China Mobile's GPRS network uses the APN method to connect to the GPRS device terminal and communicate with the server through the APN. The customer purchased the Cisco 2811 router, and the mobile company needed to pull the optical fiber through the E1 port, I spent more than 1000 RMB with an E1 module. mobile companies are doing very poorly, and optical fiber connectors are not provided at all. I also boug
The user checks network security and requires SSH logon to the core device. Previously, the device used Telnet logon, and the user name and password are transmitted in plaintext, which does not meet the security check requirements.
In fact, the SSH login configuration is very simple, mainly divided into the following steps:
1. Configure the Domain Name
Sd_core_r7600 (config) # IP domain-name sdcore
2. gener
How to Set Up r12002 routing protocol for Cisco router 3620 to demonstrate how to set up r12002 routing protocol for Cisco router 3620 this time, we need to build a complex network experimental environment, this environment is also the experimental environment used later to learn about other
When I got up this morning to go to the forum, I saw a post. Ask how to solve the following problem?
A Cisco three-tier switch divides 3 VLANsVLAN 2:IP 192.168.1.1 255.255.255.0 192.168.1.254 Network SegmentVLAN 3:IP 192.168.2.1 255.255.255.0 192.168.2.254VLAN 4 IP 192.168.3.1 255.255.255.0 192.168.3.254Each VLAN can communicate with each other.Now add 1 Cisco routes to achieve shared Internet accessCisco
Security management for Cisco routers includes creating passwords to secure access to Cisco routers, and using the correct access table to manage acceptable data streams through Cisco routers.
1. Password Management
The following command sets the password for controlling access from the terminal.
Command operation resultLine
not encrypted during network transmission, strict control is required. For example, set a strong password, control the number of concurrent connections, strictly control the access address using the access list, and set user access control using AAA.8. We recommend that you use FTP instead of TFTP for iOS upgrade and backup and configuration file backup. For example:Router (config) # ip ftp Username blushinRouter (config) # ip ftp password 4tppa55w0rdRouter # copy startup-config ftp:9. Upgrade
You can configure a serial interface through a virtual terminal. to configure a serial interface, follow these steps:
1. In Global mode, enter the command "interface serial 0" to enter the serial interface configuration mode.
2. Each connected serial interface must have an IP address and subnet mask to forward IP packets, in interface configuration mode, enter the "ip address
3. If the serial interface is
First, give an environment:Cisco router Intranet interface s1/0: 192.168.1.1 255.255.255.0Internet interface s1/1: 10.0.0.1 255.255.255.0Server ip Address: 192.168.1.100First telnet to the vrotelnet:User Access Verification
Username: cisco # enter the user namePassword: # enter the PasswordRouter> en # Enter privileged ModePassword: # enter the privileged mode PasswordRouter # conf t # enter global configur
Use the home ADSL line and use the CISCO router to build the PPPoe Server so that the PC can access www.2cto.com R1 (config-if) # do sh runBuilding configuration... Current configuration: 1470 bytes! Version 12.4 service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption! Hostname R1! Boot-start-markerboot-end-marker !! No aaa new-modelmemory-size iomem 5 !! Ip
When a Cisco router forgets or loses the enable password, there are two methods to restore it, depending on the series of products you are using.Method 1Steps:1. Connect a terminal or a PC with simulation terminal software installed on the console port of the router.The default register value is 0x2102. The value ranges from the third digit to the left. If it is
When the iOS corruption in router needs to be restored, Ctrl+break (Packettrace is CTRL + C) When the router starts, enters Rommon mode, and the command prompt changes to: Rommon 1>Then enter the following command:Rommon 1>IP_ADDRESS=A.B.C.D//router's current IP addressRommon Subnet mask for 2>ip_subnet_mask:x.x.x.x//routerRommon 3>default_gateway=y.y.y.y//
Preparation: A computer runs the terminal Simulation Program (Super Terminal can be started in Windows 95/98), and the microcomputer serial port (COM1/COM2) is connected to the Console port through the configuration line randomly assigned by Cisco.Recovery steps:(1) Start the instance, press Ctrl + Break until the prompt appears.(2) enter the command "> o/r 0x142 ".(3) initialize the vro: "> I ".(4) Restart
, only ping and telnet servers are allowed. Therefore, icmp and telnet protocols must be matched.Class-map type inspect match-any pri-to-dmzMatch protocol icmpMatch protocol telnetThe last is the policy for accessing the DMZ server through the Internet. Only the ssh server can be pinged as required, so the icmp and ssh protocols should be matched.Class-map type inspect match-any int-to-dmzMatch protocol sshMatch protocol icmpStep 4:Create policy-map and apply the policy you just created.ZFW poli
Cisco router reset enable password tutorial, ciscoenable
Steps:
1. Restart the vro and press ctrl + Breack when ROM Monitor mode appears on the vro to enter ROM mode, for example:
2. Modify the vro register value, change the original register value 0x2102 to 0x2124, and then run the reset command to restart the device, for example:
3. After the password is changed, the value of the drop register
In this experiment, the speed limiting device of a Cisco router is completed by a Cisco2811 router. In this experiment, we will first look at the flash: www.2cto.com yourname # dirDirectory of flash on the router
, dynamic address translation, and multiplexing dynamic address translation. The following example uses a Cisco router.1. Static address translationStatic address translation performs one-to-one conversion between the internal local address and the internal legal address, and specifies the legal address to which the conversion is required. If there are WWW servers or FTP servers
customized within a Network as needed without application. In the network, computers communicate through internal IP addresses. When the internal computer needs to communicate with the external internet, the device with the NAT Function (such as a router) converts an internal IP address to a valid IP address (that is, the requested IP address) for communication.
2. NAT application environment
Scena
inspect match-any pri-to-dmzMatch protocol icmpMatch protocol telnetThe last is the policy for accessing the DMZ server through the Internet. Only the ssh server can be pinged as required, so the icmp and ssh protocols should be matched.Class-map type inspect match-any int-to-dmzMatch protocol sshMatch protocol icmpStep 4:Create policy-map and apply the policy you just created.ZFW policies include pass, drop, and inspect. Drop is the default action, and inspect is the traffic review. The return
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.