关于华为交换机VLAN配置问题 关于华为接入层交换机管理VLAN的问题

\u5173\u4e8e\u534e\u4e3a\u4ea4\u6362\u673aVLAN\u914d\u7f6e\u95ee\u9898

\u3000\u3000\u4ea4\u6362\u673a\u4e0a\u8bbe\u7f6e\uff0c\u5212\u5206VLAN\uff1a

\u3000\u3000sys

\u3000\u3000//\u5207\u6362\u5230\u7cfb\u7edf\u89c6\u56fe

\u3000\u3000[Quidway]vlan enable

\u3000\u3000[Quidway]vlan 2

\u3000\u3000[Quidway-vlan2]port e0/1 to e0/8

\u3000\u3000[Quidway-vlan2]quit

\u3000\u3000//\u9ed8\u8ba4\u6240\u6709\u7aef\u53e3\u90fd\u5c5e\u4e8eVLAN1\uff0c\u6307\u5b9a\u4ea4\u6362\u673a\u7684e0/1 \u5230e0/8\u516b\u4e2a\u7aef\u53e3\u5c5e\u4e8eVLAN2

\u3000\u3000[Quidway]vlan 3

\u3000\u3000[Quidway-vlan3]port e0/9 to e0/16

\u3000\u3000[Quidway-vlan3]quit

\u3000\u3000//\u6307\u5b9a\u4ea4\u6362\u673a\u7684e0/9 \u5230e0/16\u516b\u4e2a\u7aef\u53e3\u5c5e\u4e8eVLAN3

\u3000\u3000[Quidway]dis vlan all

\u3000\u3000[Quidway]dis cu

\u3000\u3000\u8def\u7531\u5668\u4e0a\u8bbe\u7f6e\uff0c\u5b9e\u73b0\u8bbf\u95ee\u63a7\u5236\uff1a

\u3000\u3000[Router]interface ethernet 0

\u3000\u3000[Router-Ethernet0]ip address 192.168.1.5 255.255.255.0

\u3000\u3000[Router-Ethernet0]quit

\u3000\u3000//\u6307\u5b9aethernet 0\u7684ip

\u3000\u3000[Router]interface ethernet 1

\u3000\u3000[Router-Ethernet1]ip address 192.168.1.6 255.255.255.0

\u3000\u3000[Router-Ethernet1]quit

\u3000\u3000//\u5f00\u542ffirewall\uff0c\u5e76\u5c06\u9ed8\u8ba4\u8bbe\u7f6e\u4e3adeny

\u3000\u3000[Router]fire enable

\u3000\u3000[Router]fire default deny

\u3000\u3000//\u5141\u8bb8192.168.1.1\u8bbf\u95ee192.168.1.3

\u3000\u3000//firewall\u7b56\u7565\u53ef\u6839\u636e\u9700\u8981\u518d\u8fdb\u884c\u6dfb\u52a0

\u3000\u3000[Router]acl 101

\u3000\u3000[Router-acl-101]rule permit ip source 192.168.1.1 255.255.255.0 destination 192.168.1.3 255.255.255.0

\u3000\u3000[Router-acl-101]quit

\u3000\u3000//\u542f\u7528101\u89c4\u5219

\u3000\u3000[Router-Ethernet0]fire pa 101

\u3000\u3000[Router-Ethernet0]quit

\u3000\u3000[Router-Ethernet1]fire pa 101

\u3000\u3000[Router-Ethernet1]quit

1\u3002\u914d\u7f6e\u6709\u4e9b\u5c0f\u51fa\u5165\u3002
2\u3002\u4e0d\u4f1a\u4e0e\u4e09\u5c42\u51b2\u7a81\u3002
3\u3002\u4e0d\u4e00\u5b9a\uff0c\u7b2c\u4e00\u662f\u8981\u548c\u7ba1\u7406vlan100\u5728\u540c\u4e00\u4e2avlan\u4e0b\uff0c\u8fd9\u6837\u53ef\u4ee5\u901a\u8baf\uff0c\u8fd8\u6709\u53e6\u5916\u7684\u5c31\u662f\u5728cisco\u7684\u4e09\u5c42\u4e0a\u8d77\u4e86\u672c\u5730\u8def\u7531\uff0c\u5c31\u662fvlan1\u548cvlan100\u95f4\u7684\u8def\u7531\uff0c\u8fd9\u6837\u4e0d\u7ba1\u4f60\u7684\u5730\u5740\u6bb5\u5728vlan1\u91cc\u8fd8\u662fvlan100\u91cc\u90fd\u53ef\u4ee5telnet\uff0c\u4f46\u662f\u8981\u5728\u534e\u4e3a\u7684\u4ea4\u6362\u673a\u4e0a\u8bbe\u7f6etelnet\u767b\u5f55\u7684\u5c5e\u6027\u3002\u5177\u4f53\u5982\u4e0b\uff1a
int vlan 100
ip add 192.168.100.1 255.255.255.0
quit

ip route-static 0.0.0.0 0.0.0.0 192.168.100.254 #\u8fd9\u6761\u662f\u5728\u5168\u5c40\u4e0b\u6267\u884c\uff0c\u914d\u7f6e\u9759\u6001\u8def\u7531\uff0c\u548ccisco\u7684default gateway\u4e00\u6837\u3002#

\u914d\u7f6etelnet\uff1a
local-user admin #\u521b\u5efa\u672c\u5730\u7528\u6237admin\uff0c\u53ef\u4ee5\u81ea\u5df1\u6539#
password cipher 123 #admin\u767b\u5f55\u7684\u5bc6\u7801\u4e3a123\uff0c\u6b64\u5904cipher\u4e3a\u5bc6\u6587\u52a0\u5bc6#
level 1 #\u767b\u5f55\u540e\u6743\u9650\u53ea\u67091\u7ea7
quit

\u5168\u5c40\u4e0b\uff1a
super password cipher 123 #telnet\u4e0a\u6765\u4e4b\u540e\u6743\u9650\u53ea\u6709level 1\uff0c\u9700\u8981SU\u5bc6\u7801\u8fdb\u5165\u7ba1\u7406\u5458\u6743\u9650#
\u914d\u7f6eVTY\uff0c\u7c7b\u4f3ccisco
int vty 0 4 #\u6700\u591a\u5141\u8bb85\u4e2a\u7528\u6237\u540c\u65f6\u767b\u5f55\uff0c\u4ece\u901a\u90530-4\u3002#
authen mode schem #\u8ba4\u8bc1\u65b9\u5f0f\u4e3a\u5f15\u7528\u524d\u9762\u5b9a\u4e49\u7684\u672c\u5730\u7528\u6237#


\u6ce8\u610f\uff0c2\u5c42\u4ea4\u6362\u673a\u53ea\u80fd\u5efa\u7acb\u4e00\u4e2a\u4e09\u5c42\u865a\u63a5\u53e3\u548c\u4e00\u6761\u9759\u6001\u8def\u7531\uff0c\u90fd\u662f\u7528\u4f5c\u7ba1\u7406\u7528\u7684\u3002\u5c06vlan100\u5728\u4e09\u5c42\u6838\u5fc3\u4e0a\u5efa\u7acb\u7684\u865a\u63a5\u53e3\u4f5c\u4e3a\u5e95\u4e0b\u63a5\u5165\u5c42\u7684\u7f51\u5173\u3002\u6309\u7167\u6211\u7684\u914d\u7f6e\u5c31\u884c\u4e86\uff0c\u80af\u5b9a\u6ca1\u95ee\u9898\u7684\uff0c\u4e0d\u8fc7\u4ea4\u6362\u673a\u8f6f\u4ef6\u7248\u672c\u4e0d\u540c\u67d0\u4e9b\u547d\u4ee4\u53ef\u80fd\u6709\u51fa\u5165\uff0c\u8fd9\u4e2a\u4f60\u81ea\u5df1\u6253\u95ee\u53f7\u67e5\u4e00\u67e5\uff0c\u5f88\u7b80\u5355\u7684\u3002

  交换机上设置,划分VLAN:
  sys
  //切换到系统视图
  [Quidway]vlan
enable
  [Quidway]vlan
2
  [Quidway-vlan2]port
e0/1
to
e0/8
  [Quidway-vlan2]quit
  //默认所有端口都属于VLAN1,指定交换机的e0/1
到e0/8八个端口属于VLAN2
  [Quidway]vlan
3
  [Quidway-vlan3]port
e0/9
to
e0/16
  [Quidway-vlan3]quit
  //指定交换机的e0/9
到e0/16八个端口属于VLAN3
  [Quidway]dis
vlan
all
  [Quidway]dis
cu
  路由器上设置,实现访问控制:
  [Router]interface
ethernet
0
  [Router-Ethernet0]ip
address
192.168.1.5
255.255.255.0
  [Router-Ethernet0]quit
  //指定ethernet
0的ip
  [Router]interface
ethernet
1
  [Router-Ethernet1]ip
address
192.168.1.6
255.255.255.0
  [Router-Ethernet1]quit
  //开启firewall,并将默认设置为deny
  [Router]fire
enable
  [Router]fire
default
deny
  //允许192.168.1.1访问192.168.1.3
  //firewall策略可根据需要再进行添加
  [Router]acl
101
  [Router-acl-101]rule
permit
ip
source
192.168.1.1
255.255.255.0
destination
192.168.1.3
255.255.255.0
  [Router-acl-101]quit
  //启用101规则
  [Router-Ethernet0]fire
pa
101
  [Router-Ethernet0]quit
  [Router-Ethernet1]fire
pa
101
  [Router-Ethernet1]quit

>systemview
vlan
999
port
gigabitethernet
1/0/1
to
gigabitethernet
1/0/11
(不知道你是什么接口,如果是fastethernet就替换掉gigabitethernet)
vlan
111
port
gigabitethernet
1/0/19
to
gigabitethernet
1/0/24
vlan
20
port
gigabitethernet
1/0/12
vlan
30
port
gigabitethernet
1/0/13
vlan
40
port
gigabitethernet
1/0/14
vlan
50
port
gigabitethernet
1/0/15
vlan
60
port
gigabitethernet
1/0/16
vlan
70
port
gigabitethernet
1/0/17
你的18,25,26应该为trunk口,配置如下:
interface
gigabitethernet
1/0/18
port
link-type
trunk
port
trunk
permit
vlan
20
30
40
50
60
70
interface
gigabitethernet
1/0/25
port
link-type
trunk
port
trunk
permit
vlan
111
interface
gigabitethernet
1/0/26
port
link-type
trunk
port
trunk
permit
vlan
999

sys
[sw]vlan2
[sw]int
g1/0/2
[sw-g1/0/2]port
link-type
access
[sw-g1/0/2]port
default
vlan
XXX
vlan

具体的你自己往这个上面套就好了

华为交换机VLAN间通信配置



  • 鍗庝负浜ゆ崲鏈簐lan閰嶇疆
    绛旓細4. 鍦ㄧ郴缁熻鍥句笅鍒涘缓VLAN 10锛屽苟灏咷igabitEthernet 1/0/0鍒1/0/29鐨勭鍙e姞鍏ュ埌VLAN 10涓細- `port GigabitEthernet 1/0/0 to 1/0/29`浜ゆ崲鏈淇濆瓨璁剧疆鍜岄噸缃懡浠わ細5. 淇濆瓨閰嶇疆锛- `save`6. 閲嶇疆淇濆瓨鐨勯厤缃細- `reset saved-configuration`7. 閲嶅惎浜ゆ崲鏈猴細- `reboot`浜ゆ崲鏈哄父鐢ㄧ殑鏄剧ず鍛戒护锛...
  • 鍚屼竴鍙浜ゆ崲鏈涓婃湁澶氫釜VLAN涔嬮棿鐨勯氳閰嶇疆
    绛旓細[sw1-Vlanif20]ip address 192.168.20.254 255.255.255.0锛涗綔涓VLAN20 鐨勭綉鍏 [sw1-Vlanif20]quit 鍐嶆娴嬭瘯PC1涓嶱C2涔嬮棿鐨勪簰閫氾紱 鐜板湪鍐嶅鍔1鍙癙C3鏈猴紝閰嶇疆濡備笅锛  杩欐椂闇瑕佸皢浜ゆ崲鏈绔彛鍔犲叆鍒癡LAN 20鍚庯紝涓夊彴PC涔嬮棿鎵嶈兘閫氾紱system-view [sw1]interface GigabitEthernet 0/...
  • 鍏充簬鍗庝负浜ゆ崲鏈篤LAN閰嶇疆闂
    绛旓細//榛樿鎵鏈夌鍙i兘灞炰簬VLAN1锛屾寚瀹浜ゆ崲鏈鐨別0/1 鍒癳0/8鍏釜绔彛灞炰簬VLAN2 [Quidway]vlan 3 [Quidway-vlan3]port e0/9 to e0/16 [Quidway-vlan3]quit //鎸囧畾浜ゆ崲鏈虹殑e0/9 鍒癳0/16鍏釜绔彛灞炰簬VLAN3 [Quidway]dis vlan all [Quidway]dis cu 璺敱鍣ㄤ笂璁剧疆锛屽疄鐜拌闂帶鍒讹細[Router]interface e...
  • 鎬庢牱缁鍗庝负浜ゆ崲鏈洪厤缃鍜屽垹闄vlan?
    绛旓細1銆佸缓绔媣lan2锛屽缓绔媣lan345鍛戒护锛歷lan2vlanbatch3to5鍒犻櫎vlan3锛屽懡浠ndovlan3銆傚垹闄ゅ悗閫氳繃鍛戒护disvlan锛屽彲浠ョ湅鍒颁笅鍥句腑鍙湁vlan001锛002锛005銆倂lan3鍜4宸茬粡鍒犻櫎銆2銆侀鍏堥氳繃console鍙f垨telnet杩炴帴涓夊眰浜ゆ崲鏈猴紝杩涘叆鐢ㄦ埛瑙嗗浘妯″紡鈥滺3C鈥溿傚湪鐢ㄦ埛妯″紡涓嬭緭鍏モ漵ys鈥滆繘鍏ョ郴缁熻鍥炬ā寮忊漑H3C]鈥溿3銆佷互鍗庝负s57...
  • 鍗庝负浜ゆ崲鏈篤LAN鎬庝箞閰嶇疆?
    绛旓細鍗庝负浜ゆ崲鏈篤LAN閰嶇疆锛歴ystem veiw 锛堣繘鍏ョ郴缁熻鍥撅級vlan 10锛堝垱寤簐lan 10锛塿lan batch 10 to 12 锛堝垱寤簐lan 10 11 12锛塱nterface vlan 10 锛堣繘鍏LAN 10锛塱p address 172.16.10.1 24锛璁剧疆VLAN 10鐨処P涓172.16.10.1锛屾帺鐮佷负24浣嶏級undo vlan 10 锛堝垹闄lan 10锛塚LAN锛圴irtual Local Area ...
  • 鍗庝负浜ゆ崲鏈簐lan閰嶇疆
    绛旓細鍗庝负浜ゆ崲鏈簐lan鍩烘湰閰嶇疆锛1銆佸垱寤簐lan锛<Quidway> <Quidway>system-view [Quidway] vlan 10 [Quidway-vlan10] quit [Quidway] vlan 100 [Quidway-vlan100] quit 2銆佸皢绔彛鍔犲叆鍒皏lan涓細[Quidway] interface GigabitEthernet2/0/1 (10G鍏夊彛)[Quidway- GigabitEthernet2/0/1] port link-type access...
  • 鍗庝负浜ゆ崲鏈灏嗙鍙e姞杩VLAN闇瑕 port default vlan鎵嶅彲浠,璺烪3C鐨刾ort...
    绛旓細璁稿VLAN鍘傚晢閮藉埄鐢浜ゆ崲鏈鐨勭鍙f潵鍒掑垎VLAN鎴愬憳銆傝璁惧畾鐨勭鍙i兘鍦ㄥ悓涓涓箍鎾煙涓備緥濡傦紝涓涓氦鎹㈡満鐨1锛2锛3锛4锛5绔彛琚畾涔変负铏氭嫙缃慉AA锛屽悓涓浜ゆ崲鏈虹殑6锛7锛8绔彛缁勬垚铏氭嫙缃態BB銆傝繖鏍峰仛鍏佽鍚勭鍙d箣闂寸殑閫氳锛屽苟鍏佽鍏变韩鍨嬬綉缁滅殑鍗囩骇銆備絾鏄紝杩欑鍒掑垎妯″紡灏嗚櫄鎷熺綉闄愬埗鍦ㄤ簡涓鍙颁氦鎹㈡満涓娿
  • 鍗庝负浜ゆ崲鏈洪厤缃棶棰
    绛旓細1,default vlan鏄粯璁VLAN鐨鎰忔,涔熷氨鏄杩欎釜绔彛榛樿VLAN涓4012 2.allow-pass 鏄厑璁搁氳繃鐨刅LAN,鍚庨潰鍑虹幇鐨勬暟瀛楀氨鏄厑璁歌繖涓鍙i氳繃鐨刅LAN,鍏朵粬VLAN涓嶈兘杞彂 3.鐢靛彛涓嶇敤璁剧疆閾捐矾绫诲瀷?杩欎釜绫诲瀷鏄摢涓柟闈?鏄洿閫氱嚎杩樻槸浜ゅ樊绾垮悧?鐜板湪鏂版鐨浜ゆ崲鏈鏈夎瘑鍒綉绾跨被鍨,鎵浠ョ敤鐩撮氭垨浜ゅ樊閮藉彲浠ヤ娇鐢 4.缂虹渷...
  • 鍗庝负浜ゆ崲鏈S5700绯诲垪vlan閰嶇疆鏁欑▼
    绛旓細鍗庝负浜ゆ崲鏈S5700绯诲垪vlan閰嶇疆鏁欑▼ 1銆佽繛鎺ヨ嚦浜ゆ崲鏈猴紝杩涘叆绠$悊鍛樻帴鍙fā寮忋傚彲浠ユ壒閲忓垱寤簐lan锛10/20/30銆傞厤缃畬鍚庡彲浠ラ氳繃display vlan杩涜鏌ョ湅銆傚鍥 2銆佽繘鍏ユ帴鍙h缃紝閰嶇疆鎺ュ彛绫诲瀷trunk锛屾绫诲瀷鎺ュ彛涓鑸敤鍦ㄤ笂鑱斾氦鎹㈡満鎺ュ彛锛屾鎺ュ彛绫诲瀷鍏佽璇ユ帴鍙i氳繃澶氫釜vlan銆傚鍥 3銆佽繘鍏ユ帴鍙h缃紝閰嶇疆鎺ュ彛绫诲瀷access锛...
  • 鍏充簬鍗庝负浜ゆ崲鏈篤LAN閰嶇疆闂
    绛旓細vlan 50 port gigabitethernet 1/0/15 vlan 60 port gigabitethernet 1/0/16 vlan 70 port gigabitethernet 1/0/17 浣犵殑18,25,26搴旇涓簍runk鍙o紝閰嶇疆濡備笅锛歩nterface gigabitethernet 1/0/18 port link-type trunk port trunk permit vlan 20 30 40 50 60 70 interface gigabitethernet 1/0/25...
  • 扩展阅读:交换机划分vlan配置ip ... 华为vlan互通配置 ... 华为设备vlan配置 ... 华为交换机配置vlan组 ... 华为史上最强屏幕来袭 ... 华为星闪笔支持水墨晕染 ... port default vlan 105 ... 华为推出85英寸智慧屏 ... olt vlan和下联onu vlan ...

    本站交流只代表网友个人观点,与本站立场无关
    欢迎反馈与建议,请联系电邮
    2024© 车视网