1. Commands supported by the switch:
Switch Basic Status:
Switch:; ROM state, router is rommon>
hostname>; user mode
hostname#; privileged mode
Hostname (config) #; global configuration mode
Hostname (CONFIG-IF) #; interface State
Switch Password settings:
switch>enable; access to privileged mode
Switch#config terminal; Enter global configuration mode
Switch (config) #hostname;
Switch (config) #enable secret xxx; set privileged encryption password
S
One
1.router (config) #router rip start RIP process
2.router (conifg-router) #network 172.17.0.0 The primary network that specifies the RIP protocol
3.router (config-router) #passive-interface F0/1 to configure F0/1 as passive
routers and switches are the basis of the entire network learning, whether you are the enterprise management of party A, or party B's network engineer, or is preparing to test Cisco, or Huawei such It certification of friends, all need to learn. So in the end should be how to better study, or master these knowledge, today I will come to you. :650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/80/50/wKiom1c9kxHyGtjWAACrNznAlNA086.jpg "title=" new Microsoft Office
This article introduces the whole WAN configuration process with specific operation examples, and introduces the configuration principles and implementation steps. We also introduced POF and FR technologies.
Synchronous Serial Interface
1. This section describes the similarities between E1, T1, and T3.
Router # config t
Router (config) # controller e1 1
Router (c
When using the LAN router configuration method, the LAN router configuration method is often optimized, as well as the WAN port connecting to the wireless router and related problems. Here we will introduce the solutions to many problems involved.
Summary: Lan router configuration methods
With the popularity of wireles
Network Transmission of some key business data of some enterprises or organizations requires high reliability of network equipment and convenient maintenance.
There are multiple backup technologies for Cisco routers. Here we will introduce the router's own backup technology and line backup technology.
Generally, a router is a bridge between a LAN and a wan.
The so-called router's own backup technology is designed to solve a router's own hardwa
There are multiple backup technologies for Cisco routers. Here we will introduce the router's own backup technology and line backup technology.
Generally, a router is a bridge between a LAN and a wan.
The so-called router's own backup technology is designed to solve a router's own hardware (such as memory, CPU) or software IOS fault or local port fault, network breakdown caused by the failure of the port or line of the connected local area device.
Th
Many junior network administrators ignore security settings when using Cisco routers, and the following three are ideal for novice users to configure network security when using Cisco routers.
One, the security configuration of the router "access control"
1, the administrator who can access the router is strictly controlled. Any maintenance needs to be documented.
2, the
For the Cisco router security configuration command family, the following are 10 configuration commands, which are expected to be good for everyone. When talking about configuring a new Cisco router, most configurations depend on the type of the router and the purpose of the service. However, each administrator has his/her own command list for configuring each
If a Cisco Wireless Router is improperly configured, problems such as disconnection and disconnection may occur. It is very important for us to have a deep understanding of the details in Cisco wireless router configuration. Next we will introduce the relevant knowledge in detail.
As we all know, wireless signals are the carriers of data transmission, which means that the stability of wireless networks has
A home broadband router is a broadband router with a smaller number of users, such as a 4LAN-port router, which allows 4 computers to surf the internet at the same time. If a home/dormitory/small office has multiple computers that need to be connected to the Internet at the same time, using a router to form a small loc
Broadband routers are still commonly used. So I have studied the optimization techniques of broadband routers. I will share them with you here and hope they will be useful to you. Surfing the Internet makes it necessary for us to deal with broadband routers, But we seldom look at it during our use.
Even if the network is faulty, few believe that these faults are related to routers. In fact, a vro is the same as other network devices. When we set or maintain the
At present, broadband routers are widely used. Here we will mainly explain the optimization technology of broadband routers and surfing the Internet, so we will inevitably deal with broadband routers, but in our use process, I seldom look at it, even if the network is faulty. Few believe that these faults are related to routers.
In fact, a vro is the same as other network devices. When we set or maintain the router improperly, it may encounter various
In today's information society, people are increasingly demanding data communication. As the core equipment of the IP network, vro has become a key technology in the information industry.Vro A router is a packet forwarding device that works at the network layer of the OSI reference model. The router forwards data packets to achieve network interconnection. Although routers support multiple protocols, such a
Wireless Router fault description
In practical applications, many users directly use the ADSL-related information after purchasing a wireless router. The following problems may occur:
"I use a wireless router to share the Internet. The speed is fast and slow !"
"My laptop is only 10 meters away from the wireless router
What does router hijacking mean?
Router hijacking, usually refers to the wireless network in the radio router, other users by cracking the wireless network password, thereby connecting to your wireless network, and then through the login router management interface to control the entire wireless network.
In layman's
1, connect the router to the external network
Step one: Connect a good line
In the absence of a router, we are directly connected to the Internet through the computer to connect broadband, so now to use the router to share broadband Internet access, of course, the first to use the router to directly connect broadband
Router is the bridge of computer network, is the core device of connecting IP network. It can not only connect different networks, but also choose the path of data transmission, and can block illegal access. Routers are data packet forwarding devices that work in the third layer of the OSI Reference Model-the network layer, and routers implement network interconnection by forwarding packets. For beginners, routers are not easy to configure. This paper
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.