当前位置:网站首页>Netgear switch basic configuration command set
Netgear switch basic configuration command set
2022-07-04 12:29:00 【ysds20211402】
from : Micro reading https://www.weidianyuedu.com/content/2917490616011.html
1、 establish vlan( Enter privilege mode to configure )
(GSM5212P) #vlan database —— Get into vlan Configuration mode .
(GSM5212P) (Vlan)#vlan 102,103,104 —— Create the corresponding vlan.
2、 Switch name ( Enter privilege mode to configure )
(GSM5212P) #set prompt name —— Change switch name .
3、 Interface configuration ( First in configuration mode )
(1) Upper port configuration ( amount to trunk)
(GSM5212P) #configure terminal—— Enter configuration mode
(GSM5212P) (Config)#interface 0/1—— Enter interface mode
(GSM5212P) (Interface 0/1)#vlan participation include vlanID—— Add specific vlan
(GSM5212P) (Interface 0/1)#vlan tagging vlanID —— Allowed to pass vlan
(2) Lower port configuration ( amount to Access mouth )
(GSM5212P) #configure terminal —— Enter configuration mode
GSM5212P) (Config)#interface 0/1—— Enter interface mode
(GSM5212P) (Interface 0/1)#vlan participation include vlanID—— Add specific vlan
(GSM5212P) (Interface 0/1)#vlan pvid vlanID —— Configure the specific properties of the port vlan
4、 Switch management address configuration ( Enter the privileged mode )
(GSM5212P) #network protocol none
(GSM5212P) #network parms 192.168.1.2 255.255.255.0 192.168.1.1—— Add management address
5、 Configure user name and password ( Enter configuration mode )
(GSM5212P) #configure t —— Enter configuration mode
(GSM5212P) (Config)#passwords min-length —— Set the minimum length of the password , The value is 0-64 Between
(GSM5212P(Config)#username admin password admin level 15 encrypted—— Configure the login user name and password
(GSM5212P) (Config)#aaa authentication enable "enableList" none—— Create an authentication list
5、 Turn on device login management ( Enter configuration mode )
(GSM5212P) #configure terminal—— Enter configuration mode
(GSM5212P) (Config)#line console—— Turn on console Port login management
(GSM5212P) (Config-line)#exit—— sign out
(GSM5212P) (Config)#line telnet—— Turn on telnet Remote management
(GSM5212P) (Config-telnet)#exit—— sign out
(GSM5212P) (Config)#line ssh—— Turn on ssh Remote management
(GSM5212P) (Config-ssh)#exit—— sign out
6、 Configure the spanning tree ( Enter configuration mode )
(GSM5212P) #configure terminal—— Enter configuration mode
(GSM5212P) (Config)#spanning-tree configuration name llll—— Configure the spanning tree name
GSM5212P) (Config)#exit
GSM5212P) #save—— Save configuration
边栏推荐
- queue
- Ternsort model integration summary
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 19
- Properties and methods of OS Library
- Ml and NLP are still developing rapidly in 2021. Deepmind scientists recently summarized 15 bright research directions in the past year. Come and see which direction is suitable for your new pit
- TCP fast retransmission sack mechanism
- AI should take code agriculture? Deepmind offers a programming version of "Alpha dog" alphacode that surpasses nearly half of programmers!
- Kivy教程之 08 倒计时App实现timer调用(教程含源码)
- 03_ Armv8 instruction set introduction load and store instructions
- How to create a new virtual machine
猜你喜欢

Using terminal connection in different modes of virtual machine

What if the chat record is gone? How to restore wechat chat records on Apple Mobile

Clion configuration of opencv

LVS load balancing cluster deployment - Dr direct routing mode
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16](/img/c3/f3746b161012acc3751b2bd0b8f663.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16

Some summaries of the 21st postgraduate entrance examination 823 of network security major of Shanghai Jiaotong University and ideas on how to prepare for the 22nd postgraduate entrance examination pr

MPLS experiment

Realize cross tenant Vnet connection through azure virtual Wan

Star leap plan | new projects are continuously being recruited! MSR Asia MSR Redmond joint research program invites you to apply!

Ultimate bug finding method - two points
随机推荐
World document to picture
[notes] in depth explanation of assets, resources and assetbundles
The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
[ES6] template string: `string`, a new symbol in es2015
Common tips
Sys module
[solve the error of this pointing in the applet] SetData of undefined
The solution of permission denied
How to use "bottom logic" to see the cards in the world?
Hongke case study on storm impact in coastal areas of North Carolina using lidar
Detailed explanation of classic process synchronization problems
BCD code Baidu Encyclopedia
nn. Exploration and experiment of batchnorm2d principle
MySQL advanced (Advanced) SQL statement
MPLS experiment
Anti clockwise rotation method of event arrangement -- PHP implementation
DDS-YYDS
Clockwise rotation method of event arrangement -- PHP implementation
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24