
cisco
文章平均质量分 72
gotonet
这个作者很懒,什么都没留下…
展开
-
NAT中TCP负载均衡实验总结
转自:思科 思索 配置方法比较简单,只是需要注意被调用的ACL配置:环境:R2(s1)------(s1)R1(e0)-----(e0)R3R1上配置具体实验,R2测试发起telnet,R3被telnet1,如果使用非扩展访问列表,则将内部主机对外表现的内部全局地址作为ACL配置部分,如: access-list 1 permit 内部全局地址. 看测试的例子配置:原创 2006-10-29 11:00:00 · 935 阅读 · 0 评论 -
巧用IOS的begin、include、exclude
来自iwanthome总结在较新版本的 ios 中,在 show 后提供了 | 加 include/exclude/begin 的参数。巧用这个参数,可以较好的提高工作效率。 例如: 我想看路由部分的配置,通常你需要 sh run 然后翻页,比较繁琐。有了新命令后,你可以 sh run | b router ,这样会从 router 开始显示 没有网管软件,你想看目前端口的所有流量情况,通常你需要原创 2006-10-29 11:15:00 · 618 阅读 · 0 评论 -
远程TELNET的路由器启用NAGLE
John Nagle的算法(RFC896)可以减轻TCP协议在传送小包上的问题.如果没有配置service nagle命令,在远程登录进程钟每个字符都需要占用CPU中断.因此,一条诸如SHOW TECH的指令将产生大量的CPU中断,影响路由器的性能.从CISCO的观点来看,service nagle命令不仅优化了远程登录连接进程,而且还能减少路由器负担.在IOS中启动它的命令是:service n原创 2006-10-29 11:28:00 · 697 阅读 · 0 评论 -
服务质量Qos-Quality of service
1.服务质量中的基于策略的路由。500)this.width=500;" border="0" alt="" src="http://www.cublog.cn/u/18307/upfile/060818113302.jpg" />Qos-Quality of service服务质量* 流量分类 (traffic Classification ) -基于策略的路由(policy-ba转载 2006-10-29 11:30:00 · 1607 阅读 · 0 评论 -
AS5300语音网关配置
sh runBuilding configuration...Current configuration : 4905 bytes!version 12.2no service padno service timestamps debug uptimeno service timestamps log uptimeservice password-encryptionno service dhcp原创 2006-10-29 11:32:00 · 931 阅读 · 0 评论 -
Cisco’s QoS Device Manager
By Peter J. Welcher ***Dr. Peter J. Welcher (CCIE #1773, CCSI #94014) is a senior consultant with Chesapeake NetCraftsmen, a high-end consulting firm dedicated to quality and knowledge transfer. NetCr原创 2006-10-29 11:36:00 · 1214 阅读 · 1 评论 -
Configuring Secure Shell on Cisco IOS Routers
Hardware and Software Versions The information in this document is based on the software version below. Cisco IOS 3600 Software (C3640-IK9S-M), Version 12.2(2)T1 SSH was introduced into IOS plat转载 2006-10-29 11:37:00 · 546 阅读 · 0 评论 -
Cisco网站的CCIE R&S资源资源导航
CCIE R&S资源 笔试的大纲(BLUEPRINT): http://www.cisco.com/en/US/learn ... exam_blueprint.html BETA版本的笔试大纲: http://www.cisco.com/en/US/learn ... beta_blueprint.html 考试(笔试+LAB)所推荐的书籍列表: http://www.cisco.com/en/转载 2006-10-29 11:42:00 · 651 阅读 · 0 评论 -
Sample cisco NTP Configurations
EXAMPLE 1 ... clock timezone CST -6 clock summer-time CDT recurring ntp source eth 0 ntp peer ntp peer ntp peer ... EXAMPLE 2 ... ntp source Ethernet0/0 ntp update-calendar n原创 2006-10-29 11:50:00 · 479 阅读 · 0 评论 -
Cisco PPTP using 12.3
version 12.3service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname r3!aaa new-model!!aaa authentication ppp default localaaa authorization ne原创 2006-10-29 12:05:00 · 465 阅读 · 0 评论 -
Cisco路由器防止分布式拒绝服务攻击
1、使用 ip verfy unicast reverse-path 网络接口命令 这个功能检查每一个经过路由器的数据包。在路由器的CEF(Cisco Express Forwarding)表该数据包所到达网络接口的所有路由项中,如果没有该数据包源IP地址的路由,路由器将丢弃该数据包。例如,路由器接收到一个源IP地址为1.2.3.4的数据包,如果 CEF路由表中没有为IP地址1.2.3.4提供转载 2006-10-29 12:07:00 · 607 阅读 · 0 评论 -
Route Redistribution and TAGGing
Using Tagging to prevent the routing loop:router rip version 2 redistribute ospf metric 2 route-map RED_OSPF route-map RED_OSPF deny 10 match tag 1 route-map RED_OSPF permit 20 set tag 2 router ospf原创 2006-10-29 12:12:00 · 599 阅读 · 0 评论 -
auto-summary and ip summary-address rip comparison
Case1When auto-summary is enabled the output wasCode:Router2#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OS原创 2006-10-29 12:18:00 · 1507 阅读 · 0 评论 -
Configuring Context-Based Access Control
The branch office has this sample network configurationEthernet interface 0/0 supports the Human Resources department servers. This network includes an email (SMTP and POP3) host and a Windows NT se转载 2006-10-29 12:24:00 · 989 阅读 · 0 评论 -
2条ce1捆绑成一条4M的链路,做负载均衡
转载 2006-10-29 12:29:00 · 526 阅读 · 0 评论 -
帧中继DEBUG命令
帧中继的DEBUG命令有三个:DEBUG FRAME-RELAY ARP,DEBUG FRMAE-RELAY LMI和DEBUG FRMAE-RELAY PACKET。在特权用户模式下配置。 DEBUG FRAME-RELAY ARP打开INARP协议的调试信息,可以在配置终端上显示INARP报文的信息。用于查看INARP报文的收发情况。 DEBUG FRMAE-RELAY LMI打开原创 2006-10-29 12:30:00 · 577 阅读 · 0 评论 -
cisco show interface详解
Router#show interface e0/0 Ethernet0/0 is up, line protocol is down Hardware is AmdP2, address is 0009.4375.5e20 (bia 0009.4375.5e20) Internet address is 192.168.1.53/24 MTU 1500 bytes, BW 10000 Kbit,转载 2006-10-29 16:46:00 · 2737 阅读 · 0 评论 -
CISCO ADSL 配置详细过程
C2600+ADSL卡的配置:vpdn enable no vpdn logging ! vpdn-group pppoe request-dialin protocol pppoe ! interface FastEthernet0 ip address 192.168.0.1 255.255.255.0 ip nat inside ! interface ATM0 no ip addr原创 2006-10-29 16:48:00 · 1189 阅读 · 0 评论 -
Cisco路由器故障诊断技术
1 引言 作为网络工程师,在网络环境出现故障时,及时定位故障并解决故障是十分重要的。本文以CISCO路由式网络为基础,介绍使用诊断工具对Cisco路由器进行故障诊断的方法。限于篇幅,我们所介绍的内容和示例主要是基于IP报文的,基于IPX和Appletalk等协议的诊断技术与此类似。 2 路由器的功能特性和体系结构 在学习Cisco路由器上可使用的各种故障排除和诊断工具之前,了解路由器的基本体系结构转载 2006-10-29 16:49:00 · 1500 阅读 · 0 评论 -
CISCO路由器做桥接的实例
router#sh ru Building configuration... Current configuration: ! version 12.1 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname router! enable sec原创 2006-10-29 16:52:00 · 1580 阅读 · 0 评论 -
cisco l2tp LNS configure!(
vpdn enablevpdn multihopvpdn ip udp ignore checksum!vpdn-group 1! Default L2TP VPDN group accept-dialin protocol l2tp virtual-template 1 local name czyc lcp renegotiation always l2tp tunnel password原创 2006-10-29 16:52:00 · 1049 阅读 · 0 评论 -
TACACS+ and RADIUS Comparison
Introduction Two prominent security protocols used to control dial-up access into networks are Ciscos TACACS+ and Livingston Enterprises RADIUS. Cisco is committed to supporting both protocols with转载 2006-10-29 16:53:00 · 748 阅读 · 0 评论 -
Guide to Cisco Frame Relay Traffic Shaping
FRTS uses a mechanism called a Token Bucket.The Token Bucket regulates the amount of data that can be sent from the Frame Relay interface during a specific time period, 1/8th of a second by default.Da原创 2006-10-29 16:54:00 · 544 阅读 · 0 评论 -
Password Recovery for Catalyst Switches
通过终端或带有仿真终端程序(比如 Hyper Terminal)的 PC,连接到交换机的 console 口.Password Recovery for Catalyst 2900/3500XL 拔下交换机的电源线,然后按住交换机的 Mode 按钮,再重新插上交换机的电源线.直到端口 Port 1x 的 LED 熄灭之后释放 Mode 按钮.Password Recovery for C原创 2006-10-29 16:57:00 · 551 阅读 · 0 评论 -
Hot Standby Router Protocol
SLB-Switch(config-if)# standby [ group-number] ip [ ip-address [secondary]] SLB-Switch(config-if)# standby [ group-number] priority priority SLB-Switch(config-if)# standby [ group-number] timers h原创 2006-10-29 16:58:00 · 841 阅读 · 0 评论 -
3550 per-port-per-vlan traffic classify
class-map match-all testmatch ip precedence 5match access-group 101class-map match-all per-vlanmatch vlan 10match class-map testpolicy-map testclass per-vlanset cos 5interface FastEthernet0/6service-p原创 2006-10-29 17:05:00 · 583 阅读 · 0 评论 -
cisco 802.1X进行自动VLAN分配
设备环境: Cisco Catalyst 3550-24-EMI(IOS:12.1(22)EA1 EMI),Cisco Secure ACS v3.3 1、 PC机设置,操作系统为:windows XP 500)this.width=500;" border="0" alt="" src="http://www.cublog.cn/u/18307/upfile/060709191451原创 2006-10-29 17:06:00 · 1953 阅读 · 0 评论 -
Cisco CA using 12.3T - R3 is CA, R4 is CA client
version 12.3!hostname r3clock timezone EST -5clock summer-time EST recurringcrypto pki server ca-ciscoissuer-name CN=ca-cisco.test.com L=New York C=USgrant autolifetime crl 72lifetime ca-certificate 7原创 2006-10-29 17:15:00 · 970 阅读 · 0 评论 -
SSH using PIX 7.01
PIX Version 7.0(1) interface Ethernet0nameif outsidesecurity-level 0ip address 172.29.6.1 255.255.255.0 !interface Ethernet1nameif insidesecurity-level 100ip address 172.29.131.1 255.255.255.0 !enable原创 2006-10-29 17:16:00 · 460 阅读 · 0 评论 -
cisco radius configure
conf t ~UTp|,yC[} aaa new-model Wk*"+Gz aaa authentication login rad_auth radius o&1`nmF 8 aaa authentication login no_radius none ,,!/=I} enable secret cisco O4w|_*_ radius-server原创 2006-10-29 10:50:00 · 706 阅读 · 0 评论 -
4+2条命令搞定6500引擎 CatOS 转换为 NativeIOS
前提,准备好需要使用的Native IOS. 具体方法如下: 插好引擎,开机. 看到如下信息以后 System Bo otstrap, Version 12.2(18r)SX2, RELEASE SOFTWARE (fc1) Technical Sup port: ht tp:/ /w w w.cisco.com/techsup port Copyright (c) 20 04 by cisc原创 2006-10-29 10:54:00 · 2907 阅读 · 0 评论 -
配置ios ca server时需要注意的cdp-url问题
出自:蛋蛋和妞妞的家 经验之谈,现转之,以备偶遇此问题时借用之。 以前还是没有注意看文档,其实就是没有理解用证书认证的过程,具体咋回事,往下看吧。我原来的ios ca server是这样配置的crypto pki server R3database level completedatabase archive pem password 7 01100F175804575D72iss原创 2006-10-29 11:05:00 · 928 阅读 · 0 评论 -
使用思科路由器识别和跟踪数据包泛洪
介绍拒绝服务(DoS)攻击在互联网上非常普遍。应付此类攻击的第一个步骤是辨别该攻击究竟属于何种类型。很多常见DoS攻击是基于占用大量带宽的数据包泛洪或者其它重复的数据包流。 我们可以通过将很多DoS攻击流中的数据包与Cisco IOS软件的访问控制列表条目进行匹配,以隔离这些数据包。显而易见,这对过滤攻击非常有价值,并且能够帮助我们识别未知攻击,跟踪“欺骗”数据包流的真正来源。 某些时候,我们可将转载 2006-10-29 11:17:00 · 1902 阅读 · 0 评论 -
Improving Security on Cisco Routers
IntroductionThis document is an informal discussion of some Cisco configuration settings that network administrators should consider changing on their routers, especially on their border routers, in o原创 2006-10-29 11:18:00 · 781 阅读 · 0 评论 -
Monitoring DoS Attacks with the VIP Console
Monitoring DoS Attacks with the VIP Console and NetFlow v1.0By Rob Thomas, robt@cymru.comIntroductionDoS attacks have become almost ubiquitous. While these attacks are often easily and quickly mitig转载 2006-10-29 11:19:00 · 676 阅读 · 0 评论 -
关于EIGRP一些小问题的解答
转自:internet 作者不详 感觉挺有意思,便转之。EIGRP的metric是怎么定义的呢? EIGRP有哪些协议数据报文呢? EIGRP如何保证可靠性? 能说说DUAL有限状态机吗? 知道怎么配置EIGRP unequal-cost load-balancing吗? EIGRP在Frame-relay p2p,p2mp,hybrid环境下如何分配带宽呢? 能列转载 2006-10-29 11:21:00 · 713 阅读 · 0 评论 -
ipv6 6to4 tunnel config
R4----46.1.1.0/24---(e0/0)---R6---(e0/1)---56.1.1.0/24-----R6hostname r4ip cefipv6 unicast-routinginterface Tunnel0no ip addressno ip redirectsipv6 address 2002:2E01:104::4/128tunnel source Ethernet0/原创 2006-10-29 11:31:00 · 903 阅读 · 0 评论 -
Use a Static Route to the Null0 Interface for routing Loop
Introduction The Null interface is typically used for preventing routing loops. Enhanced Interior Gateway Routing Protocol (EIGRP), for instance, always creates a route to the Null0 interface when原创 2006-10-29 11:34:00 · 968 阅读 · 0 评论 -
设置Router阻击红色代码!
class-map match-any iissucks match protocol http url "*cmd.exe*" match protocol http url "*.ida*" match protocol http url "*root.exe*" match protocol http url "*mem_bin*" match protocol http url "*v原创 2006-10-29 11:35:00 · 487 阅读 · 0 评论 -
modem池配置
router>en router#config terminal router(config)# username xxx password xxxxx router(config)#username xxx password xxx router(config)#username xxxx password xxx router(config)#username xxx password xxx原创 2006-10-29 11:38:00 · 732 阅读 · 0 评论