How to configure Cisco 2960 switch step by step?
The Cisco Catalyst 2960 switch comes preconfigured and just should be alloted fundamental security data before being associated with a system. To utilize an IP-based administration item or Telnet with a Cisco switch, you should design an administration IP address. Presently, how about we share the essential arrangement of the Cisco 2960 switch utilizing Cisco IOS directions.
The accompanying assets are required:
• Cisco 2960 switch or other similar switch
• Router with Ethernet interface to associate with switch
• Three Windows-based PCs, one with a terminal copying program
• RJ-45-to-DB-9 connector reassure link
• Three straight-through Ethernet links
• Access to the PC direction provoke
• Access to a PC arrange TCP/IP design
At that point, the accompanying focuses are subtle elements of Cisco 2960 switch arrangement
1. Interface the hosts to the switch and arrange them. Arrange the hosts to utilize a similar IP subnet for the location and cover as on the switch. Try not to interface have H3 to the switch yet.
2. Associate the switch to the switch and arrange the switch. Associate the switch to switch port Fa0/5. And after that design the switch with the host name Customer Router, the support access and secret word, vty access and secret phrase, and empower mystery secret word.
<<<Click to redirect Cisco official website>>>
3. Arrange the switch. Design the switch with the host name Customer Switch as prompts, for example, set the benefit executive mode secret phrase to cisco; arrange the comfort line to require a secret phrase at login et cetera.
4. Arrange the administration interface on VLAN 1. Enter worldwide arrangement mode (Remember to utilize the new secret key) and the interface setup mode for VLAN 1. From that point forward, set the IP address, subnet cover, and default portal for the administration interface. (The IP address must be legitimate for the nearby system where the switch is introduced.)
5. Check the design of the switch. Check that the IP address of the administration interface on the switch VLAN 1 and the IP address of host H1 are on a similar nearby system. Utilize the show running-design order to check the IP address setup of the switch; spare the arrangement.
6. Check availability utilizing ping and Telnet. To check that the switch and switch are effectively arranged, ping the switch Fa0/1 interface (default door) IP address from the switch CLI.
7. Figure out which MAC tends to that the switch has learned. From the Windows direction provoke, get the Layer 2 locations of the PC organize interface card for each host by utilizing the ipconfig/all order.
8. Arrange essential port security. Decide the alternatives for setting port security on Fast Ethernet interface 0/4, and to permit the switch port Fast Ethernet 0/4 to acknowledge just a single gadget, design port security.
9. Interface an alternate PC to the protected switch port. Disengage have H2 from Fast Ethernet 0/18, and interface have H3 (has not yet been connected to the change) to the port; From H3, pings the change deliver 192.168.1.5 to produce some activity; Record any perceptions at the PC and the switch terminal session. On the off chance that you don’t have a third PC (have H3) and you are working with a remote lab setup and can’t physically disengage H2, you might have the capacity to utilize another discretionary technique.
10. Reactivate the port. Clear the sticky location passage for port Fa0/18 utilizing the reasonable port-security order and restore the interface from mistake cripple to authoritatively up, enter the shutdown direction pursued by the no shutdown order.
11. Set speed and duplex alternatives for the ports. Switch port settings default to auto-duplex and auto-speed. On the off chance that a PC with a 100 Mbps NIC is joined to the port, it consequently goes into full-duplex 100 Mbps mode. In the event that a center is connected to the switch port, it regularly goes into half-duplex 10 Mbps mode.
12. Leave the switch. Sort exit to leave the change and come back to the appreciated screen, when the means are finished, kill every one of the gadgets. Evacuate and store the links and connector.
13. Reflection. You should clarify what secret phrase should be entered to change from client mode to benefit executive mode on the Cisco switch, and why?
Which image is utilized to demonstrate a fruitful ping in the Cisco IOS programming?
What is the advantage of utilizing port security?
What other port-related security steps could be taken to additionally enhance switch security?