2013年9月9日 星期一

讓指定IP mac 可通過 switch


Switch#sh run
Building configuration...

Current configuration : 4261 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
!
!
!
no aaa new-model
system mtu routing 1500
!
!
ip dhcp snooping vlan 10
ip dhcp snooping
!        
!
crypto pki trustpoint TP-self-signed-3926136960
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-3926136960
 revocation-check none
 rsakeypair TP-self-signed-3926136960
!
!
crypto pki certificate chain TP-self-signed-3926136960
 certificate self-signed 01
  3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
 
  71073AB3 72A162DC 8CE8934D 696236D1 BCBA528B 3083F7BF B651115C 73278385 951A12
  quit
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
interface FastEthernet0
 no ip address
 shutdown
!
interface GigabitEthernet0/1
 ip verify source port-security
!
interface GigabitEthernet0/2
 ip verify source port-security
!
interface GigabitEthernet0/3
 spanning-tree portfast
 ip verify source port-security
!
interface GigabitEthernet0/4
 ip verify source port-security
!
interface GigabitEthernet0/5
 switchport access vlan 10
 spanning-tree portfast
 ip verify source port-security
!
interface GigabitEthernet0/6
 ip verify source port-security
!
interface GigabitEthernet0/7
 switchport access vlan 10
 ip arp inspection trust
 spanning-tree portfast
 ip verify source port-security
!
interface Vlan1
 no ip address
!
interface Vlan10
 ip address 192.168.1.1 255.255.255.0
!
ip classless
!
ip http server
ip http secure-server
!
ip source binding A820.6600.5AE1 vlan 10 192.168.1.2 interface Gi0/7
!
!
!
line con 0
 logging synchronous
line vty 0 4
 login
line vty 5 15
 login
!
end

Switch#

沒有留言: