User Access Verification
Password:
FS-JF-3750>ena
Password:
FS-JF-3750#show run
Building configuration...
Current configuration : 15743 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service sequence-numbers
!
hostname FS-JF-3750
!
boot-start-marker
boot-end-marker
!
enable password cisco
!
!
!
no aaa new-model
switch 1 provision ws-c3750x-24
system mtu routing 1500
ip routing
no ip dhcp conflict logging
ip dhcp excluded-address 10.10.14.240 10.10.14.254
ip dhcp excluded-address 10.10.15.240 10.10.15.254
ip dhcp excluded-address 10.10.16.240 10.10.16.254
ip dhcp excluded-address 10.10.17.240 10.10.17.254
ip dhcp excluded-address 10.10.18.240 10.10.18.254
ip dhcp excluded-address 10.10.19.240 10.10.19.254
ip dhcp excluded-address 10.10.20.240 10.10.20.254
ip dhcp excluded-address 10.10.21.240 10.10.21.254
ip dhcp excluded-address 10.10.22.240 10.10.22.254
ip dhcp excluded-address 10.10.23.240 10.10.23.254
ip dhcp excluded-address 10.10.24.240 10.10.24.254
ip dhcp excluded-address 10.10.25.240 10.10.25.254
ip dhcp excluded-address 10.10.26.240 10.10.26.254
ip dhcp excluded-address 10.10.27.240 10.10.27.254
ip dhcp excluded-address 10.10.28.240 10.10.28.254
ip dhcp excluded-address 10.10.29.240 10.10.29.254
ip dhcp excluded-address 192.168.1.2
ip dhcp excluded-address 192.168.1.171 192.168.1.254
ip dhcp excluded-address 192.168.2.1
ip dhcp excluded-address 192.168.2.1 192.168.2.20
ip dhcp excluded-address 192.168.1.1 192.168.1.30
ip dhcp ping packets 10
ip dhcp ping timeout 800
!
ip dhcp pool vlan21-pool
   network 10.10.21.0 255.255.255.0
   default-router 10.10.21.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan22-pool
   network 10.10.22.0 255.255.255.0
   default-router 10.10.22.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan23-pool
   network 10.10.23.0 255.255.255.0
   default-router 10.10.23.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan24-pool
   network 10.10.24.0 255.255.255.0
   default-router 10.10.24.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan25-pool
   network 10.10.25.0 255.255.255.0
   default-router 10.10.25.1
   dns-server 202.99.192.68 202.99.192.66
!
ip dhcp pool vlan29-pool
   network 10.10.29.0 255.255.255.0
   default-router 10.10.29.1
   dns-server 202.99.192.68 202.99.192.66
!
ip dhcp pool vlan1
   network 192.168.1.0 255.255.255.0
   default-router 192.168.1.2
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan2
   network 192.168.2.0 255.255.255.0
   default-router 192.168.2.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan28-pool
   network 10.10.28.0 255.255.255.0
   default-router 10.10.28.1
   dns-server 202.99.192.68 202.99.192.66
!
ip dhcp pool vlan27-pool
   network 10.10.27.0 255.255.255.0
   default-router 10.10.27.1
   dns-server 202.99.192.68 202.99.192.66
!
ip dhcp pool vlan26-pool
   network 10.10.26.0 255.255.255.0
   default-router 10.10.26.1
   dns-server 202.99.192.68 202.99.192.66
!
ip dhcp pool vlan14-pool
   network 10.10.14.0 255.255.255.0
   default-router 10.10.14.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan15-pool
   network 10.10.15.0 255.255.255.0
   default-router 10.10.15.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan16-pool
   network 10.10.16.0 255.255.255.0
   dns-server 202.99.192.68 219.150.32.132
   default-router 10.10.16.1
!
ip dhcp pool vlan17-pool
   network 10.10.17.0 255.255.255.0
   default-router 10.10.17.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan18-pool
   network 10.10.18.0 255.255.255.0
   dns-server 202.99.192.68 219.150.32.132
   default-router 10.10.18.1
!
ip dhcp pool vlan19-pool
   network 10.10.19.0 255.255.255.0
   default-router 10.10.19.1
   dns-server 202.99.192.68 219.150.32.132
!
ip dhcp pool vlan20-pool
   network 10.10.20.0 255.255.255.0
   dns-server 202.99.192.68 219.150.32.132
   default-router 10.10.20.1
!
ip dhcp pool vlan13-pool
   network 10.10.13.0 255.255.255.0
   default-router 10.10.13.1
   dns-server 202.99.192.68
!
ip dhcp pool vlan10-pool
   network 10.10.10.0 255.255.255.0
   default-router 10.10.10.1
   dns-server 202.99.192.68 219.150.32.132
!
!
!
!
crypto pki trustpoint TP-self-signed-218727552
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-218727552
 revocation-check none
 rsakeypair TP-self-signed-218727552
!
!
crypto pki certificate chain TP-self-signed-218727552
 certificate self-signed 01
  30820241 308201AA A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 32313837 32373535 32301E17 0D393330 33303130 30303132
  335A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
  532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3231 38373237
  35353230 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
  B694F5DC 5B27123B 360B2D34 C3BFC603 C7B508B1 C1B145E3 28BDE548 2DF837F8
  E836B967 9CD871F1 FB06E39A 67453588 A1E79E2B 0EA9166A 9A50E4BA 80F97D4C
  BE317A7D 5C8AC488 300D9833 ACF2F240 D955EE25 D8197FB5 5AF97273 02C32049
  6ECC0893 A45813C0 17F69F04 E31198DC 32890FB5 5306D6AB CB18A598 4E9C5FA7
  02030100 01A36B30 69300F06 03551D13 0101FF04 05300301 01FF3016 0603551D
  11040F30 0D820B43 6F72652D 33373530 582E301F 0603551D 23041830 16801420
  6E39B15A BFF98C96 BC58D8A4 3B30C5DC 8A568730 1D060355 1D0E0416 0414206E
  39B15ABF F98C96BC 58D8A43B 30C5DC8A 5687300D 06092A86 4886F70D 01010405
  00038181 009D1884 56BC0E24 6A984389 1A0D9158 E16490D9 5BDF2A11 288C79D1
  A317D75E BC6B197C 6AE27420 DC0590B7 CA58D065 4030E0C9 BE43C04A 64C9060E
  C4F91B93 6CAF9A60 C18EBDA4 2C0733CF 401C334F 8CD3B173 6A450A94 16B16DC2
  AD9B0E48 8A1CA622 558FED42 3A39E27F 5ECA9F1A 91F62AC1 D1D199B8 26FA1DB3
  C071321E A1
  quit
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0
 no ip address
 no ip route-cache cef
 no ip route-cache
 no ip mroute-cache
!
interface GigabitEthernet1/0/1
 switchport mode access
!
interface GigabitEthernet1/0/2
 switchport mode access
!
interface GigabitEthernet1/0/3
 switchport mode access
!
interface GigabitEthernet1/0/4
 switchport mode access
!
interface GigabitEthernet1/0/5
 switchport access vlan 19
 switchport mode access
!
interface GigabitEthernet1/0/6
 switchport access vlan 20
 switchport mode access
!
interface GigabitEthernet1/0/7
 switchport access vlan 26
 switchport mode access
!
interface GigabitEthernet1/0/8
 switchport mode access
!
interface GigabitEthernet1/0/9
 switchport mode access
!
interface GigabitEthernet1/0/10
 switchport access vlan 11
 switchport mode access
 ip dhcp client lease 1 0 0
!
interface GigabitEthernet1/0/11
 switchport access vlan 11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet1/0/18
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet1/0/19
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet1/0/20
 description conncet-2960-2
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet1/0/21
 description connect-Jiangmin-manager
 switchport access vlan 3
 switchport trunk encapsulation dot1q
 switchport mode access
!
interface GigabitEthernet1/0/22
 description connect-2960-1
 switchport access vlan 12
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet1/0/23
 description connect-5512
 switchport access vlan 3
 switchport trunk encapsulation dot1q
 switchport mode access
!
interface GigabitEthernet1/0/24
 description connect-jiangmin-jingxiang
 switchport access vlan 3
 switchport trunk encapsulation dot1q
 switchport mode access
!
interface GigabitEthernet1/1/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
!        
interface GigabitEthernet1/1/2
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet1/1/3
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet1/1/4
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface Vlan1
 ip address 192.168.1.2 255.255.255.0
!
interface Vlan2
 ip address 192.168.2.1 255.255.255.0
!
interface Vlan3
 description FS-SW3750-ASA5512
 ip address 10.10.1.1 255.255.255.0
!
interface Vlan10
 description FS-Jifang-Network
 ip address 10.10.10.1 255.255.255.0
!
interface Vlan11
 description FS-JianKong-manager
 ip address 10.10.11.1 255.255.255.0
 ip access-group 102 out
!
interface Vlan12
 description FS-server-Network
 ip address 10.10.12.1 255.255.255.0
 ip access-group 101 out
!
interface Vlan13
 description FS-Lianjianlou-Network
 ip address 10.10.13.1 255.255.255.0
!
interface Vlan14
 description FS-Gongyinglou-Network
 ip address 10.10.14.1 255.255.255.0
!        
interface Vlan15
 description FS-Duizulou-Network
 ip address 10.10.15.1 255.255.255.0
!
interface Vlan16
 description FS-Jidianlou-Network
 ip address 10.10.16.1 255.255.255.0
!
interface Vlan17
 description FS-Jiujing-Network
 ip address 10.10.17.1 255.255.255.0
!
interface Vlan18
 description FS-Xinjing-Network
 ip address 10.10.18.1 255.255.255.0
!
interface Vlan19
 description FS-xiaoyuan-Network
 ip address 10.10.19.1 255.255.255.0
!
interface Vlan20
 description FS-guolufang-Network
 ip address 10.10.20.1 255.255.255.0
!
interface Vlan21
 description FS-Shitang-Network
 ip address 10.10.21.1 255.255.255.0
!
interface Vlan22
 description FS-Sushe#1-01
 ip address 10.10.22.1 255.255.255.0
!
interface Vlan23
 description FS-Sushe#1-02
 ip address 10.10.23.1 255.255.255.0
!
interface Vlan24
 description FS-Sushe#1-03
 ip address 10.10.24.1 255.255.255.0
!
interface Vlan25
 description FS-Sushe#1-04
 ip address 10.10.25.1 255.255.255.0
!
interface Vlan26
 description FS-Sushe#2-01
 ip address 10.10.26.1 255.255.255.0
!        
interface Vlan27
 description FS-Sushe#2-02
 ip address 10.10.27.1 255.255.255.0
!
interface Vlan28
 description FS-Sushe#2-03
 ip address 10.10.28.1 255.255.255.0
!
interface Vlan29
 description FS-Sushe#2-04
 ip address 10.10.29.1 255.255.255.0
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.10.1.2
ip route 10.41.0.0 255.255.0.0 192.168.1.128
ip route 192.168.102.0 255.255.255.0 192.168.1.241
ip http server
ip http secure-server
!
ip sla enable reaction-alerts
access-list 101 deny   ip 192.168.2.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.10.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.13.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.14.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.15.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.16.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.17.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.18.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.20.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.21.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.22.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.23.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.24.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.26.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.25.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.27.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 deny   ip 10.10.28.0 0.0.0.255 10.10.12.0 0.0.0.255
access-list 101 permit ip any 10.10.12.0 0.0.0.255
access-list 102 deny   ip 192.168.2.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.10.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.13.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.14.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.15.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.16.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.17.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.18.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.20.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.21.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.22.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.23.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.24.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.26.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.25.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.27.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 deny   ip 10.10.28.0 0.0.0.255 10.10.11.0 0.0.0.255
access-list 102 permit ip any 10.10.11.0 0.0.0.255
arp 10.10.13.8 0025.1189.8928 ARPA
arp 10.10.13.3 c80a.a962.466d ARPA
arp 10.10.13.2 4487.fcc9.82d6 ARPA
arp 10.10.14.55 0027.1993.9568 ARPA
snmp-server community public RO
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps transceiver all
snmp-server enable traps tty
snmp-server enable traps eigrp
snmp-server enable traps ospf state-change
snmp-server enable traps ospf errors
snmp-server enable traps ospf retransmit
snmp-server enable traps ospf lsa
snmp-server enable traps ospf cisco-specific state-change nssa-trans-change
snmp-server enable traps ospf cisco-specific state-change shamlink interface-old
snmp-server enable traps ospf cisco-specific state-change shamlink neighbor
snmp-server enable traps ospf cisco-specific errors
snmp-server enable traps ospf cisco-specific retransmit
snmp-server enable traps ospf cisco-specific lsa
snmp-server enable traps license
snmp-server enable traps auth-framework sec-violation
snmp-server enable traps cef resource-failure peer-state-change peer-fib-state-change inconsistency
snmp-server enable traps cluster
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps fru-ctrl
snmp-server enable traps entity
snmp-server enable traps event-manager
snmp-server enable traps hsrp
snmp-server enable traps ipmulticast
snmp-server enable traps power-ethernet group 1-9
snmp-server enable traps power-ethernet police
snmp-server enable traps pim neighbor-change rp-mapping-change invalid-pim-message
snmp-server enable traps cpu threshold
snmp-server enable traps rtr
snmp-server enable traps vstack
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps stpx inconsistency root-inconsistency loop-inconsistency
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps stackwise
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server host 10.10.1.1 public
snmp-server host 10.10.19.2 public
snmp-server host 192.168.1.2 public
!
!
line con 0
line vty 0 4
 password cisco
 login
line vty 5 15
 login
!
!
monitor session 1 source interface Gi1/0/23
monitor session 1 destination interface Gi1/0/24
end
FS-JF-3750#