Материал: Выбор сетевых устройств (Вендор Cisco)

Внимание! Если размещение файла нарушает Ваши авторские права, то обязательно сообщите нам

!classlessroute 64.64.0.0 255.240.0.0 Serial3/0 125route 64.64.0.0 255.240.0.0 Serial4/0 120route 14.1.1.0 255.255.255.0 Serial3/0 125route 14.1.1.0 255.255.255.0 Serial4/0 120route 216.3.3.0 255.255.255.252 Serial3/0 125route 216.3.3.0 255.255.255.252 Serial4/0 120route 158.56.45.20 255.255.255.252 Serial3/0 125route 158.56.45.20 255.255.255.252 Serial4/0 120route 50.1.1.0 255.255.255.252 Serial3/0 120route 50.1.1.0 255.255.255.252 Serial4/0 125route 216.2.2.0 255.255.255.252 Serial3/0 120route 216.2.2.0 255.255.255.252 Serial4/0 125route 112.0.0.0 255.255.255.0 Serial3/0 120route 112.0.0.0 255.255.255.0 Serial4/0 125route 11.1.1.0 255.255.255.0 Serial3/0 120route 11.1.1.0 255.255.255.0 Serial4/0 125route 12.12.12.0 255.255.255.0 Serial3/0 120route 12.12.12.0 255.255.255.0 Serial4/0 125route 58.58.45.16 255.255.255.252 Serial3/0 120route 58.58.45.16 255.255.255.252 Serial4/0 125route 192.168.200.0 255.255.255.240 Serial3/0 120route 192.168.200.0 255.255.255.240 Serial4/0 125route 215.2.2.0 255.255.255.252 Serial3/0 120route 215.2.2.0 255.255.255.252 Serial4/0 125route 41.0.0.0 255.0.0.0 GigabitEthernet2/0 130route 31.0.0.0 255.0.0.0 GigabitEthernet2/0 130route 212.121.15.20 255.255.255.252 GigabitEthernet1/0 130

!access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list standard no_privat10.0.0.0 0.255.255.255172.16.0.0 0.15.255.255192.168.0.0 0.0.255.255169.254.0.0 0.0.255.255any

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!12.2timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Router1

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radius

!ssh version 2domain-name router1

!GigabitEthernet0/0address 214.1.1.2 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!GigabitEthernet1/0address 50.1.1.1 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!Serial3/0address 215.1.1.2 255.255.255.252access-group no_privat in

!Serial4/0address 215.2.2.1 255.255.255.252access-group no_privat inrate 4000000

!GigabitEthernet5/0address 214.2.2.1 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!ospf 100id 2.2.2.2adjacency-changes0 authentication message-digest214.1.1.0 0.0.0.3 area 0214.2.2.0 0.0.0.3 area 050.1.1.0 0.0.0.3 area 050

!classlessroute 41.0.0.0 255.0.0.0 Serial3/0 120route 41.0.0.0 255.0.0.0 Serial4/0 125route 31.0.0.0 255.0.0.0 Serial3/0 120route 31.0.0.0 255.0.0.0 Serial4/0 125route 64.64.0.0 255.240.0.0 Serial3/0 125route 64.64.0.0 255.240.0.0 Serial4/0 120route 14.1.1.0 255.255.255.0 Serial3/0 125route 14.1.1.0 255.255.255.0 Serial4/0 120route 216.1.1.0 255.255.255.252 Serial3/0 120route 216.1.1.0 255.255.255.252 Serial4/0 125route 212.121.15.20 255.255.255.252 Serial3/0 120route 212.121.15.20 255.255.255.252 Serial4/0 125route 216.3.3.0 255.255.255.252 Serial3/0 125route 216.3.3.0 255.255.255.252 Serial4/0 120route 158.56.45.20 255.255.255.252 Serial3/0 125route 158.56.45.20 255.255.255.252 Serial4/0 120route 215.3.3.0 255.255.255.252 Serial3/0 120route 215.3.3.0 255.255.255.252 Serial4/0 125route 112.0.0.0 255.255.255.0 GigabitEthernet1/0 130route 11.1.1.0 255.255.255.0 GigabitEthernet1/0 130route 12.12.12.0 255.255.255.0 GigabitEthernet1/0 130route 216.2.2.0 255.255.255.252 GigabitEthernet1/0 130route 58.58.45.16 255.255.255.252 GigabitEthernet1/0 130route 192.168.200.0 255.255.255.240 GigabitEthernet1/0 130

!access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list standard no_privat10.0.0.0 0.255.255.255172.16.0.0 0.15.255.255192.168.0.0 0.0.255.255169.254.0.0 0.0.255.255any

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!12.2timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Router2

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radius

!ssh version 2domain-name router2

!GigabitEthernet0/0address 214.2.2.2 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!GigabitEthernet1/0address 158.56.45.21 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!GigabitEthernet2/0address 216.3.3.1 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!Serial3/0address 215.2.2.2 255.255.255.252access-group no_privat in

!Serial4/0address 215.3.3.1 255.255.255.252access-group no_privat inrate 4000000

!GigabitEthernet5/0address 214.3.3.1 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!ospf 100id 3.3.3.3adjacency-changes0 authentication message-digest2 authentication message-digest6 authentication message-digest214.2.2.0 0.0.0.3 area 0214.3.3.0 0.0.0.3 area 0216.3.3.0 0.0.0.3 area 2158.56.45.20 0.0.0.3 area 650

!classlessroute 41.0.0.0 255.0.0.0 Serial3/0 125route 41.0.0.0 255.0.0.0 Serial4/0 120route 31.0.0.0 255.0.0.0 Serial3/0 125route 31.0.0.0 255.0.0.0 Serial4/0 120route 212.121.15.20 255.255.255.252 Serial3/0 125route 212.121.15.20 255.255.255.252 Serial4/0 120route 50.1.1.0 255.255.255.252 Serial3/0 120route 50.1.1.0 255.255.255.252 Serial4/0 125route 216.2.2.0 255.255.255.252 Serial3/0 120route 216.2.2.0 255.255.255.252 Serial4/0 125route 112.0.0.0 255.255.255.0 Serial3/0 120route 112.0.0.0 255.255.255.0 Serial4/0 125route 11.1.1.0 255.255.255.0 Serial3/0 120route 11.1.1.0 255.255.255.0 Serial4/0 125route 12.12.12.0 255.255.255.0 Serial3/0 120route 12.12.12.0 255.255.255.0 Serial4/0 125route 58.58.45.16 255.255.255.252 Serial3/0 120route 58.58.45.16 255.255.255.252 Serial4/0 125route 192.168.200.0 255.255.255.240 Serial3/0 120route 192.168.200.0 255.255.255.240 Serial4/0 125route 216.1.1.0 255.255.255.252 Serial3/0 125route 216.1.1.0 255.255.255.252 Serial4/0 120route 215.1.1.0 255.255.255.252 Serial3/0 120route 215.1.1.0 255.255.255.252 Serial4/0 125route 64.64.0.0 255.240.0.0 GigabitEthernet2/0 130route 14.1.1.0 255.255.255.0 GigabitEthernet2/0 130route 158.56.45.20 255.255.255.252 GigabitEthernet1/0 130

!access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list standard no_privat10.0.0.0 0.255.255.255172.16.0.0 0.15.255.255192.168.0.0 0.0.255.255169.254.0.0 0.0.255.255any

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!15.1timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Router3

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radius

!udi pid CISCO2911/K9 sn FTX152460W2

!ssh version 2domain-name router3

!tree mode pvst

!GigabitEthernet0/0address 41.0.0.2 255.0.0.0ospf message-digest-key 1 md5 ciscosaccess-group no_privat inautoauto

!GigabitEthernet0/1address 31.0.0.1 255.0.0.0ospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!GigabitEthernet0/2address 216.1.1.2 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!Vlan1ip address

!ospf 100id 4.4.4.4adjacency-changes1 authentication message-digest216.1.1.0 0.0.0.3 area 131.0.0.0 0.255.255.255 area 141.0.0.0 0.255.255.255 area 1

!classlessroute 0.0.0.0 0.0.0.0 GigabitEthernet0/2 140

!access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list standard no_privat10.0.0.0 0.255.255.255172.16.0.0 0.15.255.255192.168.0.0 0.0.255.255169.254.0.0 0.0.255.255any

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh in

authentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!12.2timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Router4

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radius

!ssh version 2domain-name router4

!GigabitEthernet0/0address 112.0.0.1 255.255.255.0ospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!GigabitEthernet1/0address 216.2.2.2 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!GigabitEthernet2/0address 12.12.12.1 255.255.255.0ospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!GigabitEthernet3/0address 11.1.1.2 255.255.255.0ospf message-digest-key 1 md5 ciscoautoauto

!ospf 100id 5.5.5.5adjacency-changes3 authentication message-digest216.2.2.0 0.0.0.3 area 311.1.1.0 0.0.0.255 area 3112.0.0.0 0.0.0.255 area 312.12.12.0 0.0.0.255 area 3

!rip

!classlessroute 0.0.0.0 0.0.0.0 216.2.2.1 140

!access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list standard no_privat10.0.0.0 0.255.255.255172.16.0.0 0.15.255.255192.168.0.0 0.0.255.255169.254.0.0 0.0.255.255any

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!15.1timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Router5

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radius

!udi pid CISCO2911/K9 sn FTX15245879

!ssh version 2domain-name router5

!tree mode pvst

!GigabitEthernet0/0address 64.64.0.1 255.240.0.0ospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!GigabitEthernet0/1address 14.1.1.1 255.255.255.0ospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!GigabitEthernet0/2address 216.3.3.2 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!Vlan1ip address

!ospf 100id 6.6.6.6adjacency-changes2 authentication message-digest216.3.3.0 0.0.0.3 area 264.64.0.0 0.15.255.255 area 214.1.1.0 0.0.0.255 area 2information originate

!classlessroute 0.0.0.0 0.0.0.0 GigabitEthernet0/2 140

!access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list standard no_privat10.0.0.0 0.255.255.255172.16.0.0 0.15.255.255192.168.0.0 0.0.255.255169.254.0.0 0.0.255.255any

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!12.4timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!DMZ

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radius

!ssh version 2domain-name dmz

!tree mode pvst

!map type inspect match-any lan-wanprotocol ftpprotocol dnsprotocol sshprotocol icmpprotocol dhcpprotocol syslogprotocol ntpmap type inspect match-any wan-lanprotocol sshprotocol dhcpmap type inspect match-any lan-dmzprotocol dnsprotocol icmpmap type inspect match-any wan-dmzprotocol dnsprotocol icmpprotocol smtpprotocol pop3protocol ntpmap type inspect match-any dmz-lanprotocol sshmap type inspect match-any dmz-wanprotocol ntpprotocol tcpprotocol syslogmap type inspect in-outtype inspect lan-wan

!map type inspect out-intype inspect wan-lan

!map type inspect in-dmztype inspect lan-dmz

!map type inspect out-dmztype inspect wan-dmz

!map type inspect dmz-intype inspect dmz-lan

!map type inspect dmz-outtype inspect dmz-wantype inspect class-default

!security lansecurity wansecurity dmzpair security DMZ-LAN source dmz destination lanpolicy type inspect dmz-inpair security DMZ-WAN source dmz destination wanpolicy type inspect dmz-outpair security LAN-DMZ source lan destination dmzpolicy type inspect in-dmzpair security LAN-WAN source lan destination wanpolicy type inspect out-inpair security WAN-DMZ source wan destination dmzpolicy type inspect out-dmzpair security WAN-LAN source wan destination lanpolicy type inspect out-in

!FastEthernet0/0address 216.2.2.1 255.255.255.252member security dmzospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!FastEthernet0/1address 50.1.1.2 255.255.255.252member security wanospf message-digest-key 1 md5 ciscoaccess-group no_privat inautoauto

!FastEthernet1/0address 58.58.45.18 255.255.255.252member security lanospf message-digest-key 1 md5 ciscoaccess-group no_privat in

!Vlan1ip address

!ospf 100id 7.7.7.7adjacency-changes0 authentication message-digest3 authentication message-digest50.1.1.0 0.0.0.3 area 058.58.45.16 0.0.0.3 area 0216.2.2.0 0.0.0.3 area 3

!classlessroute 0.0.0.0 0.0.0.0 50.1.1.1 140

!access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list standard no_privat10.0.0.0 0.255.255.255172.16.0.0 0.15.255.255192.168.0.0 0.0.255.255169.254.0.0 0.0.255.255any

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!12.4timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!NpatOff1

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radius

!ssh version 2domain-name npat0ff1

!tree mode pvst

!FastEthernet0/0ip addressautoauto

!FastEthernet0/0.1dot1Q 1 nativeaddress 212.121.15.21 255.255.255.252ospf message-digest-key 1 md5 cisconat outside

!FastEthernet0/0.2dot1Q 2address 172.16.1.1 255.255.255.248ospf message-digest-key 1 md5 cisconat inside

!FastEthernet0/0.3dot1Q 3address 172.16.2.1 255.255.255.248ospf message-digest-key 1 md5 cisconat inside

!FastEthernet0/1ip addressautoauto

!Vlan1ip address

!ospf 100id 8.8.8.8adjacency-changes4 authentication message-digest212.121.15.20 0.0.0.3 area 4

!nat pool int 212.121.15.21 212.121.15.22 netmask 255.255.255.252nat inside source list off1 pool int overloadclasslessroute 0.0.0.0 0.0.0.0 212.121.15.22 140

!access-list standard off1172.16.1.0 0.0.0.7172.16.2.0 0.0.0.7access-list extended dostup_po_sshtcp 172.16.2.0 0.0.0.7 any eq 22tcp 172.16.1.0 0.0.0.7 any eq 22

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!

!12.4timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!NpatOff2

!secret level 2 5 $1$mERr$FOYYV7exBGDf49hz04T581secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!new-model

!authentication login default group radius noneauthentication login ssh group radiusssh version 2domain-name npatoff2

!tree mode pvst

!FastEthernet0/0ip addressautoauto

!FastEthernet0/0.1dot1Q 1 nativeaddress 58.58.45.17 255.255.255.252ospf message-digest-key 1 md5 ciscoaccess-group ping innat outside

!FastEthernet0/0.2dot1Q 2address 192.168.200.1 255.255.255.240helper-address 14.1.1.2ospf message-digest-key 1 md5 cisconat inside

!FastEthernet0/1ip addressautoauto

!Vlan1ip address

!ospf 100id 9.9.9.9adjacency-changes5 authentication message-digest0 authentication message-digest192.168.200.0 0.0.0.15 area 558.58.45.16 0.0.0.3 area 0

!rip

!nat pool off2 58.58.45.17 58.58.45.18 netmask 255.255.255.252nat inside source list Int pool off2 overloadclasslessroute 0.0.0.0 0.0.0.0 58.58.45.18 140

!access-list standard Int192.168.200.0 0.0.0.15host 14.1.1.2access-list extended dostup_po_sshtcp host 212.121.15.21 any eq 22access-list extended pingip 192.168.200.0 0.0.0.15 anyip any host 58.58.45.17udp host 216.2.2.2 host 192.168.200.2 eq 1812udp host 216.3.3.2 host 192.168.200.2 eq 1812udp host 216.1.1.2 host 192.168.200.2 eq 1812udp host 214.1.1.1 host 192.168.200.2 eq 1812udp host 214.2.2.2 host 192.168.200.2 eq 1812udp host 50.1.1.1 host 192.168.200.2 eq 1812udp host 212.121.15.21 host 192.168.200.2 eq 1812udp host 58.58.45.18 host 192.168.200.2 eq 1812udp host 14.1.1.2 192.168.200.0 0.0.0.15 range bootps bootpcospf any anyudp host 192.168.200.2 any eq 1645udp any any eq 1812udp any any eq 1645

!cdp run

!server host 192.168.200.2 auth-port 1812 key secret

!31.31.12.12con 07 082F4F5A00

!aux 0

!vty 0 4class dostup_po_ssh inauthentication sshinput ssh

!authentication-key 1 md5 0822455D0A16 7authenticatetrusted-key 1server 41.0.0.1 key 1update-calendar

!_Off1

!12.1timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Switch1_Off1

!secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!tree mode pvst

!FastEthernet0/1access vlan 2trunk allowed vlan 1-1001

!FastEthernet0/2access vlan 2trunk allowed vlan 1-1001

!FastEthernet0/3trunk allowed vlan 1-1001mode accessport-securityport-security maximum 2port-security mac-address stickyport-security mac-address sticky 00D0.BADB.94D4tree portfasttree bpduguard enable

!FastEthernet0/4trunk allowed vlan 1-1001mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/5access vlan 3mode accessport-securityport-security maximum 2port-security mac-address stickyport-security mac-address sticky 0060.2F1D.928Atree portfasttree bpduguard enable

!FastEthernet0/6access vlan 2mode accessport-securityport-security maximum 2port-security mac-address stickyport-security mac-address sticky 0060.703C.4CE7tree portfasttree bpduguard enable

!FastEthernet0/7access vlan 3mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/8access vlan 3mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/9access vlan 3mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/10access vlan 3mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/11mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/12mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/13mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/14mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/15mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/16mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/17mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/18mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/19mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/20mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/21mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/22mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/23mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/24mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!GigabitEthernet1/1trunk allowed vlan 1,4-1001mode trunk

!GigabitEthernet1/2trunk allowed vlan 1-1001mode trunk

!Vlan1ip address

!31.31.12.12

!con 07 082F4F5A00

!vty 0 4input nonevty 5 15input none

!_Off1

!12.1timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Switch2_Off1

!secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!tree mode pvst

!FastEthernet0/1access vlan 2trunk allowed vlan 1-1001mode trunk

!FastEthernet0/2access vlan 2trunk allowed vlan 1-1001mode trunk

!FastEthernet0/3mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/4mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/5access vlan 2mode accessport-securityport-security maximum 2port-security mac-address stickyport-security mac-address sticky 0090.0CB2.2750tree portfasttree bpduguard enable

!FastEthernet0/6access vlan 2mode accessport-securityport-security maximum 2port-security mac-address stickyport-security mac-address sticky 0001.4248.D81Ctree portfasttree bpduguard enable

!FastEthernet0/7access vlan 2mode accessport-securityport-security maximum 2port-security mac-address stickyport-security mac-address sticky 0002.17E3.D1E3tree portfasttree bpduguard enable

!FastEthernet0/8access vlan 2mode accessport-securityport-security maximum 2port-security mac-address stickyport-security mac-address sticky 0060.3E34.4D50tree portfasttree bpduguard enable

!FastEthernet0/9mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/10mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/11mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/12mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/13mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/14mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/15mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/16mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/17mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/18mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/19mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/20mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/21mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/22mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/23mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!FastEthernet0/24mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable

!GigabitEthernet1/1trunk allowed vlan 1-1001mode access

!GigabitEthernet1/2trunk allowed vlan 1-1001mode access

!Vlan1ip address

!31.31.12.12

!con 07 082F4F5A00

!vty 0 4input nonevty 5 15input none

!_Off1

!12.1timestamps log datetime msecservice timestamps debug datetime msecpassword-encryption

!Switch3_Off1

!secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0

!tree mode pvst

!FastEthernet0/1access vlan 2trunk allowed vlan 1-1001

!FastEthernet0/2access vlan 2trunk allowed vlan 1-1001mode trunk

!FastEthernet0/3mode accessport-securityport-security maximum 2port-security mac-address stickytree portfasttree bpduguard enable