展开全部
1、先拖动四个终端设备,和一台交换机。
2、在特权模式下,先通过show ip route 命令可以查看默认vlan。如图所示,交换机上显示的接口都是默认vlan1。
3、先分别创建vlan2和vlan3,并且命名。
4、在全局模式下进入接口,进入接口模式之后,在设置为access模式,把交换机的接口f0/1和f0/2分别加入vlan2。
5、把f0/3和f0/4分别加入vlan3,步骤和上一步一样。
6、点击终端设备(电脑),切换到ip模式。
7、将pc0终端设备的ip设置为静态ip,pc0和pc1设置为同一个网段,pc3和pc4ip的设置为一个网段。
8、设置为每个电脑的ip之后。在pc0电脑里打开command。
9、在pc0电脑里ping pc1电脑的ip会ping通,但是ping pc3电脑的ip ping不通。这就是划分vlan的作用。
2013-08-25
展开全部
应该和思科的没什么区别吧?你可以试试看:Switch>enable (进入特权模式)
Switch#conf terminal (进入全局配置模式)
Switch(config)#vlan 10(创建VLAN 10)
Switch(config-vlan)#name vlan10(命名为vlan10)
Switch(config-vlan)#vlan 20(创建VLAN 20)
Switch(config-vlan)#name vlan20(命名为vlan20)
Switch(config-vlan)#vlan 30(....)
Switch(config-vlan)#name vlan30(....)
Switch(config-vlan)#exit(退出vlan配置模式)
Switch(config)#int f0/1(进入f0/1口)
Switch(config-if)#switchport access vlan 10(将f0/1口划分到vlan 10)这样就划分好了。。。
Switch#conf terminal (进入全局配置模式)
Switch(config)#vlan 10(创建VLAN 10)
Switch(config-vlan)#name vlan10(命名为vlan10)
Switch(config-vlan)#vlan 20(创建VLAN 20)
Switch(config-vlan)#name vlan20(命名为vlan20)
Switch(config-vlan)#vlan 30(....)
Switch(config-vlan)#name vlan30(....)
Switch(config-vlan)#exit(退出vlan配置模式)
Switch(config)#int f0/1(进入f0/1口)
Switch(config-if)#switchport access vlan 10(将f0/1口划分到vlan 10)这样就划分好了。。。
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐于2017-12-16
展开全部
基本是这样进入配置模式<SwitchA>sys方法11.创建(进入)VLAN10,将E1/0/1加入到VLAN10
[SwitchA]vlan 10
[SwitchA-vlan10]port Ethernet 1/0/12.创建(进入)VLAN20,将E1/0/2加入到VLAN20
[SwitchA]vlan 20
[SwitchA-vlan20]port Ethernet 1/0/2方法21.进入以太网端口E1/0/1的配置视图
[SwitchA]interface Ethernet 1/0/12.配置端口E1/0/1的PVID为10
[SwitchA-Ethernet1/0/1]port access vlan 103.进入以太网端口E1/0/1的配置视图
[SwitchA]interface Ethernet 0/24.配置端口E1/0/2的PVID为20
[SwitchA-Ethernet1/0/2]port access vlan 20 一下是一台我配置过的3600#
sysname main
#
radius scheme system
#
domain system
#
local-user admin
password simple fsx522
service-type telnet
level 3
#
acl number 3002
rule 0 deny ICMP destination 192.168.12.0 0.0.0.255 icmp-type echo
rule 1 deny TCP established destination 192.168.12.0 0.0.0.255
rule 2 permit ICMP source 192.168.12.0 0.0.0.255 icmp-type echo
rule 3 permit TCP established source 192.168.12.0 0.0.0.255
#
vlan 1
#
vlan 10
#
vlan 20
#
vlan 30
#
vlan 40
#
vlan 888
#
vlan 999
#
interface Vlan-interface1
ip address 192.168.1.1 255.255.255.0
#
interface Vlan-interface10
ip address 192.168.10.254 255.255.255.0
#
interface Vlan-interface20
ip address 192.168.11.254 255.255.255.0
#
interface Vlan-interface30
ip address 192.168.12.254 255.255.255.0
#
interface Vlan-interface40
ip address 192.168.13.254 255.255.255.0
#
interface Vlan-interface888
ip address 100.100.1.1 255.255.255.0
#
interface Vlan-interface999
ip address 200.200.1.1 255.255.255.0
#
interface Aux1/0/0
#
interface Ethernet1/0/1
duplex full
speed 100
port link-type trunk
port trunk permit vlan all
#
interface Ethernet1/0/2
duplex full
speed 100
port link-type trunk
port trunk permit vlan all
#
interface Ethernet1/0/3
port access vlan 20
#
interface Ethernet1/0/4
port access vlan 20
#
interface Ethernet1/0/5
port access vlan 20
#
interface Ethernet1/0/6
port access vlan 20
#
interface Ethernet1/0/7
port access vlan 20
#
interface Ethernet1/0/8
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/9
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/10
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/11
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/12
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/13
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/14
port access vlan 40
#
interface Ethernet1/0/15
port access vlan 40
#
interface Ethernet1/0/16
port access vlan 40
#
interface Ethernet1/0/17
port access vlan 40
#
interface Ethernet1/0/18
port access vlan 40
#
interface Ethernet1/0/19
port access vlan 40
#
interface Ethernet1/0/20
port access vlan 10
#
interface Ethernet1/0/21
port access vlan 10
#
interface Ethernet1/0/22
port access vlan 10
#
interface Ethernet1/0/23
port access vlan 888
#
interface Ethernet1/0/24
port access vlan 999
#
interface GigabitEthernet1/1/1
#
interface GigabitEthernet1/1/2
#
interface GigabitEthernet1/1/3
port access vlan 888
#
interface GigabitEthernet1/1/4
port access vlan 999
#
undo irf-fabric authentication-mode
#
interface NULL0
#
voice vlan mac-address 0001-e300-0000 mask ffff-ff00-0000
#
ip route-static 0.0.0.0 0.0.0.0 100.100.1.2 preference 60
#
user-interface aux 0 7
user-interface vty 0 4
authentication-mode scheme
#
return
[SwitchA]vlan 10
[SwitchA-vlan10]port Ethernet 1/0/12.创建(进入)VLAN20,将E1/0/2加入到VLAN20
[SwitchA]vlan 20
[SwitchA-vlan20]port Ethernet 1/0/2方法21.进入以太网端口E1/0/1的配置视图
[SwitchA]interface Ethernet 1/0/12.配置端口E1/0/1的PVID为10
[SwitchA-Ethernet1/0/1]port access vlan 103.进入以太网端口E1/0/1的配置视图
[SwitchA]interface Ethernet 0/24.配置端口E1/0/2的PVID为20
[SwitchA-Ethernet1/0/2]port access vlan 20 一下是一台我配置过的3600#
sysname main
#
radius scheme system
#
domain system
#
local-user admin
password simple fsx522
service-type telnet
level 3
#
acl number 3002
rule 0 deny ICMP destination 192.168.12.0 0.0.0.255 icmp-type echo
rule 1 deny TCP established destination 192.168.12.0 0.0.0.255
rule 2 permit ICMP source 192.168.12.0 0.0.0.255 icmp-type echo
rule 3 permit TCP established source 192.168.12.0 0.0.0.255
#
vlan 1
#
vlan 10
#
vlan 20
#
vlan 30
#
vlan 40
#
vlan 888
#
vlan 999
#
interface Vlan-interface1
ip address 192.168.1.1 255.255.255.0
#
interface Vlan-interface10
ip address 192.168.10.254 255.255.255.0
#
interface Vlan-interface20
ip address 192.168.11.254 255.255.255.0
#
interface Vlan-interface30
ip address 192.168.12.254 255.255.255.0
#
interface Vlan-interface40
ip address 192.168.13.254 255.255.255.0
#
interface Vlan-interface888
ip address 100.100.1.1 255.255.255.0
#
interface Vlan-interface999
ip address 200.200.1.1 255.255.255.0
#
interface Aux1/0/0
#
interface Ethernet1/0/1
duplex full
speed 100
port link-type trunk
port trunk permit vlan all
#
interface Ethernet1/0/2
duplex full
speed 100
port link-type trunk
port trunk permit vlan all
#
interface Ethernet1/0/3
port access vlan 20
#
interface Ethernet1/0/4
port access vlan 20
#
interface Ethernet1/0/5
port access vlan 20
#
interface Ethernet1/0/6
port access vlan 20
#
interface Ethernet1/0/7
port access vlan 20
#
interface Ethernet1/0/8
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/9
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/10
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/11
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/12
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/13
port access vlan 30
packet-filter outbound ip-group 3002 rule 0
packet-filter outbound ip-group 3002 rule 1
packet-filter outbound ip-group 3002 rule 2
packet-filter outbound ip-group 3002 rule 3
#
interface Ethernet1/0/14
port access vlan 40
#
interface Ethernet1/0/15
port access vlan 40
#
interface Ethernet1/0/16
port access vlan 40
#
interface Ethernet1/0/17
port access vlan 40
#
interface Ethernet1/0/18
port access vlan 40
#
interface Ethernet1/0/19
port access vlan 40
#
interface Ethernet1/0/20
port access vlan 10
#
interface Ethernet1/0/21
port access vlan 10
#
interface Ethernet1/0/22
port access vlan 10
#
interface Ethernet1/0/23
port access vlan 888
#
interface Ethernet1/0/24
port access vlan 999
#
interface GigabitEthernet1/1/1
#
interface GigabitEthernet1/1/2
#
interface GigabitEthernet1/1/3
port access vlan 888
#
interface GigabitEthernet1/1/4
port access vlan 999
#
undo irf-fabric authentication-mode
#
interface NULL0
#
voice vlan mac-address 0001-e300-0000 mask ffff-ff00-0000
#
ip route-static 0.0.0.0 0.0.0.0 100.100.1.2 preference 60
#
user-interface aux 0 7
user-interface vty 0 4
authentication-mode scheme
#
return
本回答被网友采纳
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询