{"id":791,"date":"2022-01-12T07:08:28","date_gmt":"2022-01-12T07:08:28","guid":{"rendered":"https:\/\/rudecloud.site\/?p=791"},"modified":"2025-03-01T07:16:17","modified_gmt":"2025-03-01T07:16:17","slug":"topologi-superlab-1","status":"publish","type":"post","link":"https:\/\/www.rudecloud.web.id\/index.php\/2022\/01\/12\/topologi-superlab-1\/","title":{"rendered":"TOPOLOGI SUPERLAB #1"},"content":{"rendered":"\n<p>Pada pembahasan kali ini, saya memiliki topologi perulangan yaitu switch dengan root (utama) dan non root (backup), menggunakan STP (Spanning Tree Protocol), suatu protokol yang berfungsi untuk mencegah terjadinya looping pada proses pengiriman data, akan tetapi pada topologi superlab yang pertama saya post ini, tidak menkonfigurasi STP saja, di antaranya :  Vlan, VTP, Native Vlan, Intervlan Routing, Port Security dan Wirelles, oke langsung saja ke pembahasanya. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"879\" height=\"427\" src=\"https:\/\/rudecloud.site\/wp-content\/uploads\/2022\/01\/1-2.png\" alt=\"\" class=\"wp-image-792\" srcset=\"https:\/\/www.rudecloud.web.id\/wp-content\/uploads\/2022\/01\/1-2.png 879w, https:\/\/www.rudecloud.web.id\/wp-content\/uploads\/2022\/01\/1-2-300x146.png 300w, https:\/\/www.rudecloud.web.id\/wp-content\/uploads\/2022\/01\/1-2-768x373.png 768w\" sizes=\"auto, (max-width: 879px) 100vw, 879px\" \/><\/figure>\n\n\n\n<p>Pertama kita setting router1 <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\n\nROUTER1\n\nR1# configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nR1(config)#interface fastEthernet 0\/0.10\nR1(config-subif)#encapsulation dot1Q 10\nR1(config-subif)#ip address 172.16.10.1 255.255.255.0\nR1(config-subif)#no shutdown \nR1(config-subif)#exit\n\nR1(config)#interface fastEthernet 0\/0.20\nR1(config-subif)#encapsulation dot1Q 20\nR1(config-subif)#ip address 172.16.20.1 255.255.255.0\nR1(config-subif)#no shutdown \nR1(config-subif)#exit\n\nR1(config)#interface fastEthernet 0\/0.43\nR1(config-subif)#encapsulation dot1Q 43\nR1(config-subif)#ip address 172.16.43.1 255.255.255.0\nR1(config-subif)#no shutdown \nR1(config-subif)#exit\n\nR1(config)#interface fastEthernet 0\/0.67\nR1(config-subif)#encapsulation dot1Q 67\nR1(config-subif)#ip address 172.16.67.1 255.255.255.0\nR1(config-subif)#no shutdown \nR1(config-subif)#\n\nR1(config)#interface fastEthernet 0\/0\nR1(config-if)#no shutdown\n\n#NATIVE DI VLAN 43 \nRouter1#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nRouter1(config)#interface fastEthernet 0\/0.43\nRouter1(config-subif)#encapsulation dot1Q 43\nRouter1(config-subif)#encapsulation dot1Q 43 native \nRouter1(config-subif)#<\/code><\/pre>\n\n\n\n<p>Setting masing2 Switch, ipaddress vlan, gateway, password<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SW_DS1(config)#interface vlan 43\n\n%LINK-5-CHANGED: Interface Vlan43, changed state to up\n\nSW_DS1(config-if)#exit\nSW_DS1(config)#ip default-gateway 172.16.43.1\nSW_DS1(config)#end\nSwitch#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSwitch(config)#hostname SW_AC2\nSW_AC2(config)#interface vlan 43 \nSW_AC2(config-if)#ip address 172.16.43.12 255.255.255.0 \nSW_AC2(config-if)#exit\nSW_AC2(config)#ip default-gateway 172.16.43.1\nSW_AC2(config)#do wr\nBuilding configuration...\n&#91;OK]\nSW_AC2(config)#\n\nSW_AC3&gt;en\nPassword: \nSW_AC3#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_AC3(config)#interface vlan 43 \nSW_AC3(config-if)#ip address 172.16.43.13 255.255.255.0\nSW_AC3(config-if)#exit\nSW_AC3(config)#ip default-gateway 172.16.43.1\nSW_AC3(config)#do wr\nBuilding configuration...\n&#91;OK]\nSW_AC3(config)#\n\n\nSW_AC2#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_AC2(config)#banner motd #Authorized Access Only#\nSW_AC2(config)#enable secret class\nSW_AC2(config)#line console 0\nSW_AC2(config-line)#password cisco\nSW_AC2(config-line)#login local \nSW_AC2(config-line)#exit\nSW_AC2(config)#line vty 0 4\nSW_AC2(config-line)#password cisco\nSW_AC2(config-line)#end\nSW_AC2#wr\nBuilding configuration...\n&#91;OK]\n\n#SWITCH 1\nSW_DS1#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_DS1(config)#interface range fastEthernet 0\/19 - 24\nSW_DS1(config-if-range)#switchport mode trunk \nSW_DS1(config-if-range)#switchport trunk native vlan 43\nSW_DS1(config-if-range)#\n\n#SWITCH 2\nSW_AC2#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_AC2(config)#interface range fastEthernet 0\/19 - 24\nSW_AC2(config-if-range)#switchport mode trunk \nSW_AC2(config-if-range)#switchport trunk native vlan 43\n\n#SWITCH 3\nSW_AC3(config)#interface range fastEthernet 0\/19 - 24\nSW_AC3(config-if-range)#switchport mode trunk \nSW_AC3(config-if-range)#switchport trunk native vlan 43\n<\/code><\/pre>\n\n\n\n<p>Konfigurasi VTP server dan VTP Client <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\n\nSW_DS1(config)#vtp mode server \nDevice mode already VTP SERVER.\nSW_DS1(config)#vtp domain CCNA\nChanging VTP domain name from NULL to CCNA\nSW_DS1(config)#vtp password cisco\n\nSW_AC2#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_AC2(config)#vtp mode client \nSetting device to VTP CLIENT mode.\nSW_AC2(config)#vtp domain CCNA\nDomain name already set to CCNA.\nSW_AC2(config)#vtp password cisco\nSetting device VLAN database password to cisco\nSW_AC2(config)#\n\nSW_AC3#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_AC3(config)#vtp mode client \nSetting device to VTP CLIENT mode.\nSW_AC3(config)#vtp domain CCNA\nDomain name already set to CCNA.\nSW_AC3(config)#vtp password cisco\nSetting device VLAN database password to cisco\nSW_AC3(config)#<\/code><\/pre>\n\n\n\n<p>Setting Vlan <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SW_AC2#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\n\nSW_AC2(config)#interface range fastEthernet 0\/1 - 10\nSW_AC2(config-if-range)#switchport mode access \nSW_AC2(config-if-range)#switchport access vlan 10\nSW_AC2(config-if-range)#exit\nSW_AC2(config)#interface range fastEthernet 0\/11 - 17 \nSW_AC2(config-if-range)#switchport mode access \nSW_AC2(config-if-range)#switchport access vlan 20\n\n\nSW_AC3(config)#interface range fastEthernet 0\/1 - 10\nSW_AC3(config-if-range)#switchport mode access \nSW_AC3(config-if-range)#switchport access vlan 10\nSW_AC3(config-if-range)#exit\nSW_AC3(config)#interface range fastEthernet 0\/11 - 17\nSW_AC3(config-if-range)#switchport mode access \nSW_AC3(config-if-range)#switchport access vlan 20\nSW_AC3(config-if-range)#exit\nSW_AC3(config)#interface fastEthernet 0\/18  \nSW_AC3(config-if)#switchport mode access \nSW_AC3(config-if)#switchport access vlan 67\nSW_AC3(config-if)#\nSW_AC3(config-if)#end\nSW_AC3#\n%SYS-5-CONFIG_I: Configured from console by console\n\nSW_AC3#wr\nBuilding configuration...\n&#91;OK]\nSW_AC3#\n<\/code><\/pre>\n\n\n\n<p>Setting STP &amp; Port Security<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SW_DS1#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_DS1(config)#spanning-tree vlan 1,10,20,43,67 priority 4096\nSW_DS1(config)#end\nSW_DS1#\n\nSW_AC2&gt;en\nPassword: \nSW_AC2#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_AC2(config)#spanning-tree vlan 1,10,20,43,67 priority 8192 \n\n\nSW_AC3#configure terminal \nEnter configuration commands, one per line.  End with CNTL\/Z.\nSW_AC3(config)#interface fastEthernet 0\/2\nSW_AC3(config-if)#switchport mode access \nSW_AC3(config-if)#switchport port-security \nSW_AC3(config-if)#switchport port-security mac-address sticky \nSW_AC3(config-if)#switchport port-security violation shutdown \nSW_AC3(config-if)#switchport port-security maximum 2\nSW_AC3(config-if)#do wr\nBuilding configuration...\n&#91;OK]\nSW_AC3(config-if)#<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"552\" src=\"https:\/\/rudecloud.site\/wp-content\/uploads\/2022\/01\/12-1024x552.png\" alt=\"\" data-id=\"806\" data-full-url=\"https:\/\/rudecloud.site\/wp-content\/uploads\/2022\/01\/12.png\" data-link=\"https:\/\/rudecloud.site\/index.php\/2022\/01\/12\/topologi-superlab-1\/12-2\/\" class=\"wp-image-806\" srcset=\"https:\/\/www.rudecloud.web.id\/wp-content\/uploads\/2022\/01\/12-1024x552.png 1024w, https:\/\/www.rudecloud.web.id\/wp-content\/uploads\/2022\/01\/12-300x162.png 300w, https:\/\/www.rudecloud.web.id\/wp-content\/uploads\/2022\/01\/12-768x414.png 768w, https:\/\/www.rudecloud.web.id\/wp-content\/uploads\/2022\/01\/12.png 1365w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>Mungkin itu saja, di pojok kanan bawah, ada nilainya, dan ada waktu di pojok bawah kiri, jangan ngeliat lamanya ya itu waktu ngoprek santai hehe sekian dari saya terimakasih saya lampiran filenya untuk belajar <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pada pembahasan kali ini, saya memiliki topologi perulangan yaitu switch dengan root (utama) dan non root (backup), menggunakan STP (Spanning Tree Protocol), suatu protokol yang berfungsi untuk mencegah terjadinya looping pada proses pengiriman data, akan tetapi pada topologi superlab yang pertama saya post ini, tidak menkonfigurasi STP saja, di antaranya : Vlan, VTP, Native Vlan, &hellip; <\/p>\n","protected":false},"author":1,"featured_media":792,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[60,82,83,64,63],"class_list":["post-791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco","tag-cisco","tag-ip","tag-ipv4","tag-nat","tag-network"],"_links":{"self":[{"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/posts\/791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/comments?post=791"}],"version-history":[{"count":8,"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/posts\/791\/revisions"}],"predecessor-version":[{"id":830,"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/posts\/791\/revisions\/830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/media\/792"}],"wp:attachment":[{"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/media?parent=791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/categories?post=791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rudecloud.web.id\/index.php\/wp-json\/wp\/v2\/tags?post=791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}