save command in cisco router

Discover save command in cisco router, include the articles, news, trends, analysis and practical advice about save command in cisco router on alibabacloud.com

Configuration instance for Cisco router telnet and ssh telnet

service, you can use show ip SSH command to view authentication R1 (config) #ip domain-name IDC R1 (config) #crypto key generate RSA The name for the keys to BE:R1.IDC Choose the size of the key modulus in the range of 360 to 2048 foryour General purpose keys.choosing A key modulus greater than the May take A few minutes. How many bits in the modulus [512]: 1024 % generating 1024 bit RSA keys, keys would be non-exportable ... [OK] R1 (config

Cisco router global, interface, protocol debugging guide (1)

Global debugging When configuring a Cisco router, the boundaries between global and interface commands are obvious. In this case, we use "Global" to identify commands that cannot be used for interface debugging or specific transmission media types and Protocol debugging. For example, in vrouters 2500, you can use Debugging commands to analyze the Cisco Discovery

Using Cisco router to establish the security mechanism of enterprise network

In recent years, the computer network, especially the Internet development is very rapid, ATM and IP over DWDM technology development so that the network transmission bandwidth quickly increased. While the development of network security and management technology is relatively lagging behind, although the voice of network security is high, but really fall to actually few. It is often believed that increasing the security mechanism of the enterprise network requires the addition of firewalls, aut

Hacker BACKDOOR: Cisco router Tcl script 2nd tests

/131227/025211OP-7.jpg "/> Tlenet logs on to port 9898 of the Cisco router and displays that the password verification is completely bypassed. 650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0252116215-8.jpg "/> Enter the Cisco command directly after the enter ios

Summary of Cisco router port faults

Cisco port status: CSU ── channel server unit, DSU ── data server, unit, DTE ── DataTerminalEquipment 1. Serial * is down, line protocol is down (DTE) faults: [1] No power is added to the vro. [2] LINE is not connected to CSU/DSU. [3] hardware error. Solution: [1] Check power supply. [2] Check whether the cables and serial ports used are correct. [3] switch to another serial port. 2. Serial * is up and line protocol is down (DTE) faults: [1] local or

Simulate a cisco router with dynamic in Linux

Article Title: simulate a cisco router using dynamic in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Environment: centos5.2 Software: dynamic. cisco-ios 1: Download the dynamic binfile. Wget http://www.ipflow.utc.fr/

Control Remote Cisco router to switch Telnet to SSH

supports SSH. log on to your vro or vswitch and check whether you have loaded an IPSec IOS image that supports SSH. In our example, we will use the Cisco IOS command. Run the following command: Router> Show flash This command displays the name of the loaded IOS image. You c

CISCO CCNA Router Password management

Tags: Cisco CCNA router Password managementfor device security, the device administrator typically sets the user name and password for the device. Here's how to configure 3 passwords, with emphasis in the middle.Username Test password Cisco//This is to set up a layer of accounts and passwordsEnable password 123// This is the Setup admin passwordRouter (config) #l

Cisco router enters Rommon mode, Flash lost, swipe iOS method

1. Preparation Tools Cisco TFTP server, HyperTerminal, iOS files iOS files are not easy to find, you need to look at the hardware version, as well as the size of ROM RAM, to my Cisco 2621XM for example (with two fastethernet),Start looking for a few 2600 of iOS, the brush is not correct, the problem of unrecognized network interface, can not be configured, there should be F interface with S Ios,

How to Prevent DDoS on a Cisco Router

1. Use the ip verfy unicast reverse-path network interface command This function checks each packet passing through the router. In the router's CEFCisco Express Forwarding) table, if the route entry of the packet to the network interface does not have the source IP address of the packet, the router discards the packet. For example, if the

Control of BT traffic by Cisco Router Security

This article describes how to control the BT traffic of a Cisco router through specific operations, and describes the specific operation methods in detail. I hope this article will help you. Network-Based Application Recognition (NBAR) indicates Network Application Recognition. NBAR is a technology that can dynamically search for protocols in Layer 4 to Layer 7. It can not only control static and simple net

GRE description (an example of GRE Tunnel Configuration for a Cisco router)

are used The route of this packet. ---- GRE only provides encapsulation of data packets. It does not have encryption to prevent network listening and attacks. Therefore, in the actual environment, it often corresponds to an IP address. When the SEC is used together, IPSec provides encryption of user data to provide users with better security. The GRE protocol has two main purposes: internal protocol encapsulation and private address encapsulation. In China, CEN uses almost all TCP/IP protocols,

Research and Practice of Cisco Series Router password recovery (1)

1. Password Recovery Principle 1) The Cisco router stores several different configuration parameters and stores them in different memory modules. The memory of Cisco Series routers includes ROM, Flash memory, RAM, immutable RAM, and Dynamic memory DRAM. See table 1 ). Generally, when a vrodram starts, it first runs the program in ROM, conducts system self-check

NAT modification issues that cannot be avoided in Cisco router configuration

disconnected. Dynamic nat is in use and cannot be modified.2. Then understand all the dynamic nat translation caches.3. Delete the previous address pool settings4. Add the correct address pool settings5. Open the Internet and configure the Cisco Router6. Save the configuration to RAM Well, the actual operation is as follows # conf tint FastEthernet0/0no ip nat outside let back to # mode # clear ip nat tran

Necessity for configuring WRED on a Cisco Router

Necessity for configuring WRED on a Cisco Router Although the queue provides VoIP QoS congestion management, it still needs some congestion avoidance mechanisms, such as WRED. In particular, WRED can prevent the output queue from reaching the limit value, which will lead to the loss of all input packets. This article comes from Informit and discusses the necessity of configuring WRED on a

How to configure a Cisco router using a script

ExploitationScriptConfigureCisco router configurationBefore that, you must specify the operations you want to perform, execute those commands, and then write scripts. I want to back up the running-configure configuration. Of course, the device has been configured and the tftp server is ready. The Cisco router configuration is as follows: BT Wireless Network crac

Use the tftp function of Linux to configure a cisco Router

Use the tftp function of Linux to configure information about cisco router-Linux Enterprise Application-Linux server application. The following is a detailed description. In a LAN environment, if there are Cisco routers and Linux servers. Maybe you need to use Linux The TFTP service downloads the Cisco

Cisco router configuration manual Virtual LAN (VLAN) routing

Cisco router configuration manual Virtual LAN (VLAN) routing 1. The main network technology we currently use when constructing an enterprise network is generally based on exchange and virtual networks. The exchange technology changes shared media to exclusive media, greatly improving the network speed. The Virtual Network Technology breaks the restrictions of the geographical environment. without changing t

Cisco Router Foundation Security Configuration---Privileged mode and vty line password

we are using Console connect the router and the computer, start the router and use the Putty connect to the router's console ( Console ), it is recommended that you first configure the hostname of the router ( hostname ) To facilitate identification, configure the privileged mode ( Enable ) Password and vty ( telnet ) password to protect the

Cisco Router uploads iOS (ii)

1 > ip_address=10.8.3.1//router Ethernet IP address Rommon 2 > ip_subnet_mask=255.255.255.0//Mask Rommon 3 > DE FAULT_GATEWAY=10.8.3.134//Default gateway address Rommon 4 > tftp_server=10.8.3.134//tftp server IP address Rommon 5 > tftp_file= C1841-adventerprisek9-mz.151-3.t2.bin//ios file name Rommon 6 > Set//View configuration information ip_address=10.8.3.1 ip_subnet_ mask=255.255.255.0 default_gate

Total Pages: 12 1 .... 8 9 10 11 12 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.