<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Switch on Ricky</title><link>https://linzeyan.github.io/categories/switch/</link><description>Recent content in Switch on Ricky</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Tue, 24 Sep 2024 09:04:00 +0800</lastBuildDate><atom:link href="https://linzeyan.github.io/categories/switch/index.xml" rel="self" type="application/rss+xml"/><item><title>Google Infra</title><link>https://linzeyan.github.io/posts/2024/20240924-google-infra/</link><pubDate>Tue, 24 Sep 2024 09:04:00 +0800</pubDate><guid>https://linzeyan.github.io/posts/2024/20240924-google-infra/</guid><description>&lt;ul>
&lt;li>&lt;a href="https://www.kawabangga.com/posts/6624" target="_blank" rel="noopener">Google&amp;rsquo;s 5-generation network architecture in ten years&lt;/a>&lt;/li>
&lt;/ul></description></item><item><title>Switch Firmware Update</title><link>https://linzeyan.github.io/posts/2018/20180614-cisco-firmware-version-update/</link><pubDate>Thu, 14 Jun 2018 12:28:29 +0800</pubDate><guid>https://linzeyan.github.io/posts/2018/20180614-cisco-firmware-version-update/</guid><description>&lt;h4 id="preparation">Preparation:&lt;/h4>
&lt;p>Plug in the console.&lt;/p>
&lt;p>Copy the update file to the USB drive.&lt;/p>
&lt;p>&lt;strong>&lt;em>Before starting, use &lt;code>show version&lt;/code> to check the current version&lt;/em>&lt;/strong>&lt;/p>
&lt;h4 id="update-sop">Update SOP:&lt;/h4>
&lt;ol>
&lt;li>Insert the USB with the update file into the switch. The screen will show the detected device name.&lt;/li>
&lt;li>Copy the update file from USB to the switch flash: &lt;code>copy usbflash0(device name):&amp;lt;update-file&amp;gt; flash:&lt;/code>
&lt;ol>
&lt;li>Press Enter and confirm the file name, then press Enter again. A stream of &lt;code>ccccccccc&lt;/code> means it is copying.&lt;/li>
&lt;/ol>
&lt;/li>
&lt;li>After it finishes, use &lt;code>dir flash&lt;/code> to verify the update file exists.&lt;/li>
&lt;li>&lt;code>conf t&lt;/code> to enter config mode, then &lt;code>boot system flash:&amp;lt;update-file&amp;gt;&lt;/code> to set the new IOS image.&lt;/li>
&lt;li>&lt;code>exit&lt;/code> config mode, then &lt;code>show boot&lt;/code> to confirm the new IOS is selected.&lt;/li>
&lt;li>&lt;code>write memory&lt;/code> to apply settings to the running config.&lt;/li>
&lt;li>Run &lt;code>reload&lt;/code>.&lt;/li>
&lt;li>It takes about 15-20 minutes. After it finishes, check the version to confirm the upgrade.&lt;/li>
&lt;/ol>
&lt;pre tabindex="0">&lt;code>copy usbflash0:cat.bin flash:
copy usbflash0:cat.bin flash0-2:
software install file flash:cat.bin switch 1-2
software clean
&lt;/code>&lt;/pre></description></item><item><title>How to Enable SNMP on a Switch</title><link>https://linzeyan.github.io/posts/2018/20180204-switchsnmp/</link><pubDate>Sun, 04 Feb 2018 14:48:12 +0800</pubDate><guid>https://linzeyan.github.io/posts/2018/20180204-switchsnmp/</guid><description>&lt;ul>
&lt;li>&lt;a href="https://itlocation.blogspot.com/2013/10/switchsnmp.html" target="_blank" rel="noopener">How to Enable SNMP on a Switch&lt;/a>&lt;/li>
&lt;/ul>
&lt;p>Use &lt;code>snmp-server&lt;/code> as the main command.&lt;/p>
&lt;p>&lt;code>C3750(Config)#snmp-server community RO&lt;/code>&lt;/p>
&lt;p>This is the shared secret for SNMP communication.
RO means Read Only (SNMP tools are not allowed to modify settings).
RW means Read and Write (SNMP tools can modify settings).&lt;/p>
&lt;p>&lt;code>C3750(config)#snmp-server group SNMP_ROA v3 priv match exact&lt;/code>&lt;/p>
&lt;ol>
&lt;li>SNMP group name: SNMP_ROA&lt;/li>
&lt;li>Version: v3&lt;/li>
&lt;li>Highest priv level&lt;/li>
&lt;/ol>
&lt;p>&lt;code>C3750(config)#snmp-server user cater SNMP_ROA v3 auth MD5 cisco12345 priv des56 test12345&lt;/code>&lt;/p></description></item><item><title>Switch notes</title><link>https://linzeyan.github.io/posts/2017/20171125-cisco/</link><pubDate>Sat, 25 Nov 2017 11:47:37 +0800</pubDate><guid>https://linzeyan.github.io/posts/2017/20171125-cisco/</guid><description>&lt;h4 id="switch">Switch&lt;/h4>
&lt;p>&lt;strong>&lt;em>Switches are usually L2 devices&lt;/em>&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>They forward packets only to the destination host (based on the MAC table), which reduces collisions and eavesdropping. Switches can also handle packets arriving at the same time, while hubs cannot.&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>&lt;em>Hubs are L1 devices&lt;/em>&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>They forward packets from any host to all connected hosts, so collisions happen and cause random retries.&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>&lt;em>MAC Table&lt;/em>&lt;/strong>&lt;/p>
&lt;ol>
&lt;li>Learning
&lt;ul>
&lt;li>A packet arrives on some port (network A) from MAC X destined for MAC Y. The switch records that MAC X is on network A. This is called learning.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Flooding
&lt;ul>
&lt;li>The switch does not yet know where MAC Y is, so it forwards the packet to all networks except A. This is called flooding.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Forwarding
&lt;ul>
&lt;li>The host with MAC Y receives the packet and sends an ACK to MAC X. The switch records that MAC Y is on that network, then forwards the ACK to MAC X. This is forwarding.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Filtering
&lt;ul>
&lt;li>The switch receives a packet and finds that the source and destination MACs are on the same network, so it drops the packet. This is filtering.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Aging
&lt;ul>
&lt;li>Each MAC-table entry has a timestamp of last access. Entries older than a threshold (configurable) are removed. This is aging.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ol>
&lt;h5 id="vlan">Vlan&lt;/h5>
&lt;p>Switch interfaces must support 802.1Q&lt;/p></description></item></channel></rss>