network switch

1. Pre-Installation Preparation

2. Equipment Inspection

3. Configuration Setup

  • Use a console cable or SSH client to access the switch.
  • Connect to the appropriate COM port or enter the switch's IP address.
  • Log in with administrator credentials.
  • Verify successful connection before proceeding.
  • Access the command line interface (CLI).
  • Enter configuration mode.
  • Set the hostname with 'hostname [desired_name]'.
  • Assign an IP address using 'ip address [ip] [subnet_mask]'.
  • Download the latest firmware from the vendor's website.
  • Upload the firmware to the switch via TFTP/FTP.
  • Use the command 'upgrade [firmware_file]'.
  • Reboot the switch to apply the update.
  • Access VLAN configuration mode.
  • Create VLANs using 'vlan [vlan_id]'.
  • Assign a name with 'name [vlan_name]'.
  • Configure ports to VLANs with 'switchport access vlan [vlan_id]'.
  • Identify the ports for trunking.
  • Enter interface configuration mode for each port.
  • Set trunking mode with 'switchport mode trunk'.
  • Allow specific VLANs with 'switchport trunk allowed vlan [vlan_list]'.
  • Select the management interface (usually VLAN 1).
  • Assign an IP address and subnet mask.
  • Set access controls using 'access-class [number] in'.
  • Secure access with ACLs as necessary.
  • Identify ports to be aggregated.
  • Enter interface range mode for selected ports.
  • Enable LACP with 'channel-group [number] mode active'.
  • Configure the new port channel interface.
  • Access global configuration mode.
  • Enable STP with 'spanning-tree mode [mode]'.
  • Set bridge priority with 'spanning-tree vlan [vlan_id] priority [value]'.
  • Verify STP status with 'show spanning-tree'.
  • Access global configuration mode.
  • Define class maps for traffic types.
  • Create policy maps to define actions.
  • Apply the policy to interfaces using 'service-policy [policy_name]'.
  • Determine the type of ACL needed (standard or extended).
  • Create ACL with 'access-list [number] [permit/deny] [conditions]'.
  • Apply ACL to interfaces in the desired direction.
  • Verify ACL functionality with 'show access-lists'.
  • Enable DHCP snooping globally with 'ip dhcp snooping'.
  • Specify trusted ports with 'ip dhcp snooping trust'.
  • Configure VLANs for DHCP snooping with 'ip dhcp snooping vlan [vlan_id]'.
  • Verify configuration with 'show ip dhcp snooping'.
  • Select interfaces for port security.
  • Enable port security with 'switchport port-security'.
  • Set maximum MAC addresses with 'switchport port-security maximum [number]'.
  • Define actions on violation with 'switchport port-security violation [action]'.
  • Access global configuration mode.
  • Enable SNMP with 'snmp-server community [community_string] ro'.
  • Set SNMP version with 'snmp-server version [version]'.
  • Define access controls if needed.
  • Access global configuration mode.
  • Enable logging with 'logging on'.
  • Set the logging level with 'logging trap [level]'.
  • Define a logging host if remote logging is needed.
  • Use 'show' commands to verify settings.
  • Check connectivity with ping tests.
  • Verify VLANs and trunking with 'show vlan brief'.
  • Document any issues for troubleshooting.
  • Record each change made in a log file.
  • Include timestamps and reasons for changes.
  • Store documentation in a centralized location.
  • Ensure team members have access to the documentation.
  • Access privileged EXEC mode.
  • Use the command 'write memory' or 'copy running-config startup-config'.
  • Verify saved configuration with 'show startup-config'.
  • Confirm persistence by rebooting the switch.

4. Network Security

5. Connectivity Testing

6. Documentation and Reporting

7. Post-Installation Monitoring

8. Training and Support

Related Checklists