Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

CONFIGURACION DEL SWITCH 1

Switch(config-if)#ip default-gateway 192.168.1.11


Switch(config)#hostname SW-1
SW-1(config)#ip domain-name redes.com
SW-1(config)#crypto key generate rsa
The name for the keys will be: SW-1.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-1(config)#line vty 0 15
*Mar 1 2:2:55.753: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-1(config-line)#transport input ssh
SW-1(config-line)#password cisco
SW-1(config-line)#login local
SW-1(config-line)#username Admin privilege 15 secret Admin
SW-1(config)#do wr
Building configuration...
[OK]
SW-1(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-1(config)#do wr
Building configuration...
[OK]
SW-1(config)#service password-encryption
SW-1(config)#do wr
Building configuration...
[OK]

CONFIGURACION DEL SWITCH 2

Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip address 192.168.3.1 255.255.255.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up


Switch(config-if)#ip address 192.168.3.10 255.255.255.0
Switch(config-if)#no shutdown
Switch(config-if)#ip default-gateway 192.168.3.1
Switch(config)#hostname SW-2
SW-2(config)#ip domain-name redes.com
SW-2(config)#crypto key generate rsa
The name for the keys will be: SW-2.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-2(config)#line vty 0 15
*Mar 1 2:6:14.684: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-2(config-line)#transport input ssh
SW-2(config-line)#password cisco
SW-2(config-line)#login local
SW-2(config-line)#username Admin privilege 15 secret Admin
SW-2(config)#do wr
Building configuration...
[OK]
SW-2(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-2(config)#do wr
Building configuration...
[OK]
SW-2(config)#service password-encryption
SW-2(config)#do wr
Building configuration...
[OK]
CONFIGURACION DE SWITCH 3
Switch>ENABLE
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip address 10.0.0.10 255.0.0.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up


Switch(config-if)#ip default-gateway 10.0.0.1
Switch(config)#hostname SW-3
SW-3(config)#ip domain-name redes.com
SW-3(config)#crypto key generate rsa
The name for the keys will be: SW-3.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-3(config)#line vty 0 15
*Mar 1 2:11:36.669: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-3(config-line)#transport input ssh
SW-3(config-line)#password cisco
SW-3(config-line)#login local
SW-3(config-line)#username Admin privilege 15 secret Admin
SW-3(config)#do wr
Building configuration...
[OK]
SW-3(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-3(config)#do wr
Building configuration...
[OK]
SW-3(config)#service password-encryption
SW-3(config)#do wr
Building configuration...
[OK]
CONFIGURACION DEL SWITCH 4
Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip addess 40.0.0.10 255.0.0.0
^
% Invalid input detected at '^' marker.
Switch(config-if)#ip address 40.0.0.10 255.0.0.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up

Switch(config-if)#hostname SW-4
SW-4(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-4(config)#service password-encryption
SW-4(config)#line vty 0 15
SW-4(config-line)#password cisco
SW-4(config-line)#transport input ssh
SW-4(config-line)#login local
SW-4(config-line)#exit
SW-4(config)#interface vlan1
SW-4(config-if)#ip default-gateway 40.0.0.1
SW-4(config)#ip domain-name redes.com
SW-4(config)#crypto key generate rsa
The name for the keys will be: SW-4.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-4(config)#username Admin privilege 15 secret Admin


*Mar 2 2:22:41.133: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-4(config)#do wr
Building configuration...
[OK]

CONFIGURACION DEL SWITCH 5

Switch(config-if)#ip default-gateway 150.200.10.1


Switch(config)#hostname SW-5
SW-5(config)#ip domain-name redes.com
SW-5(config)#ip ssh version 2
Please create RSA keys (of at least 768 bits size) to enable SSH v2.
SW-5(config)#crypto key generate rsa
The name for the keys will be: SW-1.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
SW-5(config)#line vty 0 15
*Mar 1 1:47:22.962: %SSH-5-ENABLED: SSH 2 has been enabled
SW-5(config-line)#transport input ssh
SW-5(config-line)#password cisco
SW-5(config-line)#login local
SW-5(config-line)#username Admin privilege 15 secret Admin
SW-5(config)#do wr
Building configuration...
[OK]
SW-5(config)#service password-encryption
SW-5(config)#do wr
Building configuration...
[OK]
SW-5(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-5(config)#do wr
Building configuration...
[OK]
CONFIGURACION DEL SWITCH 6

Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface vlan1
Switch(config-if)#ip address 170.31.10.0 255.255.0.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up

Switch(config-if)#ip default-gateway 170.31.10.1


Switch(config)#hostname SW-6
SW-6(config)#ip domain-name redes.com
SW-6(config)#crypto key generate rsa
The name for the keys will be: SW-6.redes.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

SW-6(config)#line vty 0 15
*Mar 2 2:30:47.957: %SSH-5-ENABLED: SSH 1.99 has been enabled
SW-6(config-line)#password cisco
SW-6(config-line)#transport input ssh
SW-6(config-line)#login local
SW-6(config-line)#exit
SW-6(config)#banner motd "SOLO PERSONAL AUTORIZADO"
SW-6(config)#service password-encryption
SW-6(config)#username Admin privilege 15 secret Admin
SW-6(config)#do wr
Building configuration...
[OK]
SW-6(config)#
CONFIGURACION R.PRINCIPAL
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R-PRINCIPAL
R-PRINCIPAL(config)#enable secret cisco
R-PRINCIPAL(config)#line console 0
R-PRINCIPAL(config-line)#password cisco
R-PRINCIPAL(config-line)#login local
R-PRINCIPAL(config-line)#exit
R-PRINCIPAL(config)#line vty 0 15
R-PRINCIPAL(config-line)#password cisco
R-PRINCIPAL(config-line)#login local
R-PRINCIPAL(config-line)#transport input ssh
R-PRINCIPAL(config-line)#exit
R-PRINCIPAL(config)#username Admin privilege 15 secret Admin
R-PRINCIPAL(config)#service password-encryption
R-PRINCIPAL(config)#banner motd "SOLO PERSONAL AUTORIZADO"
R-PRINCIPAL(config)#interface g0/0
R-PRINCIPAL(config-if)#ip address 200.20.200.2 255.255.255.0
R-PRINCIPAL(config-if)#no shutdown

R-PRINCIPAL(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state


to up

R-PRINCIPAL(config-if)#
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config-if)#
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g2/0
R-PRINCIPAL(config-if)#ip address 200.20.10.1 255.255.255.0
R-PRINCIPAL(config-if)#no shutdown
R-PRINCIPAL(config)#interface g3/0
R-PRINCIPAL(config-if)#ip address 192.168.1.1 255.255.255.0
% 192.168.1.0 overlaps with GigabitEthernet1/0
R-PRINCIPAL(config-if)#ip address 192.168.3.1 255.255.255.0
R-PRINCIPAL(config-if)#no shutdown
R-PRINCIPAL#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-PRINCIPAL(config)#interface g1/0
R-PRINCIPAL(config-if)#description link to R-AREA
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g2/0
R-PRINCIPAL(config-if)#description link to R-SERVICIO
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g1/0
R-PRINCIPAL(config-if)#description link to SW-1
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#interface g2/0
R-PRINCIPAL(config-if)#description link to SW-2
R-PRINCIPAL(config-if)#exit
R-PRINCIPAL(config)#

CONFIGURACION DEL R.AREA


Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R-AREA
R-AREA(config)#enable secret cisco
R-AREA(config)#line console 0
R-AREA(config-line)#password cisco
R-AREA(config-line)#login local
R-AREA(config-line)#exit
R-AREA(config)#line vty 0 15
R-AREA(config-line)#password cisco
R-AREA(config-line)#login local
R-AREA(config-line)#trasnport input ssh
^
% Invalid input detected at '^' marker.
R-AREA(config-line)#transport input ssh
R-AREA(config-line)#exit
R-AREA(config)#username Admin privilege 15 secret Admin
R-AREA(config)#service password-encryption
R-AREA(config)#banner motd "SOLO PERSONAL AUTORIZADO"
R-AREA(config)#exit
R-AREA#
%SYS-5-CONFIG_I: Configured from console by console

R-AREA#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-AREA(config)#interface g0/0
R-AREA(config-if)#ip address 150.200.0.1 255.255.0.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state


to up

R-AREA(config-if)#exitt
^
% Invalid input detected at '^' marker.
R-AREA(config-if)#exit
R-AREA(config-if)#exit
R-AREA(config)#interface g2/0
R-AREA(config-if)#ip address 200.20.150.1 255.255.255.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet2/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0, changed state


to up

R-AREA(config-if)#exit
R-AREA(config)#interface g3/0
R-AREA(config-if)#ip address 170.31.0.1 255.255.0.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet3/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0, changed state
to up

R-AREA(config-if)#exit
R-AREA(config)#interface g1/0
R-AREA(config-if)#ip address 200.20.200.1 255.255.255.0
R-AREA(config-if)#no shutdown
R-AREA#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-AREA(config)#interface g1/0
R-AREA(config-if)#description link to R-PRINCIPAL
R-AREA(config-if)#exit
R-AREA(config)#interface g3/0
R-AREA(config-if)#description link to SW-6
R-AREA(config-if)#exit
R-AREA(config)#interface g0/0
R-AREA(config-if)#description link to SW-5
R-AREA(config-if)#
R-AREA(config-if)#exit
R-AREA(config)#interface g2/0
R-AREA(config-if)#descriptio link to R-SERVICIO
R-AREA(config-if)#exit

CONFIGURACION DE R.SERVICIO
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R-SERVICIO
R-SERVICIO(config)#interface g2/0
R-SERVICIO(config-if)#ip address 200.20.150.2 255.255.255.0
R-SERVICIO(config-if)#no shutdown

R-SERVICIO(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet2/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0, changed state


to up

R-SERVICIO(config-if)#exit
R-SERVICIO(config)#enable secret cisco
R-SERVICIO(config)#line console 0
R-SERVICIO(config-line)#password cisco
R-SERVICIO(config-line)#login local
R-SERVICIO(config-line)#exit
R-SERVICIO(config)#line vty 0 15
R-SERVICIO(config-line)#password cisco
R-SERVICIO(config-line)#login local
R-SERVICIO(config-line)#transport input ssh
R-SERVICIO(config-line)#exit
R-SERVICIO(config)#username Admin privilege 15 secret Admin
R-SERVICIO(config)#service password-encryption
R-SERVICIO(config)#banner motd "SOLO PERSONAL AUTORIZADO"
R-SERVICIO(config)#exit
R-SERVICIO#
%SYS-5-CONFIG_I: Configured from console by console
R-AREA(config-if)#exit
R-AREA(config)#interface g3/0
R-AREA(config-if)#ip address 170.31.0.1 255.255.0.0
R-AREA(config-if)#no shutdown

R-AREA(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet3/0, changed state to up
R-AREA(config-if)#exit
R-AREA(config)#interface g1/0
R-AREA(config-if)#ip address 200.20.200.1 255.255.255.0
R-AREA(config-if)#no shutdown
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g0/0
R-SERVICIO(config-if)#ip address 10.0.0.1 255.0.0.0
R-SERVICIO(config-if)#no shutdown
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g3/0
R-SERVICIO(config-if)#ip address 40.0.0.1 255.0.0.0
R-SERVICIO(config-if)#no shutdown
R-SERVICIO#config t
Enter configuration commands, one per line. End with CNTL/Z.
R-SERVICIO(config)#interface g2/0
R-SERVICIO(config-if)#description link to R-AREA
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g0/0
R-SERVICIO(config-if)#description link to SW-3
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g3/0
R-SERVICIO(config-if)#description link to SW-4
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#interface g1/0
R-SERVICIO(config-if)#description link to R-PRINCIPAL
R-SERVICIO(config-if)#exit
R-SERVICIO(config)#do wr
Building configuration...
[OK]

You might also like