#18 Cisco device system operations with computer-based conversion

Source: Internet
Author: User
Tags binary to decimal decimal to binary md5 encryption


Operating systems for Cisco devices:

Ios:internetwork Operating System, Internet operating system, Bsdunix simplified version

Switch iOS: Several megabytes in size

Router iOS: Several 10 mega sizes


Huawei or H3C's operating system:

Comware:communication Ware, Tong Letter,


Cli:command-line Interface


Cisco switches:

Nexus: High-end core switches

Catalyst: Mid-low-end switch


The hardware structure of the catalyst switch:

Cpu:motorola chip.

Ram:dram, unzip the iOS and Running-config configuration files;

Flash: Flash memory, storage of iOS software image files, the culture saved by the configuration file Config.text;

NVRAM: Non-volatile random memory, storing startup-config files;

ROM: Post (power-on self Test)

Interface: Various types of interfaces, the most common is the Ethernet interface;

Ethernet

Console: Configuration management interface, RJ-45 standard connector,

Back-bone: backplane, providing sufficient bandwidth for each interface controller to complete the duplex communication;


iOS is a modeled operating system

User mode

>

Privileged mode (Enable mode)

#

Global configuration Mode

(config) #

Interface configuration mode

(Config-int) #

VLAN configuration mode

(VLAN) #

(Config-vlan) #

Route mode

(Config-router) #

...


Comware is the operating system that should be based on the view

User View

System View

Interface View

VLAN view

Route view

...


Cisco View commands:

Show

Show Running-config: View the configuration files currently running in RAM;

Show Startup-config: View the configuration file saved in NVRAM;

Write

Copy running-config Startup-config: (recommended)

Save current configuration to NVRAM


Huawei's View commands:

Display

Display Current-config: View the configuration files currently running in RAM;

Display Saved-config: View the configuration file saved in NVRAM;

Save: Saves the current configuration to NVRAM


For an Ethernet switch, its interface type:

ethernet:10mbps

fastethernet:100mbps

gigabitethernet:1000mbps


FastEthernet Slot/interface


Calculates the position of the slot, from right to left, bottom up;


Security of the switch:

Password for user mode

Password that must be entered before entering user mode

Configuring in the configuration mode of the console line


Switch (config) # line console 0

Switch (config-line) # Login

Switch (config-line) # password Input_password


Password for privileged mode

Password that must be entered before entering privileged mode

Configure the password used to perform the Enable command in global mode

Switch (config) # enable Password|secret Input_password


Attention:

1.password subcommand set plaintext password, SECRET subcommand set MD5 encryption password;

2. If the plaintext password and encryption password are set at the same time, the plaintext password is invalid and only the encryption password is valid;

3. You can add no command in front of the configuration command to revoke the corresponding password;



Password for remote connection

A password that is entered before connecting to the switch remotely via the Telnet service and entering privileged mode

Password required to enter user mode after remote connection via telnet on the remote client

Switch (config) # line vty 0 [1-15]

Switch (config-line) # Login

Switch (config-line) # password Input_password


Switch (config) # service password-encryption

Command meaning: Save all current plaintext password encryption and encrypt the plaintext password of all subsequent settings


Switch (config) # no service password-encryption

Command meaning: In the future to set the plaintext password, can be displayed in clear text, and for the password has been encrypted to make no changes;


To set the login banner information before the switch enters user mode:

Switch (config) # banner MOTD "Banner_info"

Physical network segment:

Conflict domain: The maximum extent of the occurrence of a conflict;


The switch can divide the whole network into multiple conflict domains, that is, dividing multiple physical network segments, the way of dividing the physical network segment is called "The differential segment of the network".


Ber:

Fiber: 10^-5

Cable: 10^-7

Wireless: 10^-9


Binary: Carry Count system

Digital: The basic digital symbol constituting some kind of carry-count system;

Cardinality: The total number of all the figures in a carry-count system;

Rights:

Integer: Cardinality ^ (bit-1)

Decimal: Radix ^-bit


123456.789


Binary:

Digital: 0, 1

Base: 2

Rights:

Integer: 2^ (Bit-1)

Decimal: 2^-bit


10001010


1 guests

10 Guests

100 guests

...

10 million guests


2^1=10

2^2=100

2^3=1000

2^4=10000

2^5=100000

2^6=1000000

2^7=10000000 binary


2^1=2

2^2=4

2^3=8

2^4=16

2^5=32

2^6=64

2^7=128 Decimal


2^1=2

2^2=4

2^3=10

2^4=20

2^5=40

2^6=100

2^7=200 octal


2^1=2

2^2=4

2^3=8

2^4=10

2^5=20

2^6=40

2^7=80 Hex


2^3=8^1 any three-bit binary number can correspond to one octal digit

2^4=16^1 any four-bit binary number can correspond to a hexadecimal digit



1000 0000


From binary to decimal:

11001 = 1x2^4+1x2^3+0x2^2+0x2^1+1x2^0 = 16+8+0+0+1 = 25


From decimal to binary:

76 = 64+8+4 = 1000000+1000+100 = 1001100


Subnet mask and sub-network partitioning


The switch can divide the conflict domain, divide a conflict domain into multiple conflict domains, and make the scope of the conflict domain smaller.

Splitting the conflict domain is dividing the physical network segment--Micro-segmentation


The router can divide the broadcast domain, divide a broadcast domain into multiple broadcast domains, and make the scope of the broadcast domain smaller.

Dividing the broadcast domain is the division of the logical network Segment-subnet division;


The use of subnet masks enables the division of logical Segments:


Subnet Mask:

32bit binary composition of the number;

Use 1 to indicate the network bit in the IP address, and 0 for the host bit in the IP address;


The bits in the IP address corresponding to 1 in the subnet mask is the network bit, and the bits in the IP address corresponding to the subnet mask 0 is the main camera;


The two mechanism bits in the IP address of 1 identified in the quilt netmask must be the same, and the bits in the IP address of the 0 identified in the quilt mask is ignored;


For example:

What is the subnet mask for the 121.88.99.21 address?

11111111.00000000.00000000.00000000

255.0.0.0


172.16.9.8

10101000.00010000.00001001.00001000 IP Address

11111111.11111111.00000000.00000000 Subnet Mask


10101000.00010000.00000000.00000000

172.16.0.0 Network Address


172.16.99.88

10101000.00010000.01100011.01011000 IP Address

11111111.11111111.00000000.00000000 Subnet Mask


10101000.00010000.00000000.00000000

172.16.0.0 Network Address


172.16.99.99 has class IP address 255.255.0.0

10.1.2.3 has class IP address 255.0.0.0

192.168.100.100 has class IP address 255.255.255.0


172.16.99.100/255.255.255.0 No class IP address


Prefix notation for non-class IP addresses:

172.16.99.100/24

netmask. Subnet mask. Host


Subnetting is actually to increase the number of network bits in the IP address, reduce the number of host bits, so as to reduce the broadcast domain range, reducing the number of hosts in the logical network segment, convenient management and security policy for the precise application;


172.16.0.0/24

172.16.1.0/24

172.16.2.0/24

...

172.16.255.0/24


The number of network bits is increased, and the sub-network (2^ network bit) is divided.


The root effect of the subnet mask:

A "logical and" operation with an IP address to determine the network address of the IP address;


Routing Basics

The router makes data forwarding based on the routing table:

If the routing table has a route entry corresponding to the destination IP address of the packet, it is forwarded according to the relevant routing entry;

If the routing table does not have a route entry corresponding to the destination IP address of the packet, the packet is discarded;


The routing table is the key to whether the router can forward data;


How does the routing table appear in the Router?

1. The routing table is a set of data information with a certain standard format;

2. If the information received by the Administrator is added to the routing table, such routing information is called static routing;

3. If it is the routing information that the routers communicate with each other through a specific protocol, it is called dynamic routing;

4. In general, static routes are permanently valid, and dynamic routing is valid for a specific time frame;


What is the routing entry like?

Source destination network address for route entry [administrative distance/measure] via Next hop address


Source of the route entry:

C: Route entry for direct routing, IP address configured on the physical interface of the router

S: Static route

D, R, O, o E1, o E2, D EX, B: Dynamic routing

s*: Static default route

d*, o*: Dynamic default route


Destination network address:

Network address, which is the IP address of all 0 of the main camera;

Using the subnet mask identified by the destination network address and the destination IP address in the packet, the result is compared with the "Destination network address", and if it is identical, the matching is forwarded; otherwise, the next route entry is matched; if all the routing entries do not match the destination IP address, The packet is discarded;


Management distance: Evaluation of the route selection method is good or bad; the smaller the number the better, the bigger the worse;

Measure: In the same way of routing, the smaller the path of the measure, the better;

The above two parameters are used to judge whether the path is excellent, or, this is the basis of routing choice;


Next-hop address (number of outbound interfaces): If the router can route the packet normally, the parameter indicates the direction of the route data;


#18 Cisco device system operations with computer-based conversion

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.