当前位置:网站首页>Netgear switch basic configuration command set
Netgear switch basic configuration command set
2022-07-04 12:29:00 【ysds20211402】
from : Micro reading https://www.weidianyuedu.com/content/2917490616011.html
1、 establish vlan( Enter privilege mode to configure )
(GSM5212P) #vlan database —— Get into vlan Configuration mode .
(GSM5212P) (Vlan)#vlan 102,103,104 —— Create the corresponding vlan.
2、 Switch name ( Enter privilege mode to configure )
(GSM5212P) #set prompt name —— Change switch name .
3、 Interface configuration ( First in configuration mode )
(1) Upper port configuration ( amount to trunk)
(GSM5212P) #configure terminal—— Enter configuration mode
(GSM5212P) (Config)#interface 0/1—— Enter interface mode
(GSM5212P) (Interface 0/1)#vlan participation include vlanID—— Add specific vlan
(GSM5212P) (Interface 0/1)#vlan tagging vlanID —— Allowed to pass vlan
(2) Lower port configuration ( amount to Access mouth )
(GSM5212P) #configure terminal —— Enter configuration mode
GSM5212P) (Config)#interface 0/1—— Enter interface mode
(GSM5212P) (Interface 0/1)#vlan participation include vlanID—— Add specific vlan
(GSM5212P) (Interface 0/1)#vlan pvid vlanID —— Configure the specific properties of the port vlan
4、 Switch management address configuration ( Enter the privileged mode )
(GSM5212P) #network protocol none
(GSM5212P) #network parms 192.168.1.2 255.255.255.0 192.168.1.1—— Add management address
5、 Configure user name and password ( Enter configuration mode )
(GSM5212P) #configure t —— Enter configuration mode
(GSM5212P) (Config)#passwords min-length —— Set the minimum length of the password , The value is 0-64 Between
(GSM5212P(Config)#username admin password admin level 15 encrypted—— Configure the login user name and password
(GSM5212P) (Config)#aaa authentication enable "enableList" none—— Create an authentication list
5、 Turn on device login management ( Enter configuration mode )
(GSM5212P) #configure terminal—— Enter configuration mode
(GSM5212P) (Config)#line console—— Turn on console Port login management
(GSM5212P) (Config-line)#exit—— sign out
(GSM5212P) (Config)#line telnet—— Turn on telnet Remote management
(GSM5212P) (Config-telnet)#exit—— sign out
(GSM5212P) (Config)#line ssh—— Turn on ssh Remote management
(GSM5212P) (Config-ssh)#exit—— sign out
6、 Configure the spanning tree ( Enter configuration mode )
(GSM5212P) #configure terminal—— Enter configuration mode
(GSM5212P) (Config)#spanning-tree configuration name llll—— Configure the spanning tree name
GSM5212P) (Config)#exit
GSM5212P) #save—— Save configuration
边栏推荐
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 11
- (2021-08-20) web crawler learning 2
- Configure SSH certificate login
- MYCAT middleware installation and use
- Translation D29 (with AC code POJ 27:mode of sequence)
- C language compilation process
- First knowledge of spark - 7000 words +15 diagrams, and learn the basic knowledge of spark
- Ultimate bug finding method - two points
- Detailed explanation of classic process synchronization problems
- TCP fast retransmission sack mechanism
猜你喜欢

Global function Encyclopedia

Source code analysis of the implementation mechanism of multisets in guava class library

How to create a new virtual machine

LVS load balancing cluster deployment - Dr direct routing mode

Foreach (system.out:: println) usage

TCP slicing and PSH understanding
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 13](/img/29/49da279efed22706545929157788f0.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 13

The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16](/img/c3/f3746b161012acc3751b2bd0b8f663.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16

Experiment 7. IPv6
随机推荐
Exness: positive I win, negative you lose
Data transmission in the network
Workplace liquor bureau must pay attention to
How to use "bottom logic" to see the cards in the world?
(August 9, 2021) example exercise of air quality index calculation (I)
Exceptions and exception handling
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 10
Googgle guava ImmutableCollections
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15
Detailed explanation of NPM installation and caching mechanism
Servlet learning notes
OSI seven layer model & unit
In 2022, financial products are not guaranteed?
R语言--readr包读写数据
The frost peel off the purple dragon scale, and the xiariba people will talk about database SQL optimization and the principle of indexing (primary / secondary / clustered / non clustered)
Properties and methods of OS Library
CSDN documentation specification
Summary of Shanghai Jiaotong University postgraduate entrance examination module firewall technology
[solve the error of this pointing in the applet] SetData of undefined
Data communication and network: ch13 Ethernet