This article covers steps to set up a basic level cisco switch.
Switch to config mode
1. enable
2. conf t
Create VLANs
1. VLAN 10,20,30,40
2. end
3. Show vlan to see the vlans you have created
4. wri mem
Grant IP command on SWITCH for each VLAN:
1. Create IP for interface vlan 10 vlan 10
2. Entering ip address 10.196.10.1 255.255.255.0 vlan 10 to ip
3. No shutdown vlan 10 port opening
4. END
5. wri mem
1. Create IP for interface vlan 11 vlan 11
2. Entering ip address 10.196.20.1 for 255.255.255.0 vlan 11
3. No shutdown vlan 11 port opening
4. END
5. wri mem
1. Create IP for interface vlan 12 vlan 12
2. Entering ip address 10.196.30.1 255.255.255.0 ip for vlan 12
3. No shutdown vlan 12 port opening
4. END
5. wri mem
1. Create IP for interface vlan 13 vlan 13
2. Entering ip address 10.196.40.1 255.255.255.0 ip for vlan 13
3. No shutdown vlan 13 port opening
4. END
5. wri mem
Active ROUTING command on SWICH, Grant access between VLANs VLAN routing
1. IP routing
2. end
3. wri mem
Command to assign the physical ports on SWICH to the VLANs we created
2. interface gigabitEthernet 0/1
3. switchport mode access this command turns on communication with other VLANs.
4. switchport access vlan 10
5. No shutdown
6. END
7. wri mem
Define a Default Gateway to the switch (To output multiple VLANs to the internet through a single gateway, the cisco switch e default rout must be entered.)
1. ip route 0.0.0.0 0.0.0 10.196.100.254 (this is the Fortinin Gateway)
2. end
3. Show ip route (*default* to the top* will be the default gateway)
4. wri mem
SO THAT THE CONFIGURATIONS YOU MAKE WHILE WORKING ON CISCO SWITCHES DO NOT GO AWAY
1. wri mem
VLAN DELETION
1. Enable
2. conf t
3. No VLAN 130
------------------------------------------------
* MAKING PORTS TRUNK
1. Enable
2. conf t
3. interface gigabitEthernet 0/1
4. The switchport trunk encapsulation dot1q L3 switch in Cisco needs to set the encapsulation mode before making the trunk.
5. switchport mode trunk
6. Show interfaces trunk displaying Defined Trunk Ports
What is TRUNK? Access Ports move data from devices in a VLAN between Switches. Access Ports only pass traffic from VLAN defined to port 1 on the Switch. Dozens of Vlans can be defined on Cisco switches. In this case, defining an Access Port for each Vlan would not be a logical and useful option. In switches with a large number of Vlan configurations, it is possible to move the data of many Vlans through the Trunk Port by defining the Trunk Mode between the two interfaces. The VLAN information undergoes encapsulation before it passes through the Trunk Port. This encapsulation is ISL or 802.1Q.
Where is TRUNK used? If you add one more Switch to the network environment, the ports connected to the Switch from the Switch are
------------------------------------------------
* Making PORTS Access in Switchport Mode
2. interface gigabitEthernet 0/1
3. switchport mode access this command turns on communication with other VLANs.
4. switchport access vlan 10
5. No shutdown
6. END
7. wri mem
What is Switchport Mode Access? In short, all computers that will be connected to the Switch are configured as access modes!
------------------------------------------------
Arif Akyüz
Content Producer & Cyber Security Expert
[email protected]
- .bak the process of opening and importing a SQL file
- .NET Framework 3.5 installation fails
- 1. Change user password with CMD
- 2. Create users with CMD
- 3. Delete a user with CMD
- 4. Open Port Inquiry CMD
- 5. Learning external IP with CMD
- 6. Domaine Alma with CMD
- 8. Creating a Folder with CMD
- 9. Shut Down a Remote Computer with CMD
- Account keeps locking
- Active Directory Security
- Active Directory Unlock Account Permission
- Add a Program to the Right-Click Menu
- Add Google Ads conversion tracking code to WordPress
- Add Opencart Google Ads conversion tracking code (add snippets)
- Add Whatsapp order button
- Adobe Illustrator Convert Type to Vector
- ALL ARTICLES
- Allow a standard user to run an application as an administrator in Windows
- ARİF AKYÜZ – SITE CONTENT
- Articles
- Backup Policy
- BC Search for Files and Folders with CMD
- Bitlocker Commissioned
- C# XML File Data Pull, Add, Delete, Update Operations
- Centos 7 IP Switching
- Change MAC Address
- Change the ADD to WooCommerce cart post
- Cisco Router Configuration
- Cisco Switch Model Learning Command
- CMD commands
- Combine columns one after the other in Excel
- Convert Picture to Text Converting Picture to Word
- Create a table of contents in Word
- Critical Files on Linux
- Cryptolocker Extension List
- CSS icon Package
- Cyber Security Certifications
- Cybersecurity Courses Passive Information Collection
- Data recovery via formatted disk
- Define the same proxy address for all users on Terminal Servers
- Delete Files and Folders with Task Scheduler Delete a File and Folder with PowerShell
- Deleting User Profile Files with Powershell
- DHCP Fail-over on Windows Server 2019
- Directory Structure on Linux
- Diskpart
- DNS Cache Clearing
- DOWNLOAD
- Exchange version information learning command
- Exchange: Bypass Malware Filtering
- File commands on Linux
- File Permissions on Linux
- Find out which port the app is using in Windows
- Forti Firewall IP Export
- Forti IP Export
- Google Advertising
- Google Advertising with ADS
- Google DNS
- Google Tag Manager Click Tracking
- Google Tag Manager Installation Turkish Lecture
- Group policy see command CMD applied to the computer
- How to Build an E-Commerce Site
- How to configure Proton VPN on pfSense using WireGuard
- How to Create a Shortcut to a Hyper-V Virtual Machine
- How to Create Trusted Self-Signed SSL Certificates and Local Domains for Testing
- How to Find Out the Motherboard Model?
- How to Get Facebook Pixel Code
- How to install FortiGate FortiOS 7.0
- How to Make a Vector Logo with Adobe Illustrator
- How to Put Password on Word Document
- How to Stay Safe From Stealer Attacks
- How to write IPv6 as a URL
- How to: Create CSR Code Through IIS
- HPE StoreOnce Systems
- IE Prevent running First Run Wizard
- Import Google Chrome passwords
- Instagram ad account closed
- INSTAGRAM ADVERTISING TRAINING
- Internal Network Attacks
- IPv6 Proxy
- Kali Linux Installation
- LAPS Installation and Configuration
- Learning Exchange CU Info command
- Learning MAC address with IP
- List files in an Excel folder
- Log4j scan for Linux
- Log4j Scan for Windows
- Mbps to kbps Converter
- Microsoft Endpoint Manager
- Microsoft Intune EDR import Server
- Microsoft Security Compliance Toolkit 1.0
- Most used ports
- My Instagram Ad Account Has Been Closed, How Can I Open?
- Network Settings for Viritual Box Virtual Machines
- NMAP Commands
- Open the UBUNTU SSH Port
- Opencart social media icon pack
- Package Management on Linux
- Password Expiration Date AD User
- Password Policy
- Paste into Excel Filtered Cells
- PDF Encryption and PDF file encryption
- Persistent user account lockout
- Ping IPv6
- Process Management on Linux
- Pull List of Domain Admin Group Members
- Pull local admin accounts of devices in the domain with Powershell
- Pulling a List of Applications Installed on the Computer with CMD
- Random MAC Address Generation
- Random password generator
- Random Password Generator
- RDP Event Viewer ID
- Real-Time Cyber Threat Map
- Reliable and fast DNS Server List 2022
- Remove additional information, product description, and product review from the WooCommerce product page
- Remove vmware workstation encryption
- RVTools
- Samsung phone throwing rom
- Samsung tablet rom throwing
- See the open and closed ports on the Cisco switch
- Send Outlook future mail
- Server room Checklist
- Server Sustainability
- Showing the Lowest Price on Products with WooCommerce Options
- SMB Signing Disabled
- Social Engineering Attacks
- Speed test
- SQL Injection Attack
- SQL Server 2019 setup
- Switch commands
- This computer can't run windows 11 error solution
- Turn off Insecure TLS Versions
- User management on Linux
- What is a bot?
- What is Biometric Photography?
- What is EternalBlue?
- What is GRC?
- What is IPv6?
- WHAT IS NBTSTAT
- What is Penetration Testing? What is vulnerability scanning?
- What is Split Tunnel? What is Full Tunnel?
- Who reset the User's Password on AD
- Whoami commands
- Windows 10 Password Cracking Programless
- Windows 10 release history
- Windows 11 theme appearance customization
- Windows 2016 Startup Folder
- Woocommerce Closing to Shopping
- WordPress Search button removal hiding
- WordPress Whatsapp button add