#config terminal
Route (config) # line vty 0 4 ---- enter telnet remote login port mode (0 4 allows 5 Users)
Route (config-line) # password CISCO ---- set the password to "CISCO" (to encrypt the password, enable vro password protection before: service pass-encryption)
Route (config-line) # login ---- encrypted upon login
Route(config-line)#exit
Continue to enter the privileged mode and wh
switch forgot password, no relationship, restore to factory settings, restarted.
Switch on and hold down the switch's mode button. Go to switch:
Input Flash_init
Del Flash:config.txt
Del Vlan.dat
Boot
Go to the following interface and reconfigure the switch password!5 07:57:03.491:%lineproto-5-updo
Cisco mds9222i Fibre Switch most commonly used debug commands1. Check the switch portShow interface [Interface-range]View specified port run status, WWN information, configuration parameters, and packet statistics.Demonstration:mds9222i-1# Show Interface FC1/1FC1/1 is trunking-port FC1/1 operating normally, is a TE portHardware is Fibre Channel, SFP was short wav
[Cisco] DHCP relay, layer-3 Switch VLAN Routing PracticeThe experiment topology uses the GNS3 0.8.6 simulator to build a DHCP server using Red Hat 6.5. The experiment requires configuring a layer-3 Switch VLAN routing so that VLAN10 and VLAN20 members can access each other. Performs DHCP relay for layer-3 switches so that VLAN10 and VLAN20 members can obtain IP a
The article I want to share and configure VLAN on Linux through Cisco Catalyst Switch.Requirements:1. Linux installed on a PC with one or more NICs (Network Interface Card). I Use the Centos 5.4 using 2.6.18-164.11.1.EL5PAE kernel. It should is applicable on other Linux distros such as Slackware, Ubuntu, Fedora, Debian, etc.2. Cisco Catalyst Switch 29503.2 Pc/lap
Port security Configuration for the Cisco PT Simulation Experiment (7) switchExperimental Purpose : Master the port security function of the switch, control the user's secure accessExperimental Background : The company network adopts the personal fixed IP Internet program, in order to prevent the company internal User IP address borrowing, using, unauthorized access to the
For complete syntax and application information about this chapter, seeCatalyst 3550 Multilayer Switch Command ReferenceAnd Cisco IOS Interface Command Reference For Release 12.1.
Understanding Interface Types
This section describes different interface types and some reference content for configuring these interfaces in detail in other sections. Other sections describe the configuration process of physi
Common commands for Cisco switches -- set the switch Password
A. Change the remote TELNNET Password
Switch#configureterminal
Switch(config)#linevty04
Switch(config-line)#passwordqycx123
Switch(config-line)#l
Cisco switch initialization ManagementTo properly manage and simplify troubleshooting, the following parameters should be configured during initial installation: 1. system name 2. manage ip configuration 3. clock and ntp settings 4. telnet and SSH access configuration 5. DNS6. system log 7. snmp is used to configure the switch system name on the
Cisco switch Security Lecture Hall: cracking the shock wave virus and the red code, understanding the basic virus principles, and providing a good awareness of cisco switch security. Simple security measures will also receive attention. In today's online world, security is crucial.
As the Internet has brought huge bene
In a Cisco switch, how does one configure QOS speed limit? How to restrict BT download? This blog will use detailed examples for your explanation.
Instance 1: QOS speed limit problem on CISCO switches
It is used to control the bandwidth of a leased line user on a vswitch. The vswitch is usually at 10/100/1000 or three rates. QOS is required for other rates. You c
I am eager for the first time to switch between vlan routing and nat addresses of Cisco switches. I am very energetic and have an undefeated spirit. I am ready to continue to answer questions during multiple rounds of interviews. My little brother squashed his eyes and took out the bottom of the press box: If my company has two Internet interfaces, A and B, respectively. The following vswitch divides multip
Cisco switches enable port speed limiting
As shown in, Node switch 3550 is placed in an office room. The networks of all office companies are from this place. How does the operator configure network bandwidth settings for each company on this device? Let's take the IT Training Center of XX foreign companies as an example. The IT Training Center of XX foreign companies applied for a 2 m link.
Step-1
Rongxi
trunkSwitch (config-if) #switchport trunk allowed VLAN, set allowed VLANsSwitch (config-if) #switchport trunk encap dot1q; set VLAN trunkingSwitch (config) #vtp domain; Set the VTP domain nameSwitch (config) #vtp password; set the VTP passwordSwitch (config) #vtp mode server, setting the VTP patternSwitch (config) #vtp mode client, setting the VTP patternSwitch set IP address:Switch (config) #interface vlan 1; go to VLAN 1Switch (config-if) #ip address; Set IP addressesSwitch (config) #ip defau
Experimental requirements: Use Telnet login to complete the initialization configuration of a switchTopology diagram1. Enter the command line of the switch2. Enter enable into privileged mode3. Enter configure terminal into global mode4. Enter hostname Ruan Change host name to Ruan (here the hostname is just as good as you remember)5. Enter enable password 1314 to set the plaintext management password to 13146. Enter enable secret 520 to set the encryption management password to 520 (note here t
Cisco 3560 switch interface traffic grabbing vbs scriptTo make it easy for you to view the traffic of the vswitch interface, the customer does not log on to the vswitch, and does not have any network management traffic statistics device. Simply write a vbs script, which is simple and usable.
On error resume next dim wshellset WshShell = WScript. createObject ("WScript. shell ") WshShell. run "cmd" WshShell
Disable forwarding of a specific MAC address on a cisco SwitchIt is really annoying to see other illegal DHCP in the LAN. In addition to the dhcp snooping method, you can also directly disable the mac address! The MAC address of machine A is 00-01-02-03-04-05, which is connected to port F0/3 of Switch B, port F0/3 is in VLAN3. Currently, forwarding of A is blocked on port B. You can set the following accord
Cisco switch port broadcast storm settings are more practical. When a port receives a large number of broadcast, unicast, Or multicast packets, a broadcast storm occurs. Forwarding these packets will slow down the network or cause timeout. Using broadcast storm control on ports can effectively avoid network paralysis caused by hardware damage or link failure. By default, broadcast, multicast, and unicast st
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.