Forráskód Böngészése

Add initial T2600G notes

Håvard O. Nordstrand 4 éve
szülő
commit
fb2e6d288e

+ 2 - 9
config/network/fs-fsos-switches.md

@@ -13,18 +13,11 @@ breadcrumbs:
 
 ## Info
 
-- The CLI is very Cisco IOS-like.
-- The default credentials are username `admin` and password `admin`.
-- The default mgmt. IP address is `192.168.1.1/24`.
+- Default credentials: Username `admin` and password `admin`.
+- Default mgmt. IP address: `192.168.1.1/24`
 - By default, SSH, Telnet and HTTP servers are accessible using the default mgmt. address and credentials.
 - The default VLAN is VLAN1.
 
-### Supported Security Mechanisms
-
-For the FS S3700-24T4F.
-
-**TODO**
-
 ## Initial Setup
 
 1. Connect to the switch using serial.

+ 216 - 0
config/network/tplink-jetstream-switches.md

@@ -0,0 +1,216 @@
+---
+title: TP-Link JetStream Switches
+breadcrumbs:
+- title: Configuration
+- title: Network
+---
+{% include header.md %}
+
+### Using
+{:.no_toc}
+
+- TP-Link T2600G-28TS (24+4-port L2 managed switch)
+
+### TODO
+{:.no_toc}
+
+- Auto install.
+- IGMP and MLD snooping.
+- RSTP.
+- Centralized logging.
+- Fast LACP.
+- QoS.
+- Inactivity timer.
+
+## Info
+
+- Supports (T2600G):
+    - Access security features for both IPv4 and IPv6, like storm control, DHCPv4/v6 snooping, ARP snooping, ND snooping, etc.
+    - RADIUS and TACACS+.
+    - SNMP and sFlow.
+    - DHCP/BOOTP client.
+- Default mgmt. address: `192.168.0.1`
+- Default admin user: Username `admin` and password `admin`.
+- Console port (micro-USB or RS232 RJ45):
+    - Baud rate: 38400bps
+    - Data bits: 8
+    - Parity: None
+    - Stop bits: 1
+    - Flow control: None
+- As it uses some outdates SSH algorithms, you may need to enable some older algorithms: `ssh -o KexAlgorithms=+diffie-hellman-group1-sha1 -o HostKeyAlgorithms=+ssh-dss -c aes128-cbc <user>@<host>`
+
+### LED Statuses
+
+- Power/PWR:
+    - Off: Powered off.
+    - On: Powered on.
+    - Flashing: PSU problem.
+- System/SYS:
+    - Flashing: OK.
+    - On or off: Problem.
+
+## Initial Setup
+
+1. Connect to the switch using serial (see info about for details).
+    - Note that you may need to use `Ctrl+H` for backspace.
+1. Login with username `admin` and password `admin` and set a new admin password when asked.
+1. Enter privileged exec mode: `enable`
+1. (Optional) Show version: `show system-info`
+    - See the note below on how to upgrade it.
+1. Enter config mode: `configure`
+    - Use `exit` to exit.
+    - Use `no <...>` to negate a command.
+1. Add new admin user: `user name <username> privilege admin secret 0 <password>`
+    - `secret 0` will automatically hash the password using MD5.
+    - The `password-encryption` service is not used for `secret`, only `password`.
+    - As I don't know which hashing algorithm `password-encryption` (or `password 7`) uses, I trust it even less than MD5.
+1. Disable old admin user: `no user name admin`
+    - You need to re-log as the new admin first.
+1. (Optional) Disable HTTP server: **TODO**
+1. Enable SSH and disable Telnet:
+    1. Set version: `no ip ssh version v1`
+    1. Enable server: `ip ssh server`
+    1. Disable Telnet: `telnet disable`
+1. Change Switch Database Management (SDM) template:
+    1. Allocate more resources to IPv6: `sdm prefer enterpriseV6`
+    1. **TODO** Check how many entries are actually used. The max count seems low.
+1. Setup physical interfaces (basics):
+    1. Enter one or multiple interfaces: `int g 1/0/1` or `int range g 1/0/25-28`
+    1. Set description: `desc <desc>`
+    1. Disable (if unused): `shutdown`
+1. Setup LAGs:
+    1. Set load balancing method (global): `port-channel load-balance src-dst-ip`
+    1. Enter the interface range of member interfaces.
+    1. Make them members of the LAG and use LACP: `channel-group <n> mode active`
+    1. Enter port channel interface: `interface port-channel <n>`
+    1. Configure it as an interface (applies when the LACP interface is up).
+    1. Show the status: `show lacp internal` and `show lacp neighbor`
+1. Define VLANs (L2):
+    1. Enter the VLAN config: `vlan <VID>`
+    1. Name it: `name <name>`
+1. Setup VLAN trunk ports:
+    1. Enter the member interface configs.
+    1. Allow only tagged frames: `switchport acceptable frame tagged`
+    1. Set allowed tagged VLANs: `switchport general allowed vlan <VID-list> tagged`
+1. Setup VLAN access ports:
+    1. Enter the member interface configs.
+    1. Set allowed PVID VLAN: `switchport general allowed vlan <VID> untagged`
+    1. Set the PVID VLAN: `switchport pvid <VID>`
+1. Setup VLAN mixed ports:
+    1. Enter the member interface configs.
+    1. Set allowed tagged VLANs: `switchport general allowed vlan <VID-list> tagged`
+    1. Set allowed PVID VLAN: `switchport general allowed vlan <VID> untagged`
+    1. Set the PVID VLAN: `switchport pvid <VID>`
+1. Setup L3 interface:
+    1. Enter the interface (physical, VLAN, etc.).
+    1. Set the IPv4 address: `ip address <address> <subnet>`
+    1. Enable IPv6: `ipv6 enable`
+    1. Set the IPv6 address: `ipv6 address <address>/<prefix-length>`
+1. Disable default VLAN:
+    1. Enter VLAN: `int vlan 1`
+    1. Disable it: `shutdown`
+    1. Remove the address: `no ip address`
+    1. Disable IPv6: `no ipv6 enable`
+1. Set hostname: `hostname`
+1. Set default routes:
+    - IPv4: `ip route 0.0.0.0 0.0.0.0 <next-hop>`
+    - IPv6: `ipv6 route ::/0 <next-hop>`
+1. Set DNS servers: **TODO** Not possible?
+1. Set time and NTP servers:
+    1. Set recurring DST: `system-time dst recurring last Sun Mar 2:00 last Sun Oct 3:00` (Norway)
+    1. Set time and NTP servers: `system-time ntp UTC+01:00 <ip-1> <ip-2> <update-hours>`
+    1. Note: Both servers must be IP addresses and using the same IP version, but they may be the same address.
+1. (Optional) Enable LLDP globally: `lldp`
+1. Enable LLDP:
+    1. Enable globally: `lldp`
+    1. Enter physical interface configs.
+    1. (Optional) Disable transmit: `no lldp transmit`
+    1. (Optional) Disable receive: `no lldp receive`
+    1. (Optional) Enable LLDP-MED: `lldp med-status`
+1. (Optional) Enable flow control:
+    1. Note: Flow control requires that the connected devices support it in order for it to work. As it pauses all traffic when "triggered", setting up QoS _instead_ of flow control is a much better option if possible.
+    1. Enter the interface configs (physical or LAG).
+    1. Enable: `flow-control`
+    1. Show status: `show int status`
+1. Enable Enerfy Efficient Ethernet (EEE):
+    1. Note: EEE is safe to enable on all ports and does not require that the connected devices are compatible in any way.
+    1. Enter the physical interfaces (preferably all ports).
+    1. Enable: `eee`
+    1. Show status: `show int eee`
+1. Enable storm control:
+    1. Enter an interface range.
+    1. Set to drop on exceed: `storm-control exceed drop`
+    1. Set rate mode: `storm-control rate-mode {kbps|ratio|pps}` (e.g. ratio)
+    1. Enable for broadcast: `storm-control broadcast <threshold>` (e.g. 1%)
+    1. Enable for multicast: `storm-control multicast <threshold>` (e.g. 1%)
+    1. Enable for unknown unicast: `storm-control unicast <threshold>` (e.g. 1%)
+1. Enable DHCPv4/v6 snooping:
+    1. Enable globally: `{ip|ipv6} dhcp snooping`
+    1. Set max number of bindings on port (interface) (1-2 per interface should be enough): `{ip|ipv6} dhcp snooping max-entries <n>`
+    1. **TODO** Trusted ports. DHCP filter?
+    1. **TODO** Detection.
+    1. **TODO** Per VLAN?
+    1. **TODO** Test.
+1. Enable ARP (IPv4) snooping and detection:
+    1. Enable snooping and detection globally: `ip arp inspection`
+    1. Validate source: `ip arp inspection validate src-mac`
+    1. Validate destination: `ip arp inspection validate dst-mac`
+    1. Validate IP address: `ip arp inspection validate ip`
+    1. Set trusted interface (interface): `ip arp inspection trust`
+    1. **TODO** Per VLAN?
+    1. **TODO** Test.
+1. Enable ND (IPv6) snooping and detection:
+    1. Enable snooping globally: `ipv6 nd snooping`
+    1. Enable detection globally: `ipv6 nd detection`
+    1. Set max number of bindings on port (interface) (avoid setting this too low as IPv6 may use a lot of addresses per interfaces): `ipv6 nd snooping max-entries <n>`
+    1. Set trusted interface (interface): `ipv6 nd detection trust`
+    1. **TODO** Per VLAN?
+    1. **TODO** Test.
+1. Enable IP source guard:
+    1. Note: IPSG uses the DHCP/ND/ARP snooping database. For IPv6, the SDM template must be set correctly to allocate hardware resources.
+    1. Enable for IP and MAC (interface): `{ip|ipv6} verify source sip-mac`
+    1. **TODO** Test.
+1. Enable DoS prevention:
+    1. Enable globally: `ip dos-prevent`
+    1. Prevent scan-synfin: `ip dos-prevent type scan-synfin`
+    1. Prevent xma-scan: `ip dos-prevent type xma-scan`
+1. Setup IGMP (IPv4) snooping: **TODO**
+1. Setup MLD (IPv6) snooping: **TODO**
+1. (Optional) Setup TACACS+: **TODO**
+1. Enable SNMP: **TODO**
+1. Setup STP (802.1W/RSTP): **TODO**
+1. (Optional) Setup sFlow: **TODO**
+1. Set terminal idle timer: **TODO**
+1. Save the config (exec mode): `copy run start`
+
+## Commands
+
+- System info:
+    - Systrem info: `show system-info`
+    - Image info: `show image-info`
+    - CPU utilization: `show cpu-utilization`
+    - Memory utilization: `show memory-utilization`
+- Configuration:
+    - Show startup config: `show startup-config`
+    - Show running config: `show running-config`
+    - Save configuration: `copy run start`
+- Interfaces:
+    - Show short operational L2 status: `show int status`
+    - Show short configured L2 status: `show int conf`
+    - Show short L3 status: `show ip int brief`
+
+### Configuration Mode
+
+- Enter interface range: `int range <type> <full-start>-<end>` (e.g. `int range g 1/0/1-24`)
+
+## Tasks
+
+### Setup Netboot
+
+**TODO**
+
+### Upgrade Firmware
+
+**TODO**
+
+{% include footer.md %}

+ 2 - 0
index.md

@@ -78,12 +78,14 @@ Random collection of config notes and miscellaneous stuff. _Technically not a wi
 - [Cisco IOS General](config/network/cisco-ios-general/)
 - [Cisco IOS Routers](config/network/cisco-ios-routers/)
 - [Cisco IOS Switches](config/network/cisco-ios-switches/)
+- [FS FSOS Switches](config/network/fs-fsos-switches/)
 - [Juniper Hardware](config/network/juniper-hardware/)
 - [Juniper Junos General](config/network/juniper-junos-general/)
 - [Juniper Junos Switches](config/network/juniper-junos-switches/)
 - [Linksys LGS Switches](config/network/linksys-lgs/)
 - [Linux Switching & Routing](config/network/linux/)
 - [pfSense](config/network/pfsense/)
+- [TP-Link JetStream Switches](config/network/tplink-jetstream-switches/)
 - [Ubiquiti UniFi Controllers](config/network/ubiquiti-unifi-controllers/)
 - [Uniquiti UniFi Access Points](config/network/ubiquiti-unifi-aps/)
 - [VyOS](/config/network/vyos/)