Configuring enterprise routers requires establishing system identification, interface parameters, routing protocols, and secure management channels. The following examples demonstrate a standardized CLI approach for deploying core routing functionality.
# System Identification
set system host-name Edge-Router-01
# Interface & Gateway Setup
configure interface GigabitEthernet0/0/1
assign ipv4-address 192.168.10.1 255.255.255.0
activate
set routing default-gateway 192.168.10.254
# Static & Dynamic Routing
set routing static-route 10.50.0.0/16 via 192.168.10.254
enable routing-protocol ospf process-id 100
set router-id 1.1.1.1
advertise network 192.168.10.0/24 area 0
enable routing-protocol bgp as-number 65001
configure neighbor 203.0.113.2 as 65002
announce network 198.51.100.0/24
# Secure Remote Access & Monitoring
enable remote-access ssh
generate rsa-keypair 2048-bit
create local-user netadmin role ssh-access
configure snmp community public-mib access read-only view standard-mib
set snmp protocol-version v2c
Switch Management & Operations
Layer 2 switches handle MAC address learning, frame forwarding, and traffic segmentation. Proper configuration involves VLAN assignment, link aggregation, spanning tree optimization, and management plane hardneing.
# VLAN & Port Configuration
create vlan 20 name User-Network
configure port FastEthernet0/1
set speed 1000mbps
set duplex full
assign vlan 20
# Link Aggregation (EtherChannel Equivalent)
configure port GigabitEthernet0/2
set aggregation-group 5 mode active
configure port GigabitEthernet0/3
set aggregation-group 5 mode active
# Layer 2 Control & Trunking
configure port GigabitEthernet0/24
set link-type trunk
permit vlan 10,20,30
enable spanning-tree protocol rapid-pst
set root-priority 4096
# Management & Monitoring
create vlan-interface 99
assign ipv4-address 172.16.100.50/24
configure snmp community mon-access access read-write
Firewall Security & Policy Enforcement
Firewalls enforce traffic filtering, sttaeful inspection, and address translation. Configuration focuses on defining access control lists, security zones, NAT rules, and comprehensive logging for audit trails.
# Access Control & Security Zones
define access-rule 101
match source-address 10.0.0.0/8
match destination-address 172.16.50.0/24
match protocol tcp dst-port 443
action permit
create security-policy Web-Traffic
match zone Internal to zone External
apply rule 101
enforce action allow
# Network Address Translation
define nat-rule src-translate-01
match original-source 10.0.0.0/24
match original-dest any
transform source to 203.0.113.5
# Auditing & Alerting
enable system-logging
set log-level informational
forward logs to syslog-server 10.0.0.50
configure alert-threshold connection-limit 5000