Operating Cisco Router

Operating Cisco Router


consider the hardware on the ends of the serial link, in particular where the
channel service unit/data service unit (CSU/DSU) hardware resides on each end of
the serial link. It sits either outside the router as a separate device (as
shown on the left) or integrated into the router’s serial interface hardware (as
shown on the right). Most new installations today include the CSU/DSU in the
router’s serial interface.

ISR:Integrated Services Routers

CLI:show ip interface brief

         Show interface serial
0/0/0

WAN links can run at a wide variety of speeds. To deal with the wide range of
speeds, routers physically slave themselves to the speed as dictated by the
CSU/DSU through a process called clocking. As a result, routers can use serial
links without the need for additional configuration or autonegotiation to sense
the serial link’s speed. The CSU/DSU knows the speed, the CSU/DSU sends clock
pulses over the cable to the router, and the router reacts to the clocking
signal.

The clock rate command is not needed on real serial links,
because the CSU/DSU provides the clocking. Without any real CSU/DSUs on the
link, the router with the DCE cable must supply that clocking function, and the
clock rate command tells the router to provide it.

Router Auxiliary(Aux) Port

While both routers and switches have a console port to allow administrative
access, routers have an extra physical port called an auxiliary (Aux) port. The
Aux port typically serves as a means to make a phone call to connect into the
router to issue commands from the CLI.

The Aux port works like the console line, except that the Aux port is
typically connected through a cable to an external analog modem, which in turn
connects to a phone line. Then, the engineer uses a PC, terminal emulator, and
modem to call the remote router. After being connected, the engineer can use the
terminal emulator to access the router CLI, starting in user mode as usual.

Aux ports can be configured beginning with the line aux 0 command to reach
aux line configuration mode.

PS:

one more command, the show version command, identifies a
large number of important base features about a router. It does list the IOS
version currently used by the router. However, it lists other important details
as well: how long the router has been running, why the IOS was last reloaded,
what file was used to load the IOS, and what interfaces are installed in the
router. It also lists details about the amounts of NVRAM, RAM, and flash memory
installed.

时间: 2024-08-07 14:11:44

Operating Cisco Router的相关文章

Cisco Router WEB管理

目前市场上很多思科路由器或者交换机都可以通过WEB方式配置.尽管很多功能还是只能通过CLI配置,但是一些功能还是很有用的,例如端口的流量监控功能 前期准备: 一.设备的IOS要支持WEB管理功能   Router(config)#ip http server      //如果这条命令可以用,说明IOS支持WEB管理 Router(config)#ip http secure-server      //如果这条命令可以用,说明你的IOS还支持HTTPS,安全连接   通过上面命令开启WEB管理

PPTP VPN在Cisco Router上的应用二:PPTP扩展实验

本文继续上一篇关于PPTP VPN的实验. 拓扑图依旧使用上次的拓扑,配置不变.读者需要在上一篇博文的基础上来阅读本文. 拓扑图如下: 本博文关于PPTP的实验包括以下内容: 实验1:基本的PPTP Server配置和Client配置(WinXP和Win7) 实验2:使用不加密的PPTP配置 实验3:使用PAP或CHAP认证的PPTP配置 实验4:PPTP问题1:TCP1723被阻止导致无法拨通 实验5:GRE防火墙检测和PAT转换问题 实验6:综合实验1:PPTP在实际工程的应用 实验7:综合

Telnet登入cisco router 1800

Login to Router and change to privileged modec:\>telnet 192.168.6.1Trying 192.168.6.1...Connected to 192.168.6.1.Escape character is '^]'.User Access VerificationUsername: adminPassword:MC1812>MC1812>enablePassword:MC1812#At privileged mode, chec

CISCO router 做VPN

NAT(config)#username velino password 0 123456      //设置用户名密码(vpn client连接后提示的用户名和密码)!NAT(config)#aaa new-model        //启用AAA认证!NAT(config)#aaa authentication login vpn-authen local     //设置AAA认证组vpn-authen为本地认证NAT(config)#crypto isakmp xauth timeout

实验L2TP VPN over Cisco Router

说明:拓扑图如下.R1模拟公司边界路由器,R3模拟远端用户的家用路由器,并分别在这两台路由器上启用PAT:R2模拟ISP,并启用一个Loopback接口来充当公网上的服务器:R4模拟公司内网的主机,来充当WEB服务器. 要求:1.在R1上配置L2TP VPN,使远端的C1能够拨号到该路由器,让C1可以直接使用私有地址来访问公司总部10.1.1.0/24和4.4.4.4/32. 服务器端配置命令: R1: conf t int e0/1  ip add 10.1.1.1 255.255.255.0

PPTP VPN在Cisco Router上的应用三:PPTP综合实验

本博文关于PPTP的实验包括以下内容: 实验1:基本的PPTP Server配置和Client配置(WinXP和Win7) 实验2:使用不加密的PPTP配置 实验3:使用PAP或CHAP认证的PPTP配置 实验4:PPTP问题1:TCP1723被阻止导致无法拨通 实验5:GRE防火墙检测和PAT转换问题 实验6:综合实验1:PPTP在实际工程的应用(结合radius实现多用户部署) 在实际项目工程中,如果做VPN的话,很少使用PPTP技术.思科的IPSEC和SSL VPN技术已经十分成熟和先进了

Cisco Router SSH配置

简单本地认证: (config)#username admin password cisco //建立用户admin密码为cisco的本地用户(默认权限等级为1) (config)#line vty 0 4 (config-line)#login local //调用本地认证 //以上方法配置之后,远程登录后默认进入的是用户模式">",需要提供en密码才能进入“#” (config)#username admin privilege 15 password cisco //建立权

PPPOE on cisco router

环境 R1-client-pppoe(f0/0)------(f0/1)r2-server-pppoe Server side: r2-server-pppoe(config)#username fuyi password fuyi r2-server-pppoe(config)#ip local pool PPPOEPOOL 12.1.1.10012.1.1.150 r2-server-pppoe(config)#interface virtual-template 1 r2-server-p

cisco Router专线路由器配置

因为公司服务器IP地址网段更改:172.20.1.0/24,原来为172.17.127.0/24,导致公司内部系统访问不了外网. 经过检查专线路由器缺少路由,需要在专线路由器上添加如下路由 ip route 172.20.1.0 255.255.255.0 20.16.0.1 wr 保存后还是ping不通 在电脑本地和路由器用tracert命令跟踪发现,本地的是到外网了 路由器到了中间公司(正常,因为接口地址,专线路由器对端没有回指路由) 从上图可以判断,核心交换机还需要添加路由 ip rout