information in other storage regions
The previously introduced method of sending log information to the line has a drawback. If we do not see the screen output of the connection line, the message is rolled over the screen and exceeds the historical cache of the terminal software, then we will not be able to see the lost messages. To avoid this problem, we often send log information to other storage areas, including the internal cache of the device, the system log server, and the SNMP Management
password. this is the default password of all cisco routers. we need to change it right now. use this one:
Username cisco privilege 15 secret 5 cisco
Config the E1 PRI card
There is the T1/E1 card delivered with the router. We plugged the card into the number 0 slot of the router, attach the PRI cable to the E1 card,
When we want to perform permission rating management on a Cisco router or switch, it is often necessary to assign different levels of users a command that exceeds the default settings, such as show run, which is the most basic troubleshooting command.However, the command cannot be executed when your user level is at 0-14. You can assign permissions to these users
One, Cisco Discovery Protocol (CDP)The Cisco Discovery Protocol (Cdp,cisco Discovery Protocol) enables the collection of hardware and protocol information for adjacent devices for troubleshooting and network judgment.1. Get CDP timer and hold time informationR0#show CDP #查看整个路由器的CDP信息R0#sh CDP Interface #查看每个接口的路由信息2. Set CDP timeR0 #cdp Time 60R0#CDP Holdtime 18
Correctly Save the. config file generated by the compiled kernel-use make savedefconfig
Correctly Save the. config file generated by the compiled kernel-use make savedefconfig
The. config file generated by the kernel has been saved and compiled by cp.
Correctly Save the. config file generated by the compiled kernel-use make savedefconfig
The. config file generated by the kernel has been saved and compiled by CP. config ARCH/ARM/configs/xxx_defconfig. But this is actually an incorrect method. Let me explain the cause.
I have never cared about this problem until I e
that you need a user and a password to gain access. In addition, we recommend that you use a secret password for your username, instead of a common password. It uses MD5 encryption to encrypt passwords, and greatly improves security. Example: Router (config) # username root secret My $ Password
After the user name is configured, you must enable the port using the user name. Example:◆ Router (config) # line
A major part of enterprise security policy is to implement and maintain firewalls, so firewalls play an important role in the implementation of network security. Firewalls are typically located on the edge of the corporate network, which isolates the internal network from the Internet, or with other external networks, and restricts network visits to protect the internal network of the enterprise. The purpose of setting up a firewall is to establish a unique channel between the intranet and the e
I. vro Network Service Security Configuration1. disable CDP (Cisco Discovery Protocol ). For example:Router (Config) # no cdp runRouter (Config-if) # no cdp enable2. Disable other TCP and UDP Small services.Router (Config) # no service tcp-small-serversRouter (Config) # no s
1.1 Experimental purposes:
Learn to use TFTP Server.
1.2 Experimental contents
• Understand the meaning of TFTP server;
L Learn how to use TFTP server to save configuration files such as Flash and startup-config on the router;
L Learn how to load a saved configuration file via a TFTP server;
1.3 Experiment Steps:
Follow the instructions below to connect the network device
1, first we need to have
Vswitches need to be configured for the recently merged server link set...
I have never obtained a vswitch before. I want to sell it now...
Generally, the vswitch supports telnet. If you have configured an ip address, you can directly telnet the vswitch. If you do not have any configuration, you need to use the Serial port. Choose Serial for the Serial port...
Fortunately, we support all the omnipotent putty tools. If you use a tool, you can also choose Secure CRT...
Enter the password after l
In Cisco command configuration tip 1, we talked about using the Range Command to simplify our configuration.
However, if we often operate on a group of discontinuous ports
Such as interface-range fa1/1, fa1/3, fa1/5, fa1/7, fa1/11
Even using the Range Command is cumbersome.
We always think that the simpler
displayed. Some people think that this Cisco router mode is useless because configuration changes cannot be made in this mode, and users cannot view any important information. 2. Privileged mode router # administrators can view and change configurations in this mode. I believe that it is absolutely important to have a set of passwords at this level. To switch from user mode to privileged mode, the administrator needs to enter the enabel
Cisco router ip nat command ip natip nat inside destination ip nat inside source list ip nat inside source static ip nat outside source list ip nat outside source static ip nat pool ip nat translation ip nat Syntax: ip nat {inside | outside} no ip nat {inside | outside} this command is used to set the Intranet and Internet interfaces for applying NAT. Use the no
Which command standard do you want Cisco to use on each vro? Each administrator configures the commands of each vro correctly. The ten commands in this article are what I think you should configure on each vro, with no special order.
1. configure a Logon account on the vro
I strongly recommend that you configure a real user name and password account on the vro and vswitch. This means that you need a user an
You have used quick dialing settings on your mobile phone. Does a Cisco device Support Command shortcut key definition? The answer is yes. Suzhouxiaoniu(Config) # Alias exec XX show IP inter BRIXX is the custom shortcut key name, which can be a number Suzhouxiaoniu # Xx Finalize the name directly Interface IP-address OK? Method Status ProtocolFastethernet
Cisco configuration Mode utility command line (switch for model):Enable--> enter privileged mode; switch#disable--> return to user mode; switch>Configure terminal--> into global configuration mode; Switch (config) #Exit--> exit;No IP domain lookup off the domain name query function;Command Help system:? , you can list
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.