configure port 8:27 auto off speed 100 duplex full
To view the log…
show log
To run extended diagnostics (takes switch offline)…
run diagnostics extended slot backplane
After which you can view the log, replace anything defective, and then to return the switch to normal operation…
clear log diag-status reboot
configure port 49 auto on
show port info
show fdb
show iparp
show conf
disable port 7:22 enable port 7:22
configure port 7:20 display-string "engmail server"
create vlan "EngMMNet" config vlan "EngMMNet" tag 100 configure stpd s0 add vlan "EngMMNet"
configure vlan "SD2Net" add port 7:24 untagged
configure vlan "SD2Net" delete port 7:24
configure vlan "SD2Net" add port 7:24 tagged
config vlan "CupidNet" ipaddress 129.97.20.1 255.255.255.0 enable ipforwarding "CupidNet" configure rip add vlan "CupidNet" configure rip "CupidNet" cost 1 enable rip enable irdp vlan "CupidNet" config rip rxmode none vlan "CupidNet" config rip txmode v2only vlan "CupidNet"
configure iproute add 129.97.68.0 255.255.255.0 129.97.50.76 1
enable rip export static cost 0 tag 0
enable stpd s0 disable stpd s0
To disable/enable spanning tree on port 1:4
disable stpd s0 port 1:4 enable stpd s0 port 1:4
create fdbentry 00:02:b3:1d:74:91 vlan CupidNet port 32 disable learning ports 32
configure vlan "SD2Net" add port 7:24 mac-limit 1
create fdbentry 00:50:BA:C7:2F:94 CircuitNet blackhole both
*dest-mac* or source-mac can be specified instead of both which allows blocking independently on egress or ingress
To block all traffic from 129.97.20.217
create access-list blocker1 ip destination any source 129.97.20.217 /32 deny ports any
Use show access-lis
t to see hit counts etc, and delete access-list blocker1 to delete the access list.
create access-list temp_block_ssh tcp destination any ip-port any source 129.97.50.123/32 ip-port 22 deny ports 7:25 precedence 10
Note: the access-list is applied to an ingress port, the above will allow an initial TCP packet to reach the target, but it will not be able to respond, and thus no TCP handshake will occur.
create udp-profile engcompdhcp config engcompdhcp add 67 ipaddress 129.97.50.36 config engcompdhcp add 67 ipaddress 129.97.50.67 config cupidnet udp-profile engcompdhcp
create access-list spoof1 ip destination any source 129.97.0.0/16 permit ports any precedence 250 create access-list spoof2 ip destination 129.97.0.0/16 source any permit ports any precedence 251 create access-list spoof3 ip destination any source 0.0.0.0/32 permit ports any precedence 252 create access-list spoof4 ip destination 224.0.0.0/4 source any permit ports any precedence 253 create access-list spoof5 ip destination any source any deny ports any precedence 254
The above allows IP spoofing onsite (129.97.0.0/16) but prevents spoofed IP from leaving the site, unless it is spoofed from an onsite address. This is probably adequate. More elaborate access lists would be required to keep spoofing local to a subnet.
config port 5:1 auto off duplex full speed 1000