-list 10 deny 192.168.1.0 0.0.255Router (Config) # access-list 10 permit any! The router is prohibited from receiving and updating the route information of the 192.168.1.0 network.Router (Config) # router ospf 100Router (Config-router) # distribute-list 10 in! Disable router forwarding to spread route information of 19
! The router is prohibited from receiving and updating the route information of the 192.168.1.0 network.Router (Config) # router ospf 100Router (Config-router) # distribute-list 10 in! Disable router forwarding to spread route information of 192.168.1.0 NetworkRouter (Config) # rou
Ip address 12.1.1.1 255.0.0.0 ip address 16.1.1.1 255.0.0.0
Router igrp 1
NETWORK l.0.0.0 NETWORKl.0.0.0
NETWORK l2.0.0.0 NETWORK l6.0.0.0.
Router troubleshooting methods
First, check the status of the MODEM. If the DCD of the MODEM is not on, the connection is faulty. Check the connection first. Check the cable conne
Router Access ADSL configuration detailed
1, Cisco router connection to the ADSL modem configuration: Note: The case for Beijing Telecom ADSL PPPoE access, need to use a common ADSL modem and a Cisco 2500 router (dual Ethernet port), IOS 12.2 (T), Be able to realize LAN sha
of each hop of a message. The Verbose attribute specifies the response time of each response ..Sweep range of sizes [n] This attribute is mainly used to test faults such as the loss of large packets, slow processing speed, or failed segmentation.Extend ipx ping the extended IPX ping also allows you to modify parameters, such as the packet size and number of duplicates. Another enhancement attribute of ping in user mode is the NovellStandard echo attribute. With this attribute, You can ping the
response time of each response ..
Sweep range of sizes [n] This attribute is mainly used to test faults such as the loss of large packets, slow processing speed, or failed segmentation.
Extend ipx ping the extended IPX ping also allows you to modify parameters, such as the packet size and number of duplicates. Another enhancement attribute of ping in user mode is the NovellStandard echo attribute. With this attribute, You can ping the workstation that loads IPX. If this attribute is disabled, t
In addition to address binding, ARP configurations of Cisco routers are getting more and more attention. Therefore, we will discuss two aspects here. It seems a bit messy, but I hope it will help you. I know that the command for binding the IP address of the cisco router to the mac address is arp
Verbose attribute specifies the response time of each response ..
Sweep range of sizes [n] This attribute is mainly used to test faults such as the loss of large packets, slow processing speed, or failed segmentation.
Extend ipx ping the extended IPX ping also allows you to modify parameters, such as the packet size and number of duplicates. Another enhancement attribute of ping in user mode is the Novell Standard echo attribute. With this attribute, You can ping the workstation that loads IPX.
A Cisco router uses Cisco 3620 as the ios dhcp Server. the IP address of the fastethernet0 port connected to the Intranet is 192.168.1.4, And the L2 Switch uses two Cisco 2950, A layer-3 Switch uses a Cisco 3550. There are two VLA
This article mainly uses an example to explain in detail how to solve the packet loss problem caused by CISCO router faults? The following article gives me a detailed answer.
Recently, some people in my department (Department A) reported that they could not access the network of the higher-level department (Department B. I use the ping command from the computer A1 (IP
It is still difficult for general users to implement effective Cisco router nat configuration. So I have studied the comprehensive knowledge about Cisco router nat configuration and will share it with you here, I hope it will be useful to you.
1. NAT introduction:
NATNetwork Address Translation) Network Address Transl
Some time ago, my colleague asked me a question about the DHCP configuration of the Cisco router. At that time, I did not give a positive answer, because this was my first time. In the following days, I have consulted relevant materials and are satisfied with the following answers. Share it with you now! In addition, most people do not know about the computer and do not operate these operations. Therefore,
restrict the ip address range for access to VTY.
Because the number of VTYs is limited, when all VTYs are used up, remote network connections cannot be established. This may be exploited to launch Dos attacks ). Here, attackers do not have to log in. They only need to establish a connection and go to the login prompt to consume all VTYs. A good defense method for such attacks is to use the ip access-class
As a port device connecting WAN, vrouters have been widely used. Their main function is to connect multiple independent networks or subnets to achieve optimal routing and datagram transmission between the Internet. This article takes the Cisco 2511 vro as an example to introduce four router configuration methods.
1. Use the Cisco
CISCO PT Simulation Experiment (12) configuration of router static routesExperimental Purpose : Master the configuration method and application of static routeMastering Route descriptions in the routing tableFamiliar with the principle and process of Routing and Packet forwardingExperimental Background :In addition to the headquarters of a company, there is another branch, and there is a separate LAN, in o
OR non-broadcast Multiple Access nbma) and Backup the specified Router Backup Designated Router, BDR)
On a Cisco router, HELLO is sent once every 10 seconds by default, and can be changed through ip ospf hello-interval.The router's invalid interval is four times the default
be encrypted, which is not possible in the "man-in-the-middle" attack mode above, and can also prevent DNS and IP spoofing. In addition, it also has an additional advantage that the transmitted data is compressed, so it can speed up transmission.
3. SSH deployment
Based on the above tests and SSH security features, it is necessary to use SSH instead of Telnet for security management of Cisco routers. Of co
local management interface (LMI)
Show Frame-relay Map Displays the current mapping entry and information about the connection
Show Frame-relay PVC Displays statistical information about the permanent virtual circuit (PVC) of the Frame Relay interface
Show hosts cache list of host names and addresses
Show interfaces displays statistics for all interfaces set up on routers and access servers
Show interfaces shows the status of all interfaces configured on the
Dynamic and robust routing is extremely important for Internet networks. Therefore, any network engineer who is first involved in this field must not only understand the concept of routing, but also be able to control it in a real environment. However, the products provided by high-end network equipment suppliers such as Cisco in the routing field are all over the world. This means that most people can only learn routes in school or laboratory environ
Recently, a friend asked me how to configure static NAT for a Cisco router to allow Internet users to access the Intranet Web and email servers through a Cisco router. Obviously, this function requires NAT between the public IP address and the Intranet
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.