There may be two reasons for this situation:
One is the browser problem I change the browser or the following to clear the cache, the other is the password modified is not the original admin password we may restore factory settings.
Solution One
1. To solve the browser problem first we open it, then click "Tools" on the menu and click "Internet Options" in the dropdown below.
2. Furthermore, we click on "Internet Options"--click "General"--"Dele
; Note that the enable password and vty password can only be connected by the pc telnet we use PC to telnet router and of course we're still using putty. on one router. telnet 650) this.width=650; "style=" Float:none; "title=" 3.JPG "src=" http://s2.51cto.com/wyfs02/M02/7D/2E/ Wkiom1bhajdaou-vaadbdumazkq095.jpg "alt=" wkiom1bhajdaou-vaadbdumazkq095.jpg "/> After landing the
When we use Telnet to log on to the device, the user name and password are transmitted in clear text, in order to ensure the security of the data, we recommend the use of SSH login device. The following is the configuration of the Cisco router SSH:1. Configuring hostname and Domain-nameR1 (config) #hostname R1R1 (config) #ip domain-name frame.com2. Generate the k
There are many things worth learning about in the configuration of a Cisco Wireless Router. Here we mainly introduce how to use a vro to set up a PC to share the Internet, including knowledge about DHCP, security, TCP/IP network protocols, and so on.
As a product designed specifically for broadband Internet sharing, a Broadband Router has the advantages of simple
? Because of these unreasonable settings, the wireless router is in an unstable state. Below, the author takes TP-LINKWR641G as an example, a comprehensive introduction to the wireless router settings.
How to configure a Cisco Wireless Router
Before configuring a wireless router
usually impossible for others to connect. The vro password must also be set, because even if you have set a wireless password, if someone has entered your route settings page, the password will be at a glance. Speaking of this, vro settings are almost the same. Of course, as a fully functional vro, some firewall access control functions are also essential, however, if you use these functions at home, you do not need to set them. However, if you want to restrict your children from accessing cert
Many junior network administrators ignore security settings when using Cisco routers, and the following three are ideal for novice users to configure network security when using Cisco routers.
One, the security configuration of the router "access control"
1, the administrator who can access the router is strictly con
that you need a user and a password to gain access. In addition, we recommend that you use a secret password for your username, instead of a common password. It uses MD5 encryption to encrypt passwords, and greatly improves security. Example: Router (config) # username root secret My $ Password
After the user name is configured, you must enable the port using the user name. Example:◆ Router (config) # line
The original Article is from BlackSun. It is translated in sleep hours. This is a very good article and I am very happy to share it with you!
Warning:
Do not use this to damage the cisco system or access the system illegally. This article is for the purpose of learning. It can only be used for legal actions and cannot damage any system. This article will show you step by step how to use the discovered defects to obtain illegal access. If you break int
Essential security commands for CISCO router initialization 1. Security Settings for vro Access Control 1. Strict control over the administrator who can access the vro. Record Filing is required for all maintenance tasks. Www.2cto.com 2. do not access the vro remotely. Even if you need to access the vro remotely, we recommend that you use the access control list and high-intensity password control. 3. Stric
Win7 Input Router admin address not responding to what's going on
The workaround is as follows:
1, the normal can open the management address of the router should be 192.168.1.1 that is to say you do not need to take you to the address before the WWW, if you are wrong in the browser's address bar input www.192.168.1.1 Such address, then it is not correct to e
One, the internal components of the Cisco routerIn order to configure, Cisco Internetwork and troubleshoot, we must first understand the major components of the Cisco routers and understand these componentsThe respective function.Table 7-1 gives a description of the major components of the Cisco
Cisco routers use many methods in configuration. Using SSH instead of Telnet cisco makes it easier for us to understand the configuration of cisco routers and other knowledge points.
Replacing Telnet with cisco router configuration using SSH The Telnet protocol is a member o
method is as follows:
◆ Access-list 10 permit 202.111_2.5◆ Ip http server◆ Ip http access-list 10
In client 202.112.162.5, use the web download tool wget to periodically collect and clear IP traffic. The method is as follows:◆ # Read IP traffic and store it in the outpu-packets webpage File◆ Wget -- http-user = admin -- http-passwd = cisco◆ Http: // cisco/exec/s
Recently changed jobs, the company more than 40 people share a 20M bandwidth wireless network, the router for Cisco R2911. Boss, let me make a cacti to monitor Cisco routed network card traffic. The whole days can not get the SNMP data, finally to the routing permission to find that the last operation to the routing SNMP service off, leaving the document written
Which command standard do you want Cisco to use on each vro? Each administrator configures the commands of each vro correctly. The ten commands in this article are what I think you should configure on each vro, with no special order.
1. configure a Logon account on the vro
I strongly recommend that you configure a real user name and password account on the vro and vswitch. This means that you need a user and a password to gain access.
In addition, we
1. Security Configuration of vro Access Control1. strictly control the administrator who can access the vro. Record Filing is required for any maintenance.2. do not access the vro remotely. Even if you need to access the vro remotely, we recommend that you use the access control list and high-intensity password control.3. Strictly control access to CON ports. Specific measures include:
A. if you can open the chassis, you can cut off the physical line connected to the CON port.B. You can
1. Security Configuration of vro Access Control
1. strictly control the administrator who can access the vro. Record Filing is required for any maintenance.
2. do not access the vro remotely. Even if you need to access the vro remotely, we recommend that you use the access control list and high-intensity password control.
3. Strictly control access to CON ports. Specific measures include:
A. if you can open the chassis, you can cut off the physical line connected to the CON port.B. You can chang
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.