Help with Cisco switch…
Discussion
Hi all
I have a problem I’m trying to solve and I wonder if anyone can help me. A friend of mine has come into an old Cisco catalyst 2960 given by his employer as it’s being retired. He’s just done a house refurb and has pulled lots of cat6 cable throughout.
He’s asked me if I can configure it and get it up and running for him so we can connect up the data sockets, some cctv and some ubiquiti AP’s.
I’ve messed about with a few fortigates in my time but never a cisco switch. So far I have:-
Established connectivity via serial port
Factory reset the appliance
Followed the ‘wizard’ in the CLI and configured the mgmt port to have IP 192.168.1.254
Successfully connected to 1.254 from a laptop plugged into the mgmt port and hit the web interface. Unfortunately this is just a basic html page and the full web management is not installed on the appliance. If you click ‘web console’ you simply get 404 error. There is limited space to install it (32mb).
I have setup a laptop with a static IP of 192.168.1.1
Also setup a laptop with static IP of 192.168.1.50
I CANNOT ping between .1 and .50 in either direction.
So, how do I either:-
1. Get the full html management page onto the switch
2. Somehow manage/ configure it from software installed on a laptop?
3. Configure it to perform basic switch functions via the CLI
For context. ALL devices in this network will be in the 192.168.1.x range, so it’s a flat structure. The router is 1.1. I will do IP reservations on the router for the fixed devices (NAS, AP’s etc).
I will then have a dhcp scope from .50-.200 or something.
Any heals on getting this configured is greatly appreciated. I’ve reached the end of my skill now and don’t know what to do next.
I have a problem I’m trying to solve and I wonder if anyone can help me. A friend of mine has come into an old Cisco catalyst 2960 given by his employer as it’s being retired. He’s just done a house refurb and has pulled lots of cat6 cable throughout.
He’s asked me if I can configure it and get it up and running for him so we can connect up the data sockets, some cctv and some ubiquiti AP’s.
I’ve messed about with a few fortigates in my time but never a cisco switch. So far I have:-
Established connectivity via serial port
Factory reset the appliance
Followed the ‘wizard’ in the CLI and configured the mgmt port to have IP 192.168.1.254
Successfully connected to 1.254 from a laptop plugged into the mgmt port and hit the web interface. Unfortunately this is just a basic html page and the full web management is not installed on the appliance. If you click ‘web console’ you simply get 404 error. There is limited space to install it (32mb).
I have setup a laptop with a static IP of 192.168.1.1
Also setup a laptop with static IP of 192.168.1.50
I CANNOT ping between .1 and .50 in either direction.
So, how do I either:-
1. Get the full html management page onto the switch
2. Somehow manage/ configure it from software installed on a laptop?
3. Configure it to perform basic switch functions via the CLI
For context. ALL devices in this network will be in the 192.168.1.x range, so it’s a flat structure. The router is 1.1. I will do IP reservations on the router for the fixed devices (NAS, AP’s etc).
I will then have a dhcp scope from .50-.200 or something.
Any heals on getting this configured is greatly appreciated. I’ve reached the end of my skill now and don’t know what to do next.
You’ll need to do all the config by CLI which is easy enough with a bit of googling, but it’s an old switch now. It may be better to just buy a modern 24 port one like this.
https://www.ebuyer.com/263573-tp-link-tl-sg1024d-2...
https://www.ebuyer.com/263573-tp-link-tl-sg1024d-2...
Alex Z said:
You’ll need to do all the config by CLI which is easy enough with a bit of googling, but it’s an old switch now. It may be better to just buy a modern 24 port one like this.
https://www.ebuyer.com/263573-tp-link-tl-sg1024d-2...
Any tips or links for what’s needed would be great. https://www.ebuyer.com/263573-tp-link-tl-sg1024d-2...
New switch sounds great. But with 3 AP’s, half a dozen cameras and some future proofing, you’re looking at 48 port switches with at least 12 POE. Starts to get pricey on top of the investment in all the brand new ubiquiti kit I’ve helped him buy
There is a reason his employer is giving it away! Are you actually in full CLI enable mode? If its been factory defaulted you probably need to set an enable pwd in order to get into conf mode (configure terminal) and unshut the interfaces. Once you have access / some output I'd suggest your better off signing up here and asking:
https://community.cisco.com/
https://community.cisco.com/
colin79666 said:
To be honest if money has been spend on a refurb and putting in the structured cabling I’d be splashing out on a new switch to connect it all. That Cisco is potentially 18 years old. A new UniFi switch would play nicely with the APs.
Yes you’re right, it would be the ideal situation. However those things cost a wedge and there’s a reason he’s acquired something old but functional….Surely a ubiquiti switch isn’t going to change the game that much with the AP’s. Mine work fine with an old POE switch I bought on eBay….
eltax91 said:
Hi all
I have a problem I’m trying to solve and I wonder if anyone can help me. A friend of mine has come into an old Cisco catalyst 2960 given by his employer as it’s being retired. He’s just done a house refurb and has pulled lots of cat6 cable throughout.
He’s asked me if I can configure it and get it up and running for him so we can connect up the data sockets, some cctv and some ubiquiti AP’s.
I’ve messed about with a few fortigates in my time but never a cisco switch. So far I have:-
Established connectivity via serial port
Factory reset the appliance
Followed the ‘wizard’ in the CLI and configured the mgmt port to have IP 192.168.1.254
Successfully connected to 1.254 from a laptop plugged into the mgmt port and hit the web interface. Unfortunately this is just a basic html page and the full web management is not installed on the appliance. If you click ‘web console’ you simply get 404 error. There is limited space to install it (32mb).
I have setup a laptop with a static IP of 192.168.1.1
Also setup a laptop with static IP of 192.168.1.50
I CANNOT ping between .1 and .50 in either direction.
So, how do I either:-
1. Get the full html management page onto the switch
2. Somehow manage/ configure it from software installed on a laptop?
3. Configure it to perform basic switch functions via the CLI
For context. ALL devices in this network will be in the 192.168.1.x range, so it’s a flat structure. The router is 1.1. I will do IP reservations on the router for the fixed devices (NAS, AP’s etc).
I will then have a dhcp scope from .50-.200 or something.
Any heals on getting this configured is greatly appreciated. I’ve reached the end of my skill now and don’t know what to do next.
The management port is on a completely different vrf to the access ports so you being unable to ping between devices isn't surprising.I have a problem I’m trying to solve and I wonder if anyone can help me. A friend of mine has come into an old Cisco catalyst 2960 given by his employer as it’s being retired. He’s just done a house refurb and has pulled lots of cat6 cable throughout.
He’s asked me if I can configure it and get it up and running for him so we can connect up the data sockets, some cctv and some ubiquiti AP’s.
I’ve messed about with a few fortigates in my time but never a cisco switch. So far I have:-
Established connectivity via serial port
Factory reset the appliance
Followed the ‘wizard’ in the CLI and configured the mgmt port to have IP 192.168.1.254
Successfully connected to 1.254 from a laptop plugged into the mgmt port and hit the web interface. Unfortunately this is just a basic html page and the full web management is not installed on the appliance. If you click ‘web console’ you simply get 404 error. There is limited space to install it (32mb).
I have setup a laptop with a static IP of 192.168.1.1
Also setup a laptop with static IP of 192.168.1.50
I CANNOT ping between .1 and .50 in either direction.
So, how do I either:-
1. Get the full html management page onto the switch
2. Somehow manage/ configure it from software installed on a laptop?
3. Configure it to perform basic switch functions via the CLI
For context. ALL devices in this network will be in the 192.168.1.x range, so it’s a flat structure. The router is 1.1. I will do IP reservations on the router for the fixed devices (NAS, AP’s etc).
I will then have a dhcp scope from .50-.200 or something.
Any heals on getting this configured is greatly appreciated. I’ve reached the end of my skill now and don’t know what to do next.
do you want the switch to switch, or to be a L3 device and issue DHCP/do basic routing.
if the former, then after the factory reset it'll just work as a basic switch.
if you want to do L3 stuff then via the CLI:
conf t
in managment 1 (or mgmt1 can't remember)
no ip address
int vlan 1
shut
int vlan 10
description **** Home LAN ****
ip add 192.168.1.254 255.255.255.0
vlan 10
name HOME_LAN
int range gi1/0/1 - 24 (amend this as per the naming structure, assuming that they're gig interfaced and it's a 24 port switch)
switchport mode access
switchport access vlan 10
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1 (assuming that 1.1 is the IP address of your internet router)
ip dhcp pool HOMELAN
network 192.168.1.0 255.255.255.0
dns-server 1.1.1.1 (or whatever you want for DNS)
default-router 192.168.1.1 (your internet router)
ip domain name HOME_LAN
crypto key generate rsa general-keys modulus 2048
username admin priv 15 secret (pick a password)
line vty 0 15
transport input ssh
login local
that should get you running and you can then ssh to the switch via the vlan10 address of 192.168.1.254
Cheers
P.S. don't forget to disable DHCP on the internet router....
EDIT: the CISCO Web gui's are garbage, CLI all the way. the above is only the basics fee free to DM if you want any more help
Edited by Richyvrlimited on Tuesday 17th October 10:23
eltax91 said:
Yes you’re right, it would be the ideal situation. However those things cost a wedge and there’s a reason he’s acquired something old but functional….
Surely a ubiquiti switch isn’t going to change the game that much with the AP’s. Mine work fine with an old POE switch I bought on eBay….
Newer stuff needs PoE+ which the older 2960 won't support.Surely a ubiquiti switch isn’t going to change the game that much with the AP’s. Mine work fine with an old POE switch I bought on eBay….
Richyvrlimited said:
The management port is on a completely different vrf to the access ports so you being unable to ping between devices isn't surprising.
do you want the switch to switch, or to be a L3 device and issue DHCP/do basic routing.
if the former, then after the factory reset it'll just work as a basic switch.
if you want to do L3 stuff then via the CLI:
conf t
in managment 1 (or mgmt1 can't remember)
no ip address
int vlan 1
shut
int vlan 10
description **** Home LAN ****
ip add 192.168.1.254 255.255.255.0
vlan 10
name HOME_LAN
int range gi1/0/1 - 24 (amend this as per the naming structure, assuming that they're gig interfaced and it's a 24 port switch)
switchport mode access
switchport access vlan 10
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1 (assuming that 1.1 is the IP address of your internet router)
ip dhcp pool HOMELAN
network 192.168.1.0 255.255.255.0
dns-server 1.1.1.1 (or whatever you want for DNS)
default-router 192.168.1.1 (your internet router)
ip domain name HOME_LAN
crypto key generate rsa general-keys modulus 2048
username admin priv 15 secret (pick a password)
line vty 0 15
transport input ssh
login local
that should get you running and you can then ssh to the switch via the vlan10 address of 192.168.1.254
Cheers
P.S. don't forget to disable DHCP on the internet router....
EDIT: the CISCO Web gui's are garbage, CLI all the way. the above is only the basics fee free to DM if you want any more help
Thanks do you want the switch to switch, or to be a L3 device and issue DHCP/do basic routing.
if the former, then after the factory reset it'll just work as a basic switch.
if you want to do L3 stuff then via the CLI:
conf t
in managment 1 (or mgmt1 can't remember)
no ip address
int vlan 1
shut
int vlan 10
description **** Home LAN ****
ip add 192.168.1.254 255.255.255.0
vlan 10
name HOME_LAN
int range gi1/0/1 - 24 (amend this as per the naming structure, assuming that they're gig interfaced and it's a 24 port switch)
switchport mode access
switchport access vlan 10
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1 (assuming that 1.1 is the IP address of your internet router)
ip dhcp pool HOMELAN
network 192.168.1.0 255.255.255.0
dns-server 1.1.1.1 (or whatever you want for DNS)
default-router 192.168.1.1 (your internet router)
ip domain name HOME_LAN
crypto key generate rsa general-keys modulus 2048
username admin priv 15 secret (pick a password)
line vty 0 15
transport input ssh
login local
that should get you running and you can then ssh to the switch via the vlan10 address of 192.168.1.254
Cheers
P.S. don't forget to disable DHCP on the internet router....
EDIT: the CISCO Web gui's are garbage, CLI all the way. the above is only the basics fee free to DM if you want any more help
Edited by Richyvrlimited on Tuesday 17th October 10:23
I will give this a play later when these boring calls are all done.
I wasn’t trying to ping from the mgmt to the other ports. I had 1.1 plugged into port 1 and 1.50 plugged into port7 then 19. Sounds like I need a vlan though to allow them to talk?
It’s not operating as a basic switch as default
Edited by eltax91 on Tuesday 17th October 11:10
eltax91 said:
Thanks
I will give this a play later when these boring calls are all done.
I wasn’t trying to ping from the mgmt to the other ports. I had 1.1 plugged into port 1 and 1.50 plugged into port7 then 19. Sounds like I need a vlan though to allow them to talk?
It’s not operating as a basic switch as default
by default all ports will be in vlan1, you'd need to check the config, likelihood is either the port is admin down or in different vlans. I will give this a play later when these boring calls are all done.
I wasn’t trying to ping from the mgmt to the other ports. I had 1.1 plugged into port 1 and 1.50 plugged into port7 then 19. Sounds like I need a vlan though to allow them to talk?
It’s not operating as a basic switch as default
Edited by eltax91 on Tuesday 17th October 11:10
Someone else posted above asking what show run displays
from the priviliged exec mode i.e. console in:
then type enable
then show run
copy and past the lot in here
Switch#show run
Building configuration...
Current configuration : 7813 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$A5Wp$P1yJiuksYJawK5qWPsCBd.
enable password admin
!
!
!
no aaa new-model
switch 1 provision ws-c2960s-48fps-l
!
!
cluster enable cluster 0
!
!
crypto pki trustpoint TP-self-signed-3446063744
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3446063744
revocation-check none
rsakeypair TP-self-signed-3446063744
!
!
crypto pki certificate chain TP-self-signed-3446063744
certificate self-signed 01
3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33343436 30363337 3434301E 170D3933 30333031 30303033
31335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34343630
36333734 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100AD6F E785FF24 686B03AB 9ED91129 B42ABBFE 7D0E01C8 87A7265A 27790B9E
57A0DCEF 78C6220D 4C600D48 4D1794C7 27D28962 7D0A7C50 CABFE398 DF50C855
5091C4FE 4ECA1A9A 869AA8D0 034C6915 F33DEB0D 18FDECFC 3655F3B8 E98A9096
EC38BBF4 17DAE8A4 2C6778C3 61410641 3AFEF499 4A3CF1C8 41798DE8 05DB576C
C8670203 010001A3 67306530 0F060355 1D130101 FF040530 030101FF 30120603
551D1104 0B300982 07537769 7463682E 301F0603 551D2304 18301680 14610E8B
94C0BCF1 C6BDE9C3 FD4B8554 E75CB940 25301D06 03551D0E 04160414 610E8B94
C0BCF1C6 BDE9C3FD 4B8554E7 5CB94025 300D0609 2A864886 F70D0101 04050003
8181009F 6B6858D2 A1DD674A F58BA7D6 99C3B927 2F905723 CF8CBA47 2C8398D5
AEB35044 4D5F7018 E99824AA C7113F76 52202BB2 953EC855 BF33A286 C6467A27
1B04EC1B D1A3108C 620FE5FC D5B624A8 4068B776 D4B422B0 EB5F6789 23492E02
4DCE48E6 87B6D22A 19ABEC4A A90B4063 F6D306A9 E1C3DC45 C5BBBEBE 38FC5BA4 2A6D3E
quit
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0
no ip address
!
interface GigabitEthernet1/0/1
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/2
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/3
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/4
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/5
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/6
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/7
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/8
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/9
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/10
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/11
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/12
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/13
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/14
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/15
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/16
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/17
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/18
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/19
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/20
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/21
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/22
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/23
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/24
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/25
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/26
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/27
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/28
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/29
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/30
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/31
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/32
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/33
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/34
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/35
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/36
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/37
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/38
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/39
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/40
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/41
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/42
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/43
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/44
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/45
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/46
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/47
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/48
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/49
!
interface GigabitEthernet1/0/50
!
interface GigabitEthernet1/0/51
!
interface GigabitEthernet1/0/52
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
description ***Home LAN***
ip address 192.168.1.254 255.255.255.0
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
line con 0
exec-timeout 0 0
line vty 0 4
password cisco
login
line vty 5 15
password cisco
login
!
end
Building configuration...
Current configuration : 7813 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$A5Wp$P1yJiuksYJawK5qWPsCBd.
enable password admin
!
!
!
no aaa new-model
switch 1 provision ws-c2960s-48fps-l
!
!
cluster enable cluster 0
!
!
crypto pki trustpoint TP-self-signed-3446063744
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3446063744
revocation-check none
rsakeypair TP-self-signed-3446063744
!
!
crypto pki certificate chain TP-self-signed-3446063744
certificate self-signed 01
3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33343436 30363337 3434301E 170D3933 30333031 30303033
31335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34343630
36333734 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100AD6F E785FF24 686B03AB 9ED91129 B42ABBFE 7D0E01C8 87A7265A 27790B9E
57A0DCEF 78C6220D 4C600D48 4D1794C7 27D28962 7D0A7C50 CABFE398 DF50C855
5091C4FE 4ECA1A9A 869AA8D0 034C6915 F33DEB0D 18FDECFC 3655F3B8 E98A9096
EC38BBF4 17DAE8A4 2C6778C3 61410641 3AFEF499 4A3CF1C8 41798DE8 05DB576C
C8670203 010001A3 67306530 0F060355 1D130101 FF040530 030101FF 30120603
551D1104 0B300982 07537769 7463682E 301F0603 551D2304 18301680 14610E8B
94C0BCF1 C6BDE9C3 FD4B8554 E75CB940 25301D06 03551D0E 04160414 610E8B94
C0BCF1C6 BDE9C3FD 4B8554E7 5CB94025 300D0609 2A864886 F70D0101 04050003
8181009F 6B6858D2 A1DD674A F58BA7D6 99C3B927 2F905723 CF8CBA47 2C8398D5
AEB35044 4D5F7018 E99824AA C7113F76 52202BB2 953EC855 BF33A286 C6467A27
1B04EC1B D1A3108C 620FE5FC D5B624A8 4068B776 D4B422B0 EB5F6789 23492E02
4DCE48E6 87B6D22A 19ABEC4A A90B4063 F6D306A9 E1C3DC45 C5BBBEBE 38FC5BA4 2A6D3E
quit
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0
no ip address
!
interface GigabitEthernet1/0/1
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/2
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/3
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/4
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/5
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/6
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/7
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/8
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/9
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/10
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/11
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/12
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/13
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/14
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/15
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/16
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/17
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/18
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/19
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/20
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/21
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/22
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/23
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/24
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/25
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/26
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/27
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/28
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/29
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/30
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/31
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/32
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/33
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/34
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/35
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/36
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/37
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/38
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/39
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/40
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/41
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/42
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/43
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/44
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/45
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/46
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/47
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/48
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/49
!
interface GigabitEthernet1/0/50
!
interface GigabitEthernet1/0/51
!
interface GigabitEthernet1/0/52
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
description ***Home LAN***
ip address 192.168.1.254 255.255.255.0
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
line con 0
exec-timeout 0 0
line vty 0 4
password cisco
login
line vty 5 15
password cisco
login
!
end
Edited by eltax91 on Tuesday 17th October 13:59
eltax91 said:
I now have the devices 1.1 and 1.50 pinging each other across the switch.
I also have http access on 1.254 from within the switch (not mgmt interface)
Well done, was that from the config I provided or your own playing around?I also have http access on 1.254 from within the switch (not mgmt interface)
if the latter I'd recommend changing all ports to a new vlan (not 1) just as a basic secuity best practice, and also disable http server, (no http-server) it's absolute bobbins and insecure as heck.
EDIT, add portfast to all the ports too, they'll forgoe the STP listening/learning process to stop switching loops and ensure the ports come up quickly
int range gi1/0/1 - 48
spanning-tree portfast
also don't forget to write any config to flash, from the piv exec mode type:
write
Edited by Richyvrlimited on Tuesday 17th October 13:12
Richyvrlimited said:
Well done, was that from the config I provided or your own playing around?
if the latter I'd recommend changing all ports to a new vlan (not 1) just as a basic secuity best practice, and also disable http server, (no http-server) it's absolute bobbins and insecure as heck.
EDIT, add portfast to all the ports too, they'll forgoe the STP listening/learning process to stop switching loops and ensure the ports come up quickly
int range gi1/0/1 - 48
spanning-tree portfast
also don't forget to write any config to flash, from the piv exec mode type:
write
From a combo of the CLI guide and your combo. I disabled vlan1 and created a vlan 10if the latter I'd recommend changing all ports to a new vlan (not 1) just as a basic secuity best practice, and also disable http server, (no http-server) it's absolute bobbins and insecure as heck.
EDIT, add portfast to all the ports too, they'll forgoe the STP listening/learning process to stop switching loops and ensure the ports come up quickly
int range gi1/0/1 - 48
spanning-tree portfast
also don't forget to write any config to flash, from the piv exec mode type:
write
Edited by Richyvrlimited on Tuesday 17th October 13:12
I’ll have a look at the other bits.
From my config, have I set the default gateway correctly? I want all traffic to head to 1.1 as the internet router
ETA: I haven't setup DHCP on the switch. I was going to leave that on the vodafone router on the basis that it's easier to talk him through troubleshooting on a GUI than a CLI
Edited by eltax91 on Tuesday 17th October 14:04
eltax91 said:
From a combo of the CLI guide and your combo. I disabled vlan1 and created a vlan 10
I’ll have a look at the other bits.
From my config, have I set the default gateway correctly? I want all traffic to head to 1.1 as the internet router
that config isn't needed in this instance, you'd only need it if you wanted to manage the switch from an alternate subnet.I’ll have a look at the other bits.
From my config, have I set the default gateway correctly? I want all traffic to head to 1.1 as the internet router
Edited by eltax91 on Tuesday 17th October 13:45
the switch isn't doing routing, only switching, so user traffic will use the DF as set via whatever is doing your DHCP.
If you want the switch to L3 route, you need to add the lines
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1
but you don't need that at all really, jsut let it switch and leave it at that.
Richyvrlimited said:
that config isn't needed in this instance, you'd only need it if you wanted to manage the switch from an alternate subnet.
the switch isn't doing routing, only switching, so user traffic will use the DF as set via whatever is doing your DHCP.
If you want the switch to L3 route, you need to add the lines
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1
but you don't need that at all really, jsut let it switch and leave it at that.
Thanks for the assistance. I did try to add routing, just to see, however i got errors in commands toothe switch isn't doing routing, only switching, so user traffic will use the DF as set via whatever is doing your DHCP.
If you want the switch to L3 route, you need to add the lines
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1
but you don't need that at all really, jsut let it switch and leave it at that.
eltax91 said:
From my config, have I set the default gateway correctly? I want all traffic to head to 1.1 as the internet router
If you're routing with a typical domestic router, you don't need routing enabled on the switch, and the switch's default gateway is to give the switch external connectivity - it doesn't impact devices using the switch to provide connectivity at all.eltax91 said:
Thanks for the assistance. I did try to add routing, just to see, however i got errors in commands too
Ah I forgot, I think the 2960 is L2 only, doesn't support IP routing features. You may be able to find a firmware online which supports it but as said previous, you don't need it.Gassing Station | Computers, Gadgets & Stuff | Top of Page | What's New | My Stuff