H3C三层交换机VLAN配置实例.docx

上传人:b****6 文档编号:5988966 上传时间:2023-01-02 格式:DOCX 页数:13 大小:20.04KB
下载 相关 举报
H3C三层交换机VLAN配置实例.docx_第1页
第1页 / 共13页
H3C三层交换机VLAN配置实例.docx_第2页
第2页 / 共13页
H3C三层交换机VLAN配置实例.docx_第3页
第3页 / 共13页
H3C三层交换机VLAN配置实例.docx_第4页
第4页 / 共13页
H3C三层交换机VLAN配置实例.docx_第5页
第5页 / 共13页
点击查看更多>>
下载资源
资源描述

H3C三层交换机VLAN配置实例.docx

《H3C三层交换机VLAN配置实例.docx》由会员分享,可在线阅读,更多相关《H3C三层交换机VLAN配置实例.docx(13页珍藏版)》请在冰豆网上搜索。

H3C三层交换机VLAN配置实例.docx

H3C三层交换机VLAN配置实例

H3C三层交换机VLAN配置实例

H3C三层交换机VLAN配置实例

discu

#

sysnameH3C

#

radiusschemesystem

#

domainsystem

#

aclnumber2011

rule0deny

rule1permitsource172.16.11.00.0.0.255

aclnumber2012

rule0deny

rule1permitsource172.16.12.00.0.0.255

aclnumber2013

rule0deny

rule1permitsource172.16.13.00.0.0.255

aclnumber2021

rule0deny

rule1permitsource172.16.21.00.0.0.255

aclnumber2022

rule0deny

rule1permitsource172.16.22.00.0.0.255

aclnumber2023

rule0deny

rule1permitsource172.16.23.00.0.0.255

aclnumber2031

rule0deny

rule1permitsource172.16.31.00.0.0.255

aclnumber2032

rule0deny

rule1permitsource172.16.32.00.0.0.255

aclnumber2033

rule0deny

rule1permitsource172.16.33.00.0.0.255

aclnumber2041

rule0deny

rule1permitsource172.16.41.00.0.0.255

aclnumber2042

rule0deny

rule1permitsource172.16.42.00.0.0.255

aclnumber2043

rule0deny

rule1permitsource172.16.43.00.0.0.255

aclnumber2080

rule0deny

rule1permitsource172.16.80.00.0.0.255

#

vlan1

#

vlan11

#

vlan12

#

vlan13

#

vlan21

#

vlan22

#

vlan23

#

vlan31

#

vlan32

#

vlan33

#

vlan41

#

vlan42

#

vlan43

#

vlan80

#

interfaceAux1/0/0

#

interfaceEthernet1/0/1

portlink-typehybrid

porthybridvlan111untagged

porthybridpvidvlan11

packet-filterinboundip-group2011rule0

packet-filterinboundip-group2011rule1

#

interfaceEthernet1/0/2

portlink-typehybrid

porthybridvlan112untagged

porthybridpvidvlan12

packet-filterinboundip-group2012rule0

packet-filterinboundip-group2012rule1

#

interfaceEthernet1/0/3

portlink-typehybrid

porthybridvlan113untagged

porthybridpvidvlan13

packet-filterinboundip-group2013rule0

packet-filterinboundip-group2013rule1

#

interfaceEthernet1/0/4

portlink-typehybrid

porthybridvlan121untagged

porthybridpvidvlan21

packet-filterinboundip-group2021rule0

packet-filterinboundip-group2021rule1

#

interfaceEthernet1/0/5

portlink-typehybrid

porthybridvlan122untagged

porthybridpvidvlan22

packet-filterinboundip-group2022rule0

packet-filterinboundip-group2022rule1

#

interfaceEthernet1/0/6

portlink-typehybrid

porthybridvlan123untagged

porthybridpvidvlan23

packet-filterinboundip-group2023rule0

packet-filterinboundip-group2023rule1

#

interfaceEthernet1/0/7

portlink-typehybrid

porthybridvlan131untagged

porthybridpvidvlan31

packet-filterinboundip-group2031rule0

packet-filterinboundip-group2031rule1

#

interfaceEthernet1/0/8

portlink-typehybrid

porthybridvlan132untagged

porthybridpvidvlan32

packet-filterinboundip-group2032rule0

packet-filterinboundip-group2032rule1

#

interfaceEthernet1/0/9

portlink-typehybrid

porthybridvlan133untagged

porthybridpvidvlan33

packet-filterinboundip-group2033rule0

packet-filterinboundip-group2033rule1

#

interfaceEthernet1/0/10

portlink-typehybrid

porthybridvlan141untagged

porthybridpvidvlan41

packet-filterinboundip-group2041rule0

packet-filterinboundip-group2041rule1

#

interfaceEthernet1/0/11

portlink-typehybrid

porthybridvlan142untagged

porthybridpvidvlan42

packet-filterinboundip-group2042rule0

packet-filterinboundip-group2042rule1

#

interfaceEthernet1/0/12

portlink-typehybrid

porthybridvlan143untagged

porthybridpvidvlan43

packet-filterinboundip-group2043rule0

packet-filterinboundip-group2043rule1

#

interfaceEthernet1/0/13

#

interfaceEthernet1/0/14

#

interfaceEthernet1/0/15

#

interfaceEthernet1/0/16

#

interfaceEthernet1/0/17

#

interfaceEthernet1/0/18

#

interfaceEthernet1/0/19

#

interfaceEthernet1/0/20

portlink-typehybrid

porthybridvlan180untagged

porthybridpvidvlan80

packet-filterinboundip-group2080rule0

packet-filterinboundip-group2080rule1

#

interfaceEthernet1/0/21

#

interfaceEthernet1/0/22

portlink-typehybrid

porthybridvlan111to1321to2331to3341to4380untagged

#

interfaceEthernet1/0/23

portlink-typehybrid

porthybridvlan111to1321to2331to3341to4380untagged

#

interfaceEthernet1/0/24

portlink-typehybrid

porthybridvlan111to1321to2331to3341to4380untagged

#

interfaceGigabitEthernet1/1/1

#

interfaceGigabitEthernet1/1/2

#

interfaceGigabitEthernet1/1/3

portlink-typehybrid

porthybridvlan111to1321to2331to3341to4380untagged

#

interfaceGigabitEthernet1/1/4

portlink-typehybrid

porthybridvlan111to1321to2331to3341to4380untagged

#

undoirf-fabricauthentication-mode

#

interfaceNULL0

#

user-interfaceaux07

user-interfacevty04

#

return

F100-C的设置问题回复

方法一:

F100-C恢复出厂设置,你以前的配置就会删除了,你可以重新配置你的固定IP配置

固定IP配置实例:

[H3C]discur

#

sysnameH3C

#

firewallpacket-filterenable

firewallpacket-filterdefaultpermit

#

insulate

#

undoconnection-limitenable

connection-limitdefaultdeny

connection-limitdefaultamountupper-limit50lower-limit20

#

nataddress-group1218.94.*.*218.94.*.*

#

firewallstatisticsystemenable

#

radiusschemesystem

#

domainsystem

#

local-userwjm

passwordsimplewjm

service-typetelnet

level3

#                                        

aclnumber2000match-orderauto

rule0permitsource192.168.0.00.0.255.255

#

interfaceAux0

asyncmodeflow

#

interfaceEthernet0/0

ipaddress192.168.0.1255.255.255.0

#

interfaceEthernet0/1

#

interfaceEthernet0/2

#

interfaceEthernet0/3

#

interfaceEthernet1/0

ipaddress218.94.*.*255.255.255.240

#

interfaceEthernet1/1

#

interfaceEthernet1/2

#

interfaceNULL0

#

firewallzonelocal

setpriority100

#

firewallzonetrust

addinterfaceEthernet0/0

addinterfaceEthernet0/1

addinterfaceEthernet0/2

addinterfaceEthernet0/3

setpriority85

#

firewallzoneuntrust

addinterfaceEthernet1/0               

addinterfaceEthernet1/1

addinterfaceEthernet1/2

setpriority5

#

firewallzoneDMZ

setpriority50

#

firewallinterzonelocaltrust

#

firewallinterzonelocaluntrust

#

firewallinterzonelocalDMZ

#

firewallinterzonetrustuntrust

#

firewallinterzonetrustDMZ

#

firewallinterzoneDMZuntrust

#

iproute-static0.0.0.00.0.0.0218.94.*.*preference60

#

#

user-interfacecon0

user-interfaceaux0                     

user-interfacevty04

authentication-modescheme

#

return

华为交换机配置命令

本文网址:

复制

华为QuidWay交换机配置命令手册:

1、开始

建立本地配置环境,将主机的串口通过配置电缆与以太网交换机的Console口连接。

在主机上运行终端仿真程序(如Windows的超级终端等),设置终端通信参数为:

波特率为9600bit/s、8位数据位、1位停止位、无校验和无流控,并选择终端类型为VT100。

以太网交换机上电,终端上显示以太网交换机自检信息,自检结束后提示用户键入回车,之后将出现命令行提示符(如)。

键入命令,配置以太网交换机或查看以太网交换机运行状态。

需要帮助可以随时键入"?

"

2、命令视图

(1)用户视图(查看交换机的简单运行状态和统计信息):

与交换机建立连接即进入

(2)系统视图(配置系统参数)[Quidway]:

在用户视图下键入system-view

(3)以太网端口视图(配置以太网端口参数)[Quidway-Ethernet0/1]:

在系统视图下键入interfaceethernet0/1

(4)VLAN视图(配置VLAN参数)[Quidway-Vlan1]:

在系统视图下键入vlan1

(5)VLAN接口视图(配置VLAN和VLAN汇聚对应的IP接口参数)[Quidway-Vlan-interface1]:

在系统视图下键入interfacevlan-interface1

(6)本地用户视图(配置本地用户参数)[Quidway-luser-user1]:

在系统视图下键入local-useruser1

(7)用户界面视图(配置用户界面参数)[Quidway-ui0]:

在系统视图下键入user-interface

3、其他命令

设置系统时间和时区clocktimeBeijingadd8

                 clockdatetime12:

00:

002005/01/23

设置交换机的名称[Quidway]sysnameTRAIN-3026-1[TRAIN-3026-1]

配置用户登录[Quidway]user-interfacevty04

           [Quidway-ui-vty0]authentication-modescheme

创建本地用户[Quidway]local-userhuawei

           [Quidway-luser-huawei]passwordsimplehuawei

           [Quidway-luser-huawei]service-typetelnetlevel3

4、VLAN配置方法

『配置环境参数』

SwitchA端口E0/1属于VLAN2,E0/2属于VLAN3

『组网需求』

把交换机端口E0/1加入到VLAN2,E0/2加入到VLAN3

数据配置步骤

『VLAN配置流程』

(1)缺省情况下所有端口都属于VLAN1,并且端口是access端口,一个access端口只能属于一个vlan;

(2)如果端口是access端口,则把端口加入到另外一个vlan的同时,系统自动把该端口从原来的vlan中删除掉;

(3)除了VLAN1,如果VLANXX不存在,在系统视图下键入VLANXX,则创建VLANXX并进入VLAN视图;如果VLANXX已经存在,则进入VLAN视图。

【SwitchA相关配置】

方法一:

(1)创建(进入)vlan2

  [SwitchA]vlan2

(2)将端口E0/1加入到vlan2

  [SwitchA-vlan2]portethernet0/1

(3)创建(进入)vlan3

  [SwitchA-vlan2]vlan3

(4)将端口E0/2加入到vlan3

  [SwitchA-vlan3]portethernet0/2

方法二:

(1)创建(进入)vlan2

  [SwitchA]vlan2

(2)进入端口E0/1视图

  [SwitchA]interfaceethernet0/1

(3)指定端口E0/1属于vlan2

  [SwitchA-Ethernet1]portaccessvlan2

(4)创建(进入)vlan3

  [SwitchA]vlan3

(5)进入端口E0/2视图

  [SwitchA]interfaceethernet0/2

(6)指定端口E0/2属于vlan3

  [SwitchA-Ethernet2]portaccessvlan3

测试验证

(1)使用命令dispcur可以看到端口E0/1属于vlan2,E0/2属于vlan3;

(2)使用displayinterfaceEthernet0/1可以看到端口为access端口,PVID为2;

(3)使用displayinterfaceEthernet0/2可以看到端口为access端口,PVID为3

5、交换机IP地址配置

功能需求及组网说明

『配置环境参数』

三层交换机SwitchA有两个端口ethetnet0/1、ethernet0/2,分别属于vlan2、vlan3;

以vlan2的三层接口地址分别是1.0.0.1/24作为PC1的网关;

以vlan3的三层接口地址分别是2.0.0.1/24作为PC2的网关;

『组网需求』

PC1和PC2通过三层接口互通

【SwitchA相关配置】

(1)创建(进入)vlan2

  [Quidway]vlan2

(2)将端口E0/1加入到vlan2

  [Quidway-vlan2]portethernet0/1

(3)进入vlan2的虚接口

  [Quidway-vlan2]interfacevlan2

(4)在vlan2的虚接口上配置IP地址

  [Quidway-Vlan-interface2]ipaddress1.0.0.1255.255.255.0

(5)创建(进入)vlan3

  [Quidway]vlan3

(6)将E0/2加入到vlan3

  [Quidway-vlan3]portethernet0/2

(7)进入vlan3的虚接口

  [Quidway-vlan3]interfacevlan3

(8)在vlan3的虚接口上配置IP地址

  [Quidway-Vlan-interface3]ipaddress2.0.0.1255.255.255.0

测试验证

(1)PC1和PC2都可以PING通自己的网关

(2)PC1和PC2可以相互PING通

6、端口的trunk配置

『配置环境参数』

(1)SwitchA端口E0/1属于vlan10,E0/2属于vlan20,E0/3与SwitchB端口E0/3互连

(2)SwitchB端口E0/1属于vlan10,E0/2属于vlan20,E0/3与SwitchA端口E0/3互连

『组网需求』

(1)要求SwitchA的vlan10的PC与SwitchB的vlan10的PC互通

(2)要求SwitchA的vlan20的PC与SwitchB的vlan20的PC互通

数据配置步骤

【SwitchA相关配置】

(1)创建(进入)vlan10

[SwitchA]vlan10

(2)将E0/1加入到vlan10

[SwitchA-vlan10]portEthernet0/1

(3)创建(进入)vlan20

[SwitchA]vlan20

(4)将E0/2加入到vlan20

[SwitchA-vlan20]portEthernet0/2

(5)实际当中一般将上行端口设置

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试认证 > 财会金融考试

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1