The Cisco switch launched by Cisco is also a giant in the entire industry. The Cisco switch performs well in the market. The Cisco switch will think that the wrong command is the host n
Investment Protection and Development Options
With the development and changes of the Enterprise, you can leverage the Scalable Cisco stack architecture to ensure the synchronous development of your LAN. Cisco provides the industry's most flexible, scalable, and manageable stacking architecture for the Catalyst 3500 XL series and the Catalyst 2900 XL series switches with gigabit performance. You can
After using the Console port to set IP address information for the switch and enable the HTTP service, you can access the switch through a Web browser that supports JAVA, you can modify the parameters of a vswitch through a Web browser and manage the vswitch. In fact, you can modify and set many important parameters of a vswitch on the Web interface, and view the running status of the vswitch in real time.
Cisco switch initialization ManagementTo properly manage and simplify troubleshooting, the following parameters should be configured during initial installation: 1. system name 2. manage ip configuration 3. clock and ntp settings 4. telnet and SSH access configuration 5. DNS6. system log 7. snmp is used to configure the switch system name on the
, midrange, and high-end of the network, respectively. Here are a few of the products for each series:
1, low-end products
First of all say low-end products, 1900 and 2900 are low-end products typical. In fact, in the low-end switch market, Cisco does not occupy a particular advantage, because the 3Com, DLink and other companies have a better performance price ratio of products.
The 1900
Cisco is the main force in the entire vswitch. Its products are doing very well in the market. The following article will detail some of the usage skills and precautions of Cisco switches, in many organizations, the core backbone switches are primarily Cisco.
In the process of debugging and maintaining Cisco switches,
Configuration of a layer-3 Cisco switch 1. Start a route on a layer-3 switch. Otherwise, layer-3 switch does not have the routing function switch (config) # ip routing2. Configure the VLAN ip address
Access-enable allows routers to create temporary access list entries in the Dynamic access list
Access-group applies access control lists (ACLs) to interfaces
Access-list defines a standard IP ACL
Access-template manually replace the temporary access list entry on the attached router
APPN send commands to the APPN subsystem
Atmsig Execute ATM Signaling command
B manually boot the operating system
Bandwidth set the bandwidth of the interface
Ba
Cisco L3 switch Policy Routing for network access and Traffic DistributionI. Description of the solution environment 1. There are two groups of Group1 and Group2 in the environment, respectively, to access the Internet from two different network outlets. 2. The core network is a Cisco 3560G layer-3 Switch with four VLA
suddenly fails? Cisco switches are not so easy to break.
Use the command shutdown, and then use no shutdown
The network port returns to normal. Why does this happen? It may be that when a colleague changes the network module, the line is short-circuited, resulting in the software failure of the switch.
Baidu: For more details, the following is a netizen's article:
Solve the Problem of err-disabled o
=" Wkiom1soqq7ck2jtaahgkzym5xw472.jpg "/>(This picture is borrowed from others)Global Configuration Mode:1: enter this mode first. 2: port configuration such as:switch# configureterminalSwitch (config) #interface fastethernet 0/3Switch (config-if) #speed10// Configure Port Rate 10M default AutoSwitch (config-if) #duplexhalf//full Full Duplex Half Half Duplex AutoSwitch (config-if) #noshutdown// Open PortSwitch IP Configuration:
The switch divides
want to initialize the switch, you need to enter the Privileged EXEC mode. Enter setup in the command prompt symbol to start the initialization operation.The Privileged EXEC mode is introduced just now. In this case, we need to talk about several modes of machine change. Different modes can execute different operation commands. First, we need to talk about two basic modes.For the sake of security, CISCO di
Disable forwarding of a specific MAC address on a cisco SwitchIt is really annoying to see other illegal DHCP in the LAN. In addition to the dhcp snooping method, you can also directly disable the mac address! The MAC address of machine A is 00-01-02-03-04-05, which is connected to port F0/3 of Switch B, port F0/3 is in VLAN3. Currently, forwarding of A is blocked on port B. You can set the following accord
message are correctIf a large number of messages are sent, the network bandwidth will be exhausted to form another Denial-of-Service attack.3. The client can specify the IP address at will.The client does not have to use the DHCP service. It can set IP addresses in a static way. If any,This will greatly increase the possibility of network IP address conflict.II. Introduction to DHCP Snooping TechnologyDHCP Snooping is a DHCP security feature. Cisco s
Microsoft's Windows Server 2012 has been able to support LACP link aggregation, due to the use of link aggregation can achieve line redundancy and bandwidth increase, here I used a Cisco 2960 to do a test for interested friends reference.Experiment Preparation:Cisco switch 29,601, install server 2012 servers, there are two Gigabit network card, network cable two root.Steps:1. Configuration of
and get connected to the switch IP address6. Enter the access layer switchRun the box "Telnet 192.168.66.1";Show mac address-table dynamic address 3w45.65e3.8866 get port numberShow mac address-table Dynamic interface Gi2/0/17 detail get only one piece of information that proves that the MAC address is on this switch, if not repeat steps 4, 57, first introduced to swit
data transmission, but the cost is that it cannot perform verification and Error Correction on data frames.
Free segmentation Mode
Free Fragment-free) mode is used when the switch receives a data frame, once it detects that the data frame is not a conflict frlision fragment), the forwarding operation is performed. The conflicted fragment is a data frame fragment damaged by a network conflict. It is characterized by a length less than 64 bytes. Con
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.