Hostname:
hostname test
Image Upgrade:
del /r /f flash:c3560-ipbase-mz.122-35.SE5
copy tftp://192.168.2.1/images/c3560-ipbasek9-mz.122-46.SE.bin flash:
del - File
rm - Folder
Boot with other Image:
boot system c3560-advipservicesk9-mz.122-46.SE.bin
Portfast (on dhcpd Problems):
spanning-tree portfast
Switchport with Vlan 10:
interface FastEthernet0/1
switchport access vlan 10
switchport mode access
description nativ
macro description NATIV
spanning-tree portfast
Description Vlan 10:
vlan 10 name testvlan
Trunkport:
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
ip dhcp snooping trust
DHCP Snooping:
Global Activate:
ip dhcp snooping vlan 1-4094
no ip dhcp snooping information option
ip dhcp snooping
Allow DHCP on Port:
ip dhcp snooping trust
ESXi Trunking:
ip dhcp snooping vlan 1-4094
no ip dhcp snooping information option
ip dhcp snooping
these are the vlans, one main, one “test” for the vm
vlan 1
name main
vlan 999
name test
normal client port
interface FastEthernet0/1
switchport access vlan 1
spanning-tree portfast
vm client port which does access vlan 999
interface FastEthernet0/3
switchport access vlan 999
spanning-tree portfast
vm server port, which does access normal vlan 1, and does trunk the rest
” ip dhcp snooping trust” means, that this port is allowed to answer dhcp requests
interface FastEthernet0/7
switchport trunk encapsulation dot1q
switchport trunk native vlan 1
switchport trunk allowed vlan 1,999
switchport mode trunk
ip dhcp snooping trust
end
Routing with c3560-advipservicesk9-mz.122-46.SE.bin:
( Every Net needs a own Vlan! )
( The Vlan Ip is the Gateway )
ip routing
interface FastEthernet0/1
switchport access vlan 2
switchport mode access
interface FastEthernet0/8
switchport access vlan 3
switchport mode access
interface Vlan2
ip address 134.96.10.1 255.255.255.0
interface Vlan3
ip address 192.168.2.1 255.255.255.0