2013年9月9日 星期一
讓指定IP mac 可通過 switch
Switch#sh run
Building configuration...
Current configuration : 4261 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
!
!
!
no aaa new-model
system mtu routing 1500
!
!
ip dhcp snooping vlan 10
ip dhcp snooping
!
!
crypto pki trustpoint TP-self-signed-3926136960
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3926136960
revocation-check none
rsakeypair TP-self-signed-3926136960
!
!
crypto pki certificate chain TP-self-signed-3926136960
certificate self-signed 01
3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
71073AB3 72A162DC 8CE8934D 696236D1 BCBA528B 3083F7BF B651115C 73278385 951A12
quit
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
interface FastEthernet0
no ip address
shutdown
!
interface GigabitEthernet0/1
ip verify source port-security
!
interface GigabitEthernet0/2
ip verify source port-security
!
interface GigabitEthernet0/3
spanning-tree portfast
ip verify source port-security
!
interface GigabitEthernet0/4
ip verify source port-security
!
interface GigabitEthernet0/5
switchport access vlan 10
spanning-tree portfast
ip verify source port-security
!
interface GigabitEthernet0/6
ip verify source port-security
!
interface GigabitEthernet0/7
switchport access vlan 10
ip arp inspection trust
spanning-tree portfast
ip verify source port-security
!
interface Vlan1
no ip address
!
interface Vlan10
ip address 192.168.1.1 255.255.255.0
!
ip classless
!
ip http server
ip http secure-server
!
ip source binding A820.6600.5AE1 vlan 10 192.168.1.2 interface Gi0/7
!
!
!
line con 0
logging synchronous
line vty 0 4
login
line vty 5 15
login
!
end
Switch#
訂閱:
張貼留言 (Atom)
沒有留言:
張貼留言