#ip address 200.20.200.2 255.255.255.0
R-PRINCIPAL(config-if)#no shutdown

R-PRINCIPAL(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state


to up

R-PRINCIPAL(config-if)#
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config-if)#
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g2/0
R-PRINCIPAL(config-if)#ip address 200.20.10.1 255.255.255.0
R-PRINCIPAL(config-if)#no shutdown
R-PRINCIPAL(config)#interface g3/0
R-PRINCIPAL(config-if)#ip address 192.168.1.1 255.255.255.0
% 192.168.1.0 overlaps with GigabitEthernet1/0
R-PRINCIPAL(config-if)#ip address 192.168.3.1 255.255.255.0
R-PRINCIPAL(config-if)#no shutdown
R-PRINCIPAL#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-PRINCIPAL(config)#interface g1/0
R-PRINCIPAL(config-if)#description link to R-AREA
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g2/0
R-PRINCIPAL(config-if)#description link to R-SERVICIO
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g1/0
R-PRINCIPAL(config-if)#description link to SW-1
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g2/0
R-PRINCIPAL(config-if)#description link to SW-2
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#

CONFIGURACION DEL R.AREA


Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R-AREA
R-AREA(config)#enable secret cisco
R-AREA(config)#line console 0
R-AREA(config-line)#password cisco
R-AREA(config-line)#login local
R-AREA(config-line)#exit
R-AREA(config)#line vty 0 15
R-AREA(config-line)#password cisco
R-AREA(config-line)#login local
R-AREA(config-line)#trasnport input ssh
^
% Invalid input detected at '^' marker.
R-AREA(config-line)#transport input ssh
R-AREA(config-line)#exit
R-AREA(config)#username Admin privilege 15 secret Admin
R-AREA(config)#service password-encryption
R-AREA(config)#banner motd "SOLO PERSONAL AUTORIZADO"
R-AREA(config)#exit
R-AREA#
%SYS-5-CONFIG_I: Configured from console by console

R-AREA#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-AREA(config)#interface g0/0
R-AREA(config-if)#ip address 150.200.0.1 255.255.0.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state


to up

R-AREA(config-if)#exitt
^
% Invalid input detected at '^' marker.
R-AREA(config-if)#exit
R-AREA(config-if)#exit
R-AREA(config)#interface g2/0
R-AREA(config-if)#ip address 200.20.150.1 255.255.255.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet2/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0, changed state


to up

R-AREA(config-if)#exit
R-AREA(config)#interface g3/0
R-AREA(config-if)#ip address 170.31.0.1 255.255.0.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet3/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0, changed state
to up

R-AREA(config-if)#exit
R-AREA(config)#interface g1/0
R-AREA(config-if)#ip address 200.20.200.1 255.255.255.0
R-AREA(config-if)#no shutdown
R-AREA#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-AREA(config)#interface g1/0
R-AREA(config-if)#description link to R-PRINCIPAL
R-AREA(config-if)#exit
R-AREA(config)#interface g3/0
R-AREA(config-if)#description link to SW-6
R-AREA(config-if)#exit
R-AREA(config)#interface g0/0
R-AREA(config-if)#description link to SW-5
R-AREA(config-if)#
R-AREA(config-if)#exit
R-AREA(config)#interface g2/0
R-AREA(config-if)#descriptio link to R-SERVICIO
R-AREA(config-if)#exit

CONFIGURACION DE R.SERVICIO
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R-SERVICIO
R-SERVICIO(config)#interface g2/0
R-SERVICIO(config-if)#ip address 200.20.150.2 255.255.255.0
R-SERVICIO(config-if)#no shutdown

R-SERVICIO(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet2/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0, changed state


to up

R-SERVICIO(config-if)#exit
R-SERVICIO(config)#enable secret cisco
R-SERVICIO(config)#line console 0
R-SERVICIO(config-line)#password cisco
R-SERVICIO(config-line)#login local
R-SERVICIO(config-line)#exit
R-SERVICIO(config)#line vty 0 15
R-SERVICIO(config-line)#password cisco
R-SERVICIO(config-line)#login local
R-SERVICIO(config-line)#transport input ssh
R-SERVICIO(config-line)#exit
R-SERVICIO(config)#username Admin privilege 15 secret Admin
R-SERVICIO(config)#service password-encryption
R-SERVICIO(config)#banner motd "SOLO PERSONAL AUTORIZADO"
R-SERVICIO(config)#exit
R-SERVICIO#
%SYS-5-CONFIG_I: Configured from console by console
R-AREA(config-if)#exit
R-AREA(config)#interface g3/0
R-AREA(config-if)#ip address 170.31.0.1 255.255.0.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet3/0, changed state to up
R-AREA(config-if)#exit
R-AREA(config)#interface g1/0
R-AREA(config-if)#ip address 200.20.200.1 255.255.255.0
R-AREA(config-if)#no shutdown
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g0/0
R-SERVICIO(config-if)#ip address 10.0.0.1 255.0.0.0
R-SERVICIO(config-if)#no shutdown
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g3/0
R-SERVICIO(config-if)#ip address 40.0.0.1 255.0.0.0
R-SERVICIO(config-if)#no shutdown
R-SERVICIO#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-SERVICIO(config)#interface g2/0
R-SERVICIO(config-if)#description link to R-AREA
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g0/0
R-SERVICIO(config-if)#description link to SW-3
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g3/0
R-SERVICIO(config-if)#description link to SW-4
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g1/0
R-SERVICIO(config-if)#description link to R-PRINCIPAL
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#do wr
Building configuration...
[OK]

You might also like