Analyze the configuration of the Huawei Switch configuration password in CGMP

Source: Internet
Author: User
Tags http authentication

This article analyzes the configuration of the Huawei Switch configuration password in CGMP. Have you ever touched on the common Huawei Switch configuration password? Are you familiar with the password settings for the Huawei switch that CGMP leaves? Isn't your vswitch often confusing you? Let's take a look at the following articles to solve all the problems.

To configure the CGMP Huawei switch password on a CISCO router:
Dallasr1> (config-if) # ip cgmp

Configure a multicast router to add it to a specific multicast group:
Dallasr1> (config-if) # ip igmp join-group-address

Disable the Huawei Switch configuration password CGMP:
Dallasr1> (config-if) # no ip cgmp

Start CGMP on the password of the Huawei switch:
Dallasr1> (enable) set cgmp enable

Verify the configuration of cgmp on the Catalyst Huawei Switch configuration password:
Catalystla1> (enable) show config
Set prompt extends stla1>
Set interface sc0 192.168.1.1 255.255.255.0
Set cgmp enable

Configure password settings for the Huawei switch that CGMP leaves:
Dallas_SW (enable) set cgmp leave

Modify the control port password on a Cisco device:
R1 (config) # line console 0
R1 (config-line) # login
R1 (config-line) # password Lisbon
R1 (config) # enable password Lilbao
R1 (config) # login local
R1 (config) # username student password cisco

Set the console and vty port Session Timeout on the Cisco device:
R1 (config) # line console 0
R1 (config-line) # exec-timeout 5 10
R1 (config) # line vty 0 4
R1 (config-line) # exec-timeout 5 2

Set the privilege level on a Cisco device:
R1 (config) # privilege configure level 3 username
R1 (config) # privilege configure level 3 copy run start
R1 (config) # privilege configure level 3 ping
R1 (config) # privilege configure level 3 show run
R1 (config) # enable secret level 3 cisco

Use the privilege command to define the commands used at the privileged level:
Router (config) # privilege mode level command

Configure a password for a Huawei switch to set the user privilege level:
Router (config) # enable secret level 3 dallas
Router (config) # enable secret san-fran
Router (config) # username student password cisco

Flag settings and display:
R1 (config) # banner motd 'unauthorized access will be prosecuted! '

Configure vty access for a Huawei switch with a password:
R1 (config) # access-list 1 permit 192.168.2.5
R1 (config) # line vty 0 4
R1 (config) # access-class 1 in

Configure a password for the Huawei switch to configure HTTP access:
Router3 (config) # access-list 1 permit 192.168.10.7
Router3 (config) # ip http sever
Router3 (config) # ip http access-class 1
Router3 (config) # ip http authentication local
Router3 (config) # username student password cisco

To enable HTTP access, type the following command to configure the password for the Huawei switch:
Switch (config) # ip http sever

Start and verify port security with setCL1 on the password of the set command-based Huawei Switch configuration:
Switch (enable) set port security mod_num/port_num... Enable mac address
Switch (enable) show port mod_num/port_num

Start and verify port security on the password of A Huawei switch based on the CiscoIOS command:
Switch (config-if) # port secure [mac-count maximum-MAC-count]
Switch # show mac-address-table security [type module/port]

Use the access-list command to create a record in the standard traffic filtering table:
Router (config) # access-list-number {permit | deny} source-address [source-address]

Use the access-list command to create a record in the extended traffic filtering table:
Router (config) # access-list-number {permit | deny {protocol | protocol-keyword }}{ source-wildcard | any} {destination-wildcard | any} [protocol- specific options] [log]

For in-band route updates, the most basic command format for configuring route updates is:
R1 (config-router) # distribute-list access-list-number | name in [type number]

For out-of-band route updates, the most basic command format for configuring route updates is:
R1 (config-router) # distribute-list access-list-number | name out [interface-name] routing-process | autonomous-system-number

Set snmp Command Options:
Set snmp community {read-only | ready-write | read-write-all} [community_string]

The format of the set snmp trap Command is as follows:
Set snmp trap {enable | disable}
[All | moudle | classis | bridge | repeater | auth | vtp | ippermit | vmps | config | entity | stpx]
Set snmp trap rvcr_addr rcvr_community

Enable the SNMP chassis trap:
Console> (enable) set snmp trap enable chassis

Enable all SNMP chassis traps:
Console> (enable) set snmp trap enable

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.