1. disable CDP (Cisco Discovery Protocol ). For example:
Router (config) # No CDP run
Router (config-If) # No CDP enable
2. Disable other TCP and UDP small services.
Router (config) # No service TCP-small-servers
Router (config) # No
Gateway and router ):
Gateway and router are also an important part of nodes. Their main tasks are as follows:
· Translation of two different domains (networks;
· Create a route.
Just now, we know that in the same network, information can be
OSPF routing protocol is often used in large networks. For example, the municipal unit center 7513 is used as the core device. The OSPF protocol is used in connection with the Provincial Unit at the upper level, subordinate county-level units
Level
Expansion
The cascade expansion mode is the most common and direct extension mode. Some earlier networks are built using hubs as the cascade devices. Because the hub was already very expensive at that time, most enterprises could not choose
If it weren't for Cisco's latest Security Warning, many network administrators have not yet realized that their routers can become the hotspot of attacks. The vro operating system is as vulnerable to hacker attacks as the network operating system.
Symptom 1
If no problem is found between the physical layer and the data link layer after troubleshooting, the following conclusions can be drawn:
. All components on the problem link network layer cannot work normally;
The network can run but the
1. Introduction
With the deepening of the informatization process and the rapid development of the Internet, network has become the general trend of enterprise informatization, and information resources are shared to the greatest extent. However,
In fact, when the network fails, you can make a preliminary judgment from the MODEM indicator. on the MODEM panel, the carrier signal indicator light is CD (109 signal), the receiving signal indicator light is RD (104 signal), and the sending signal
The TCP/IP Protocol, namely, the Transmission Control Protocol/Internet Protocol, is one of the most perfect and widely accepted communication protocols at present, it is not only used to implement communication between different types of networks
The MAC address is the physical address that is fixed in the serial EEPROM on the NIC. It is usually 48-bit long. The ethernet switch implements packet switching and Transmission Based on the MAC source address and MAC destination address in a
We all know that the target host type can be determined through the PING and TRACERT programs. The most important use of ping is to check whether the target host is connected.
TRACERT uses the TTL value in the ICMP packet and the packet header and
The rapid development of broadband services has brought profound changes to the traditional telecom industry and the IT industry. The convergence of multiple businesses and networks has become an irreversible trend. As the main network entity in the
Configuration of high-level Link Control HDLC
Procedure:
Enter the global configuration status config term
Enter port configuration Status interface serial slot/position
Set the HDLC Frame Type encapsulation hdlc
Set IP addresses and Their subnet
Physical Layer symptoms
There are no components that can work normally on the physical layer of the faulty interface.
. The network is in the running status, but it is interrupted at a time, which is worse than that in the baseline status.
There is
After studying the products and materials of Juniper Networks, I found it interesting to write and compare them with Cisco System products according to my documents.
The Juniper Networks platform is designed on the control panel (plane) and
The first level of Network Security Protection
For many network administrators, configuring the access control list of routers is a regular task. It can be said that the access control list of routers is the first level to ensure network security.
1. Question proposal
With the advent of the network information age, Internet technology has developed rapidly worldwide. Open Shortest Pass First (OSPF) dynamic Routing has become the preferred internal gateway protocol for network routing.
In
You only need a CISCO router with an asynchronous module or a vro with a built-in asynchronous serial port to fully enjoy the control connection to a series of network devices in a work room or data center. Now let's take a look at how these jobs
Vro
Iv. Routing
1. Route table
If a host has multiple network interfaces, how does one decide which interface to use when sending a group to a specific IP address? The answer is in the routing table. Let's look at the following example:
Destination
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service