This article analyzes the configuration of the Huawei Switch configuration password in CGMP. Have you ever touched on the common Huawei Switch configuration password? Are you familiar with the password settings for the Huawei switch that CGMP leaves? Isn't your vswitch often confusing you? Let's take a look at the following articles to solve all the problems.
To configure the CGMP Huawei switch password on a CISCO router:
Dallasr1> (config-if) # ip cgmp
Configure a multicast router to add it to a specific multicast group:
Dallasr1> (config-if) # ip igmp join-group-address
Disable the Huawei Switch configuration password CGMP:
Dallasr1> (config-if) # no ip cgmp
Start CGMP on the password of the Huawei switch:
Dallasr1> (enable) set cgmp enable
Verify the configuration of cgmp on the Catalyst Huawei Switch configuration password:
Catalystla1> (enable) show config
Set prompt extends stla1>
Set interface sc0 192.168.1.1 255.255.255.0
Set cgmp enable
Configure password settings for the Huawei switch that CGMP leaves:
Dallas_SW (enable) set cgmp leave
Modify the control port password on a Cisco device:
R1 (config) # line console 0
R1 (config-line) # login
R1 (config-line) # password Lisbon
R1 (config) # enable password Lilbao
R1 (config) # login local
R1 (config) # username student password cisco
Set the console and vty port Session Timeout on the Cisco device:
R1 (config) # line console 0
R1 (config-line) # exec-timeout 5 10
R1 (config) # line vty 0 4
R1 (config-line) # exec-timeout 5 2
Set the privilege level on a Cisco device:
R1 (config) # privilege configure level 3 username
R1 (config) # privilege configure level 3 copy run start
R1 (config) # privilege configure level 3 ping
R1 (config) # privilege configure level 3 show run
R1 (config) # enable secret level 3 cisco
Use the privilege command to define the commands used at the privileged level:
Router (config) # privilege mode level command
Configure a password for a Huawei switch to set the user privilege level:
Router (config) # enable secret level 3 dallas
Router (config) # enable secret san-fran
Router (config) # username student password cisco
Flag settings and display:
R1 (config) # banner motd 'unauthorized access will be prosecuted! '
Configure vty access for a Huawei switch with a password:
R1 (config) # access-list 1 permit 192.168.2.5
R1 (config) # line vty 0 4
R1 (config) # access-class 1 in
Configure a password for the Huawei switch to configure HTTP access:
Router3 (config) # access-list 1 permit 192.168.10.7
Router3 (config) # ip http sever
Router3 (config) # ip http access-class 1
Router3 (config) # ip http authentication local
Router3 (config) # username student password cisco
To enable HTTP access, type the following command to configure the password for the Huawei switch:
Switch (config) # ip http sever
Start and verify port security with setCL1 on the password of the set command-based Huawei Switch configuration:
Switch (enable) set port security mod_num/port_num... Enable mac address
Switch (enable) show port mod_num/port_num
Start and verify port security on the password of A Huawei switch based on the CiscoIOS command:
Switch (config-if) # port secure [mac-count maximum-MAC-count]
Switch # show mac-address-table security [type module/port]
Use the access-list command to create a record in the standard traffic filtering table:
Router (config) # access-list-number {permit | deny} source-address [source-address]
Use the access-list command to create a record in the extended traffic filtering table:
Router (config) # access-list-number {permit | deny {protocol | protocol-keyword }}{ source-wildcard | any} {destination-wildcard | any} [protocol- specific options] [log]
For in-band route updates, the most basic command format for configuring route updates is:
R1 (config-router) # distribute-list access-list-number | name in [type number]
For out-of-band route updates, the most basic command format for configuring route updates is:
R1 (config-router) # distribute-list access-list-number | name out [interface-name] routing-process | autonomous-system-number
Set snmp Command Options:
Set snmp community {read-only | ready-write | read-write-all} [community_string]
The format of the set snmp trap Command is as follows:
Set snmp trap {enable | disable}
[All | moudle | classis | bridge | repeater | auth | vtp | ippermit | vmps | config | entity | stpx]
Set snmp trap rvcr_addr rcvr_community
Enable the SNMP chassis trap:
Console> (enable) set snmp trap enable chassis
Enable all SNMP chassis traps:
Console> (enable) set snmp trap enable