PKS系统Cisco交换机的安装与配置



PKS系统Cisco交换机的安装与配置准备工作:1、确认用于连接电脑和交换机的通讯线2、确认计算机上已装有HyperTerminal通讯工具3、确认交换机配置文件是否存在,A、如果已经安装了FTE驱动包则文件存在于如下目录:C:\Program Files\Honeywell\FTE_Driver\Switch Configuration B、如果没有安装FTE驱动包,则可在Honeywell提供的软件中Common Components光盘中查找如下目录:光驱:\Packages\FTE_Driver\Switch_Configuration_Files连接交换机:注:先不要打开交换机电源1、将通讯电缆连接于交换机的通讯配置接口和计算机的串口2、点击Start > Programs > Accessories > Communications > HyperTerminal,运行HyperTerminal3、在Connection Description对话框中,为这一连接输入一个名称(自己识别方便即可),点击“ok”4、在Icon对话框,点击相应的图标并确认5、在Connect To对话框,选择正在被使用的串口,并确认。
6、在Properties对话框配置端口如下:Bits per second: 9600Data Bits: 8Parity: NONEStop bits: 1Flow control: Xon/Xoff通讯端口默认为COM1不变;点击“ok”7、打开交换机电源配置交换机:1、在如下部分输入相应的值(粗体部分),并回车Would you like to enter the initial configuration dialog? [yes/no]: yAt any point you may enter a question mark '?' for help.Use ctrl-c to abort configuration dialog at any prompt.Default settings are in square brackets '[]'.Basic management setup configures only enough connectivityfor management of the system, extended setup will ask youto configure each interface on the systemWould you like to enter basic management setup? [yes/no]: yConfiguring global parameters:2、 为交换机输入一个“host name”,同意网络中每台交换机的“host name”都必须是不同的。
在如下部分输入相应的值(粗体部分),并回车Enter host name [Switch]: Cisco_FTE4The enable secret is a password used to protect access toprivileged EXEC and configuration modes. This password, afterentered, becomes encrypted in the configuration.Enter enable secret: Cisco_FTE1The enable password is used when you do not specify anenable secret password, with some older software versions, andsome boot images.Enter enable password: FTE4The virtual terminal password is used to protectaccess to the router over a network interface.Enter virtual terminal password: FTE4Configure SNMP Network Management? [no]: N3、下面是显示信息的一部分,太长没有完全抄录,无需操作,可压空格键完成显示。
Current interface summaryAny interface listed with OK? value "NO" does not have a valid configurationInterface IP-Address OK? Method Status ProtocolVlan1 unassigned NO unset up downFastEthernet0/1 unassigned YES unset down downFastEthernet0/2 unassigned YES unset down downFastEthernet0/3 unassigned YES unset down downFastEthernet0/48 unassigned YES unset down downGigabitEthernet0 unassigned YES unset down downGigabitEthernet0/2 unassigned YES unset down down4、完成以上组态显示后,自动进入交换机对话框,在如下部分输入相应的值(粗体部分),并回车。
Enter interface name used to connect to themanagement network from the above interface summary: vlan1Configuring interface Vlan1:Configure IP on this interface? [yes/no]: NWould you like to enable as a cluster command switch? [yes/no]: N5、下面是显示信息的一部分,太长没有完全抄录,无需操作,可压空格键完成显示The following configuration command script was created:hostname Cisco_FTE4enable secret 5 $1$qF.3$3AIkt0lNtdjMLAdknUnht.enable password FTE4line vty 0 15password FTE4no snmp-server!!interface Vlan1shutdownno ip address!interface FastEthernet0/1no shutdownno ip address!interface FastEthernet0/2!interface FastEthernet0/3!interface FastEthernet0/4interface FastEthernet0/48!interface GigabitEthernet0/1!interface GigabitEthernet0/2!end6、组态信息显示完后,出现如下对话栏,输入2并回车保存交换机配置信息。
[0] Go to the IOS command prompt without saving this config.[1] Return back to the setup without saving this config.[2] Save this configuration to nvram and exit.Enter your selection [2]: 27、交换机参数配置已完成,具体显示如下:Building configuration...[OK]00:02:36: %LINK-5-CHANGED: Interface Vlan1, changed state to administratively down00:02:37: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down00:02:38: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to downUse the enabled mode 'configure' command to modify this configuration.接下来需要为交换机设定IP地址、SNMP、NTP等。
使用enable命令和前面设定的enable密码记入下一步操作,具体操作如下:Press RETURN to get started!
有冗余的服务器的系统需要人为设定SNMP在交换机里形成两台服务器的IP地址 每个交换机也应该有一个群名10.1.4.15 –服务器IP地址FTE – 交换机群名(Community Name)Cisco_FTE4(config)#snmp-server enable traps snmp warmstart linkdown linkup coldstartCisco_FTE4(config)#snmp-server host 10.1.4.15 FTE snmp如果是冗余服务器则需要继续输入#snmp-server host 10.1.4.16 FTE snmp其中10.1.4.16为冗余服务器IP地址13、接下来是设置NTP如果时间服务器在FTE子网内则直接进入下一步10.1.4.1-默认的网关地址192.168.100.1 – NTP时间服务器IP地址具体操作如下:Cisco_FTE4(config)#ip default-gateway 10.1.4.1Cisco_FTE4(config)#ntp server 192.168.100.1Cisco_FTE4(config)#exitCisco_FTE4#00:06:03: %SYS-5-CONFIG_I: Configured from console by console
下装相应的交换机配置文件:1、选择适合于系统要求的交换机配置文件,具体类型如下:Switch configuration fileLevelSwitch TypeNo. of uplinksNo. of 10 MB FTEBsNo. of FD 100 MBsVLAN101 configuredL1_1u_2310_2412950-241230NoL1_2u_2210_2412950-242220Nov101_L1_1u_2310_2412950-241230Yesv101_L1_2u_2210_2412950-242220YesL1_1u_471012950-481470Nov101_L1_1u_471012950-481470YesL1_1u_295512955C-121110NoL1_2u_295512955C-122100Nov101_L1_1u_295512955C-121110Yesv101_L1_2u_295512955C-122100Yes12u_2422950-2412012No2u_2422950-242022No4u_2422950-244020Nov101_12u_2422950-2412012Yesv101_2u_2422950-242022Yesv101_4u_2422950-244020Yes2u22950-482046No4u22950-484044Nov101_2u22950-482046Yesv101_4u22950-484044Yesfte_3550_cnfg23550-121200Nov101_fte_3550_cnfg23550-121200Yes24u_3550fx23550-24FX2400Nov101_24u_3550fx23550-24FX2400Yes4u_1610_241 & 22950-244164No4u_410_241 & 22950-244416No4u_810_241 & 22950-244812Nov101_4u_1610_241 & 22950-244164Yesv101_4u_410_241 & 22950-244420Yesv101_4u_810_241 & 22950-244812Yes4u_16101 & 22950-4841628No4u_4101 & 22950-484440No4u_8101 & 22950-484836Nov101_4u_16101 & 22950-4841628Yesv101_4u_4101 & 22950-484440Yesv101_4u_8101 & 22950-484836Yes1u_710_29551 & 22955C-12174Nov101_1u_710_29551 & 22955C-12174Yes2、使用Copy命令在交换机中初始化传送Cisco_FTE4#copy xmodem: system:running-configDestination filename [running-config]?
在“Protocol”下选择“Xmodem”,点击“Send”开始传输4、如果有同名文件则选择覆盖%Warning:There is a file already existing with this name Do you want to over write? [confirm]yBegin the Xmodem or Xmodem-1K transfer now...CCCCCCCCCC如果在传输过程中出现错误,则输入如下命令并回车:Cisco_FTE4#copy xmodem: system:running-config传输完成显示如下信息:16256 bytes copied in 46.396 secs (353 bytes/sec)5、将交换机配置文件写入交换机内存Cisco_FTE4#write6、查看新配置的交换机信息,命令如下:Cisco_FTE4#sho run下面是显示信息,空格键翻页Building configuration...Current configuration : 15560 bytes!version 12.1no service padservice timestamps debug uptimeservice timestamps log uptimeno service password-encryptionservice sequence-numbers!hostname Cisco_FTE4!enable secret 5 $1$JIQ6$IJ3nKv2oS2zCJZihoHEKl/enable password Cisco_FTE1 !wrr-queue bandwidth 1 2 3 4!class-map match-all cda_mediummatch access-group 104class-map match-all cda_urgentmatch access-group 102class-map match-all cda_highmatch access-group 103class-map match-all cda_lowmatch access-group 105!!policy-map cda_policyclass cda_urgentset ip dscp 56class cda_highset ip dscp 46!ip subnet-zeroip ftp username ps_userip ftp password ps_user localno ip igmp snooping!spanning-tree extend system-id!!interface FastEthernet0/1no ip addressduplex fullspeed 100service-policy input cda_policystorm-control broadcast level 20.00 18.00storm-control multicast level 20.00 18.00storm-control unicast level 20.00 18.00storm-control action trap!interface FastEthernet0/48switchport trunk allowed vlan 1,1001-1005no ip addressduplex fullspeed 100service-policy input cda_policystorm-control broadcast level 20.00 18.00storm-control multicast level 20.00 18.00storm-control unicast level 20.00 18.00storm-control action trapspanning-tree portfast!interface GigabitEthernet0/1no ip addressservice-policy input cda_policystorm-control broadcast level 5.00 4.50storm-control multicast level 5.00 4.50storm-control unicast level 5.00 4.50storm-control action trap!interface GigabitEthernet0/2no ip addressservice-policy input cda_policystorm-control broadcast level 5.00 4.50storm-control multicast level 5.00 4.50storm-control unicast level 5.00 4.50storm-control action trap!interface Vlan1ip address 10.1.4.254 255.255.255.0no ip route-cacheshutdown!ip http server!access-list 102 permit tcp any any eq 55554access-list 102 permit tcp any any eq 55555access-list 103 permit tcp any any eq 55550access-list 103 permit tcp any any eq 55551access-list 103 permit tcp any any eq 55553access-list 103 permit tcp any any eq 55552access-list 103 permit tcp any any eq 55556access-list 104 permit tcp any any eq 55557access-list 104 permit tcp any any eq 55558access-list 104 permit tcp any any eq 55559access-list 104 permit udp any any eq 12321access-list 104 permit tcp any any eq 55560access-list 105 permit tcp any any eq 55560access-list 105 permit udp any any eq 55560access-list 105 permit tcp any any eq 55559access-list 105 permit udp any any eq 12321access-list 105 permit tcp any any eq 55556access-list 105 permit tcp any any eq 55557access-list 105 permit tcp any any eq 55558!line con 0exec-timeout 0 0line vty 0 4password FTE1loginline vty 5 15password FTE1login!endCisco_FTE4#在这个例子中:有4个Uplink口(用于冗余互联或上联);4个用于FTE的自适应口;余下为100M口至此,交换机配置全部完成。