functions, including dynamic routing protocols RIP1/2, OSPF, Static Routing, and access control lists. The price ranges from 20000 ~ About 80000 yuan.④ High-end core switchHigh-end core switches generally adopt a box-type structure and provide multiple expansion slots. Different function boards and interface boards can be configured as needed. This type of switch features high data forwarding speed, rich interfaces, and good stability. It is very sui
Use TFTP to back up switch configuration information before using commands to maintain network equipment and modify the configuration file, you should first back up the configuration information of the device, this is very important because tftp commands are commonly used in conjunction with cisco's backup software
--1rootroot30020512 Month 100:0810.06.99.17_ 2016-12-01_00:00:01.log-rw-r--r--1rootroot31633512 Month 100:08 10.06.99.15_2016-12-01_00:00:01.log-rw-r--r--1rootroot37729512 month 100:0810.06.99.01_2016-12-01_00:00:01.log Cisco devices because for a two password, you can modify the script to pass more than one password parameter, and change the corresponding command to Cisco's command.This article is from the "Speed of Light" blog, be sure to keep this
vswitch. The method to increase the bandwidth is effective when the connection between a single switch and a node cannot meet the load.
The main function of TRUNK is to bind multiple physical ports to a logical channel, which works like a channel. After multiple physical links are bound together, not only the bandwidth of the entire network is increased, but the data can also be
The transmission of multiple bound physical links has the function of li
again.
Diagnostic comments
This fault is caused by a switch problem. During daytime work, the switch will be in a state of great time delay and change the transmission path of the switch to the Protocol. From the performance of the fault and the analysis of some STP/HSRP protocols monitored by OptiView, A vswitch with poor c
Catalyst Switch Security ConfigurationThe security configuration of the Catalyst switch is to prevent potential network security risks. We recommend that you take the following measures on each cisco device: 1. use enable secret to configure a strong password. Select a password that includes letters, numbers, and speci
Old version of the software use instructions:
Support Switch, Hua San, cisco (Ruijie) switches need to configure Vty to allow Telnet.
How to use:
The first step to enter the switch two password, "T password" for the vty password, is telnet up the first password. "s password" is Huasan's super password, or Cisco's enable password
The second step is to select t
3.12 layer-3 Switching
Purpose:
1. master the basic configurations of layer-3 switching for inter-VLAN communication.
2. Understand the implementation principle of layer-3 switching.
Tutorial topology:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131227/062203O08-0.png "title =" 3.12.png "/>
Tutorial steps:
1. Deploy the Trunk link between SW1 and SW2 Based on the topology shown in the figure. The configuration is as follows:
I. CAT4006 engine module WS-X4013 configuration listThese include: Basic settings, VLAN configuration, Channel configuration, and port Image Port 1/2 to connect to gigabit IDS)
Cisco Systems, Inc. Console
Enter password:CAT4006> enable
Enter password:CAT4006> (enable)....................................................
En
Conf t
Hostname SW1
Username CCNA Password CCNA
No IP domain-lookup
Service Password-encryption
Enable Secret Cisco
Line con 0
Login Local
Logging synchronous
Exec-timeout 0 0
Line vty 0 4
Login Local
Logging synchronous
Exec-timeout 0 0
int VLAN 1
IP addr 192.168.1.1 255.255.255.0
No shut
IP Default-gateway 192.168.1.254
Show run
Copy Run start
Swit
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.