{"id":34,"date":"2026-05-01T18:12:21","date_gmt":"2026-05-01T16:12:21","guid":{"rendered":"http:\/\/192.168.20.20\/?p=34"},"modified":"2026-05-02T14:12:46","modified_gmt":"2026-05-02T12:12:46","slug":"fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco","status":"publish","type":"post","link":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/","title":{"rendered":"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<p>Dans un contexte BTS CIEL ou SIO, la s\u00e9curisation des \u00e9quipements r\u00e9seau est essentielle.<br>Un routeur ou un switch mal configur\u00e9 peut permettre un acc\u00e8s non autoris\u00e9, une modification de configuration ou une interception de trafic.<\/p>\n\n\n\n<p>L\u2019objectif est de :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>contr\u00f4ler les acc\u00e8s<\/li>\n\n\n\n<li>limiter la surface d\u2019attaque<\/li>\n\n\n\n<li>s\u00e9curiser les ports r\u00e9seau<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png\" alt=\"\" class=\"wp-image-36\" srcset=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png 1024w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-300x200.png 300w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-768x512.png 768w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Configuration compl\u00e8te<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>#############################################<br># CONFIGURATION COMMUNE (ROUTEUR &amp; SWITCH)<br>#############################################<br><br>enable<br>configure terminal<br><br>hostname SECURE-EQUIP<br><br>! Mot de passe privil\u00e9gi\u00e9<br>enable secret &lt;PASSWORD&gt;<br><br>! Chiffrement des mots de passe<br>service password-encryption<br><br>! Banni\u00e8re l\u00e9gale<br>banner motd #<br>ACCES RESERVE - TOUT ACCES NON AUTORISE EST INTERDIT<br>#<br><br>! Utilisateur local<br>username admin privilege 15 secret &lt;PASSWORD&gt;<br><br>! Console<br>line console 0<br> login local<br> exec-timeout 5 0<br> logging synchronous<br><br>! Acc\u00e8s distant SSH<br>no ip domain-lookup<br>ip domain-name breizh.local<br><br>crypto key generate rsa modulus 2048<br>ip ssh version 2<br><br>line vty 0 4<br> transport input ssh<br> login local<br> exec-timeout 5 0<br><br>! Protection brute force<br>login block-for 60 attempts 3 within 60<br><br>end<br>write memory<br><br><br>#############################################<br># SECURISATION SWITCH<br>#############################################<br><br>configure terminal<br><br>! D\u00e9sactivation ports inutilis\u00e9s<br>interface range fa0\/10 - 24<br> shutdown<br><br>! S\u00e9curisation ports utilisateurs<br>interface range fa0\/1 - 9<br> switchport mode access<br><br> switchport port-security<br> switchport port-security maximum 2<br> switchport port-security violation restrict<br> switchport port-security mac-address sticky<br><br> spanning-tree portfast<br> spanning-tree bpduguard enable<br><br>end<br>write memory<br><br><br>#############################################<br># SECURISATION ROUTEUR<br>#############################################<br><br>configure terminal<br><br>! D\u00e9sactivation services inutiles<br>no ip http server<br>no ip http secure-server<br><br>! R\u00e9duction surface d\u2019attaque<br>no cdp run<br><br>! Logs<br>logging buffered 4096<br><br>end<br>write memory<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Explication<\/h3>\n\n\n\n<p>Acc\u00e8s administrateur<br>Le mot de passe <code>enable secret<\/code> prot\u00e8ge l\u2019acc\u00e8s au mode privil\u00e9gi\u00e9.<br>Le compte local permet une authentification s\u00e9curis\u00e9e.<\/p>\n\n\n\n<p>Acc\u00e8s distant<br>Seul SSH est autoris\u00e9. Telnet est exclu car non chiffr\u00e9.<br>Une cl\u00e9 RSA est n\u00e9cessaire pour activer SSH.<\/p>\n\n\n\n<p>Protection des acc\u00e8s<br>La commande <code>login block-for<\/code> limite les tentatives de connexion.<br>Le <code>exec-timeout<\/code> ferme automatiquement les sessions inactives.<\/p>\n\n\n\n<p>Console<br>L\u2019acc\u00e8s console est prot\u00e9g\u00e9 avec authentification locale.<\/p>\n\n\n\n<p>Switch \u2013 s\u00e9curisation des ports<br>Le port-security limite le nombre d\u2019\u00e9quipements par port.<br>Le mode sticky enregistre automatiquement les adresses MAC autoris\u00e9es.<br>La violation en mode restrict bloque les acc\u00e8s non autoris\u00e9s.<\/p>\n\n\n\n<p>Protection couche 2<br>PortFast acc\u00e9l\u00e8re l\u2019activation des ports utilisateurs.<br>BPDU Guard prot\u00e8ge contre les attaques via un switch non autoris\u00e9.<\/p>\n\n\n\n<p>Ports inutilis\u00e9s<br>Les ports non utilis\u00e9s sont d\u00e9sactiv\u00e9s pour \u00e9viter toute connexion non contr\u00f4l\u00e9e.<\/p>\n\n\n\n<p>Routeur \u2013 r\u00e9duction de surface d\u2019attaque<br>Les services HTTP et HTTPS sont d\u00e9sactiv\u00e9s.<br>CDP est d\u00e9sactiv\u00e9 pour \u00e9viter l\u2019exposition d\u2019informations r\u00e9seau.<\/p>\n\n\n\n<p>Logs<br>Les \u00e9v\u00e9nements sont enregistr\u00e9s pour permettre un suivi et une analyse.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Points cl\u00e9s<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SSH uniquement<\/li>\n\n\n\n<li>comptes locaux obligatoires<\/li>\n\n\n\n<li>ports inutilis\u00e9s d\u00e9sactiv\u00e9s<\/li>\n\n\n\n<li>port-security actif<\/li>\n\n\n\n<li>services inutiles supprim\u00e9s<\/li>\n\n\n\n<li>journalisation activ\u00e9e<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un contexte BTS CIEL ou SIO, la s\u00e9curisation des \u00e9quipements r\u00e9seau est essentielle.Un routeur ou un switch mal configur\u00e9 peut permettre un acc\u00e8s non autoris\u00e9, une modification de configuration ou une interception de trafic. L\u2019objectif est de : Configuration compl\u00e8te Explication Acc\u00e8s administrateurLe mot de passe enable secret prot\u00e8ge l\u2019acc\u00e8s au mode privil\u00e9gi\u00e9.Le compte [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,10],"tags":[3],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-cisco","category-reseau","tag-cisco"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco - Eryann Breizh SecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco - Eryann Breizh SecOps\" \/>\n<meta property=\"og:description\" content=\"Dans un contexte BTS CIEL ou SIO, la s\u00e9curisation des \u00e9quipements r\u00e9seau est essentielle.Un routeur ou un switch mal configur\u00e9 peut permettre un acc\u00e8s non autoris\u00e9, une modification de configuration ou une interception de trafic. L\u2019objectif est de : Configuration compl\u00e8te Explication Acc\u00e8s administrateurLe mot de passe enable secret prot\u00e8ge l\u2019acc\u00e8s au mode privil\u00e9gi\u00e9.Le compte [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/\" \/>\n<meta property=\"og:site_name\" content=\"Eryann Breizh SecOps\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T16:12:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T12:12:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"wpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/\"},\"author\":{\"name\":\"wpadmin\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\"},\"headline\":\"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco\",\"datePublished\":\"2026-05-01T16:12:21+00:00\",\"dateModified\":\"2026-05-02T12:12:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/\"},\"wordCount\":287,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png\",\"keywords\":[\"cisco\"],\"articleSection\":[\"Cisco\",\"R\u00e9seau\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/\",\"name\":\"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco - Eryann Breizh SecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png\",\"datePublished\":\"2026-05-01T16:12:21+00:00\",\"dateModified\":\"2026-05-02T12:12:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#primaryimage\",\"url\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png\",\"contentUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eryann.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"name\":\"Eryann Breizh SecOps\",\"description\":\"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO\",\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eryann.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\",\"name\":\"Breizh Sec Ops\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"width\":1246,\"height\":229,\"caption\":\"Breizh Sec Ops\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\",\"name\":\"wpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"caption\":\"wpadmin\"},\"sameAs\":[\"https:\\\/\\\/eryann.fr\"],\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/author\\\/wpadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco - Eryann Breizh SecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/","og_locale":"fr_FR","og_type":"article","og_title":"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco - Eryann Breizh SecOps","og_description":"Dans un contexte BTS CIEL ou SIO, la s\u00e9curisation des \u00e9quipements r\u00e9seau est essentielle.Un routeur ou un switch mal configur\u00e9 peut permettre un acc\u00e8s non autoris\u00e9, une modification de configuration ou une interception de trafic. L\u2019objectif est de : Configuration compl\u00e8te Explication Acc\u00e8s administrateurLe mot de passe enable secret prot\u00e8ge l\u2019acc\u00e8s au mode privil\u00e9gi\u00e9.Le compte [&hellip;]","og_url":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/","og_site_name":"Eryann Breizh SecOps","article_published_time":"2026-05-01T16:12:21+00:00","article_modified_time":"2026-05-02T12:12:46+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06.png","type":"image\/png"}],"author":"wpadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wpadmin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#article","isPartOf":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/"},"author":{"name":"wpadmin","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5"},"headline":"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco","datePublished":"2026-05-01T16:12:21+00:00","dateModified":"2026-05-02T12:12:46+00:00","mainEntityOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/"},"wordCount":287,"commentCount":0,"publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#primaryimage"},"thumbnailUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png","keywords":["cisco"],"articleSection":["Cisco","R\u00e9seau"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/","url":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/","name":"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco - Eryann Breizh SecOps","isPartOf":{"@id":"https:\/\/eryann.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#primaryimage"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#primaryimage"},"thumbnailUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png","datePublished":"2026-05-01T16:12:21+00:00","dateModified":"2026-05-02T12:12:46+00:00","breadcrumb":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#primaryimage","url":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png","contentUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/d16edd68-85b0-4883-aabf-6d3a85a7fe06-1024x683.png"},{"@type":"BreadcrumbList","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-securisation-de-base-dun-routeur-et-dun-switch-cisco\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eryann.fr\/"},{"@type":"ListItem","position":2,"name":"Fiche S\u00e9curisation de base d\u2019un routeur et d\u2019un switch Cisco"}]},{"@type":"WebSite","@id":"https:\/\/eryann.fr\/#website","url":"https:\/\/eryann.fr\/","name":"Eryann Breizh SecOps","description":"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO","publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eryann.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/eryann.fr\/#organization","name":"Breizh Sec Ops","url":"https:\/\/eryann.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","width":1246,"height":229,"caption":"Breizh Sec Ops"},"image":{"@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5","name":"wpadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","caption":"wpadmin"},"sameAs":["https:\/\/eryann.fr"],"url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":3,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":38,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/34\/revisions\/38"}],"wp:attachment":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}