Professional Documents
Culture Documents
Administracin Bsica
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Agenda
A. Interfaces de Comando B. Command Line Interface C. Laboratorio 1 D. Seguridad E. Software y Configuraciones F. Troubleshooting G. Laboratorio 2 H. BootROM Menu I. Laboratorio 3
Page 2
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Interfaces de Administracin
Page 3
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Interfaces de Administracin
A. Command Line Interface
Conexin va Puerto de Consola Conexin va Telnet
Page 4
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 5
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
B. Para iniciar una sesin Telnet se debe asignar una direccin IP a una VLAN del switch. Configure vlan <name> ipaddress <ip_address> /<mask>
Page 6
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 7
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
history ping
clear
quit create
save delete
logout
help
enable
disable reboot
configure use
unconfigure
show
traceroute
download
Accounts
Configuration
rip memory
vlan
protocol iparp
log iproute
stpd
switch
qosprofile
ipstats ipconfig
fdb
ipfdb
management
ports
version
session
configuration
stats
collisions
errors
packet
utilization
port number
Page 8
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Summit48:1 # show <tab> Next possible completions: accounts configuration rip vlan protocol log stpd switch qosprofile ipstats igmp fdb ipfdb memory management iparp iproute ports version session ipqos ipconfig dvmrp diagnostics edp mirroring banner ospf gvrp ipmc <vlan name> <spanning tree name> <protocol name> <QOS profile> Summit48:1 # show port <tab> Next possible completions: collisions configuration info packet qosmonitor rxerrors stats txerrors utilization <port number> Summit48:1 # show ports configuration <tab> Next possible completions: <cr> Summit48:1 # show ports configuration <cr>
Page 9
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
accounts
banner bgp bootprelay checkpoint-data configuration cpu-monitoring debug dhcp-client dhcp-server diagnostics diffserv directory-services dns-client dos-protect
show accounts
System login banner Display BGP global configuration information Show the bootp relay information Checkpoint Data System configuration CPU Utilization Statistics debug info Show information related to dhcp-clients Show information related to the dhcp-server show diagnostic test results diffserv Directory Services program Show configuration automatic denial-of-service protection
dot1p
dot1q eaps edp elrp elsm esrp
dot1p
IEEE 802.1Q Ethernet Automatic Protection Switching EDP information ELRP (Extreme Loop Recognition Protocol) ELSM (Extreme Link Status Monitoring) ESRP (Extreme Standby Router Protocol)
Page 11
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 12
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 13
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 14
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 15
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Laboratorio 1
Page 17
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 18
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
D. Configurar una direccin IP configure default ipaddress 10.0.0.x/24 E. Configurar una workstation con direccin IP 10.0.0.1x/24 y conectarla mediante Ethernet al switch F. Conectarse mediante Telnet
Page 19
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Seguridad
Page 20
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Seguridad
A. Para configurar un switch es necesario introducir un nombre de usuario y una password B. Existen dos niveles de administracin:
User Administrator
C. Cada switch puede tener hasta dieciseis cuentas de administracin. D. Existen dos cuentas por defecto, sin password.
User Admin
Page 21
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
B. Una cuenta de nivel User puede usar el comando ping para verificar si un dispositivo est activo, y puede cambiar la clave asignada a su cuenta. Si usted ingresa con capacidades de nivel User, el prompt de la lnea de comando ser terminar con el smbolo (>).
Page 22
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 23
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
B. La validacin local implica la creacin y almacenamiento de los usuarios autorizados en cada uno de los switches. C. La validacin va RADIUS o TACACS+permite mejorar el control y escalabilidad en caso de tener mltiples switches, ya que estos son configurados para solicitar la autorizacin a un servidor centralizado. D. Si se valida mediante RADIUS, es posible, usando un servidor que lo soporte, validar cada comando emitido por el usuario, autorizando o denegando su ejecucin.
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 24
Software y Configuraciones
Page 28
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 29
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 30
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
C. Todo comando de configuracin dado se pierde al apagar el switch, excepto que se almacene la configuracin con el comando save config D. Mientras existan cambios en la configuracin no guardados, aparecer un asterisco junto al prompt del switch * Summit48 #
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 31
Page 33
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 35
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Troubleshooting
Page 36
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Troubleshooting
A. El comando show switch permite ver informacin sobre imgenes de software, configuraciones y areas en uso Este es el nombre
Summit48Tx:47 # sh switch sysName: Summit48Tx sysLocation: Licencia de EW. sysContact: support@extremenetworks.com, +1 888 257 3000 Puede ser Basic L3 o System MAC: 00:01:30:F3:71:20 Full L3 License: Full L3. System Mode: 802.1Q EtherType is 8100 (Hex). CPU Tx-Priority=High Recovery Mode: none Random Early Drop Probability: 0 DLCS: disabled Current time: Fri Aug 24 09:58:47 2007 Timezone: [Auto DST Enabled] GMT Offset: 0 minutes, DST is in effect. Boot time: Fri Aug 24 06:01:53 2001 Este es el nombre Next reboot: None scheduled que aparece en el Timed upload: None scheduled prompt del switch Timed download: None scheduled Temperature: Normal. All fans are operational. Power supply: PSU-A failed, PSU-B OK Estado de las Fuentes de Alimentacin
Page 37
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Troubleshooting (cont.)
A. El comando show switch permite ver informacin sobre imgenes de software, configuraciones y areas en uso
Summit1iTx:47 # sh switch (cont.) Software image selected: Software image booted: Primary Software version: Secondary software version: Configuration selected: Configuration booted: Primary configuration: Secondary configuration: secondary secondary 6.1.7b9 6.2.0b45 secondary secondary Created by 3612 bytes Created by 3452 bytes
EW Version: 6.1.7 Build 9 saved on Fri Jun 1 2001 10:43:14 EW Version: 6.2.0 Build 45 saved on Thu Aug 23 2007 14:58:29
Page 38
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Troubleshooting
A. El comando show switch permite ver informacin sobre imgenes de software, configuraciones y areas en uso Este es el nombre
Summit48Tx:47 # sh switch sysName: Summit48Tx sysLocation: Licencia de EW. sysContact: support@extremenetworks.com, +1 888 257 3000 Puede ser Basic L3 o System MAC: 00:01:30:F3:71:20 Full L3 License: Full L3. System Mode: 802.1Q EtherType is 8100 (Hex). CPU Tx-Priority=High Recovery Mode: none Random Early Drop Probability: 0 DLCS: disabled Current time: Fri Aug 24 09:58:47 2007 Timezone: [Auto DST Enabled] GMT Offset: 0 minutes, DST is in effect. Boot time: Fri Aug 24 06:01:53 2001 Este es el nombre Next reboot: None scheduled que aparece en el Timed upload: None scheduled prompt del switch Timed download: None scheduled Temperature: Normal. All fans are operational. Power supply: PSU-A failed, PSU-B OK Estado de las Fuentes de Alimentacin
Page 39
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Troubleshooting (cont.)
A. El comando show switch permite ver informacin sobre imgenes de software, configuraciones y areas en uso
Summit1iTx:47 # sh switch (cont.) Software image selected: Software image booted: Primary Software version: Secondary software version: Configuration selected: Configuration booted: Primary configuration: Secondary configuration: secondary secondary 6.1.7b9 6.2.0b45 secondary secondary Created by 3612 bytes Created by 3452 bytes
EW Version: 6.1.7 Build 9 saved on Fri Jun 1 2001 10:43:14 EW Version: 6.2.0 Build 45 saved on Thu Aug 23 2007 14:58:29
Page 40
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Laboratorio 2
Page 41
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 42
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Reinsertar el mdulo MSM64i. Verificar las versiones de software y sincronizar los mdulos. Verificar que la sincronizacin tuvo xito.
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
BootROM Menu
Page 45
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
BootRom >
Page 46
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
boot an image Sets which BootLoader BootStrap will boot Reboot system (hard reset) zmodem download display information select configuration enable features on-line help on-line help on-line help display command history list contents of CF directory change working CF directory print working CF directory ping remote host configure the bootloader ip address show the configuration of the bootloader ip address download an Config secondary/primary
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
B. El resultado ser el siguiente BootRom > Boot Module 27 JUL 07 v6.5 ========================== Memory Size: 08000000 Press spacebar for boot menu BootROM->
Page 48
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 49
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 50
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Laboratorio 3
Page 52
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 53
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Page 54
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Fin !
Page 55
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved.
Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. 2008 Extreme Networks, Inc. All rights reserved. 2008 Extreme Networks, Inc. All rights reserved.