protocol between as is called the External Gateway Protocol External Gateway Protocol (also called Inter-Domain routing protocol): there are two types of inter-domain routing protocols: externalGateway Protocol (EGP) and Border Gateway Protocol (BGP)2) Dynamic routing according to the algorithm can be divided into: Distance vector
Tags: HSRP working principle STP effect ACL access control List loop storm Cisco private protocolDay 031. What is HSRP? How does it work?HSRP: Hot Standby Routing protocolHSRP is a Cisco private protocol that ensures that user communication can be quickly and transparently restored when a network edge device or access link fails.This provides redundant rows for t
Tags: routing switching technology HSRP working principle three-layer Exchange STP function DHCP serviceFirst, the questionDay 011. What is a Vlan? What does VLAN do? is the interface of the default switch in that VLAN? What kind of Vlan??2. What is Trunk? What is the mode of Trunk? How to negotiate?3. What is the role of EtherChannel?4. What is DHCP? What is the role of DHCP?Day 021. What is the three laye
Day 051. What is NAT? What are the implementation methods?NAT (Network address translation): By translating the private IP address of the internal network into the world's only public IP address, the internal network canTo connect to an external network such as the Internet.How NAT is implemented:The corresponding relationship of the IP address is one-to-one, and is constant, with the help of the static transformation, it can realize some specific service in the external network.Access to the se
(All of the following is the hand of pure hand, there are flaws in the place, please also contain a lot of information to send piglets to exchange!) ）(All content and annotations in this article are displayed in the recursive architecture, because the format display does not understand the point of understanding!) ）(In this paper, the command keyword is mostly used shorthand, if there is an unknown, it is best to type the command when you use TAB completion!) ）
address, the internal network canTo connect to an external network such as the Internet.How NAT is implemented:The corresponding relationship of the IP address is one-to-one, and is constant, with the help of the static transformation, it can realize some specific service in the external network.Access to the service provider.Dynamic conversion: The correspondence between IP addresses is indeterminate, but random, and all private addresses authorized to access the Internet can be randomlyConver
config , keep it , and the rest are copied to running config the. CLI the shortcut:650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M02/83/AB/wKiom1d6BhPy4UFHAADbzvWWcMg895.png-wh_500x0-wm_3 -wmp_4-s_3121356343.png "title=" QQ20160704144520---3.png "alt=" Wkiom1d6bhpy4ufhaadbzvwwcmg895.png-wh_50 "/>f0/0 indicates that the 0 on the board card 0 number interface. The router plugged in to the electrical interface is Down , and the interface of the switch is plugged in up the. is the interf
Remote control routerThe setup diagram is as followsConfigurationRouter>enable Entering privileged modeRouter#conf t into global configuration modeRouter (config) #interface g0/0 access interfaceRouter (config-if) #int G0/1Router (config-if) #ip address 192.168.1.254 255.255.255.0Router (config-if) #no shutdownRouter (config-if) #exitRouter (config) #line vty 0 2 Set the number of remote connection terminalsRouter (config-line) #password 123 Setting the remote connection passwordRouter (Config-l
After the new switch is bought, all need to be simple configuration to meet the unit network operation, after the configuration of the device will need to put it where it should be placed, but in the future we need to view or modify this device, we need to use remote login to configure it. Let's talk about the specific configuration of remote login.First, you need to use a dedicated configuration line (console line) to connect the deviceSecond, configure the line of another section of the connec
. the fully-switched campus network adapts to the new traffic model and completely overcomes the router bottleneck of the traditional network, this greatly improves network efficiency. At the same time, vrouters are not unemployed and are still used for remote connections and dial-up access.
The first part of this article reviews the layered structure of the network. Next we will talk about the principles of traditional routing and
As a network manager, it is the most common task to configure commands on routers and switches. The purpose is to execute commands and adjust parameters, allows routers and switches to run as required by network administrators. This is almost the operation performed by the network administrator every day. Which of the following methods can be used to manage network devices? Which one is simpler and which one is more efficient? This is mainly based on the actual use of the network administrator.
traffic model. As a result, routers gradually become network bottlenecks.
To solve this problem technically, the network vendor has developed a layer-3 Switch, also known as a route switch. It is a combination of the performance of traditional switches and the intelligence of routers. The route selection is still completed by the vro, but the routing result is retained by the vswitch in its own route cache. In this way, the first data packet in a dat
the router bottleneck of the traditional network, this greatly improves network efficiency. At the same time, vrouters are not unemployed and are still used for remote connections and dial-up access.
The first part of this article reviews the layered structure of the network. Next we will talk about the principles of traditional routing and switching, finally, it introduces how to combine the advantages of
CISCO PT Simulation Experiment (9) Inter-VLAN routing for layer three switchesExperimental Purpose : Mastering the configuration of the switch Tag VLANMastering the configuration method of three-layer switch VLAN routingInter-VLAN communication via three-layer switchExperimental Background :The Company's finance department and sales department are in different offices, in order to secure and facilitate mana
interface is:IP policy Route-map Map-tag
Enable Fast-switched PBR
Prior to Cisco IOS Release 12.0, Policy routing can only forward packets through process forwarding, so that packet forwarding efficiency is very low, and on different platforms, it is basically 1000 to 10,000 packets per second. With the advent of cache forwarding technology, Cisco realizes the
Cisco single-ARM routing configuration
One-arm routing, which is to set up multiple logical subinterfaces on the router, one VLAN for each sub-interface. The data on each sub-interface is passed on the physical link to be labeled encapsulated. Cisco devices support ISL and 802.1q (dot1q) protocols. Huawei only support
Cisco single-ARM routing configurationOne-arm routing, which is to set up multiple logical subinterfaces on the router, one VLAN for each sub-interface. The data on each sub-interface is passed on the physical link to be labeled encapsulated. Cisco devices support ISL and 802.1q (dot1q) protocols. Huawei only supports
the following rich features:(1) Non-blocking line rate switching and routing for all network interfaces and protocols on all ports;(2) with a very high throughput, the packet forwarding speed is packet forwarding/per second, pps) is usually 10 ~ faster than the high-end router ~ 100 times;(3) Multiple protocol routing options, such as ipr1_1/v2, OSPF), IP Multic
Two methods for communication between different VLANs (single-arm routing and layer-3 Switching)Test environment: Third data center, second floor, east suburbInvestigational device: Catalyst 2950-24 (SW3)Cisco 2611 (R2)Catalyst 3750 SERIES (with two SD interfaces, S8----SW-2L)Real machine (PC5, PC6 ).Objective::1. Communication between different VLANs through sin
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
and provide relevant evidence. A staff member will contact you within 5 working days.