Basic Router Configuration
|
|
|
- Dale Holmes
- 10 years ago
- Views:
Transcription
1 CHAPTER 3 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also describes the default configuration on startup. Interface Ports, page 3-2 Default Configuration, page 3-2 Information Needed for Configuration, page 3-4 Configuring Command-Line Access, page 3-5 Configuring Global Parameters, page 3-7 Configuring WAN Interfaces, page 3-7 Configuring the Fast Ethernet LAN Interfaces, page 3-16 Configuring the Wireless LAN Interface, page 3-16 Configuring a Loopback Interface, page 3-16 Configuring Static Routes, page 3-18 Configuring Dynamic Routes, page 3-19 Note Individual router models may not support every feature described in this guide. Features that are not supported by a particular router are indicated whenever possible. This chapter includes configuration examples and verification steps, as available. 3-1
2 Interface Ports Chapter 3 Interface Ports Table 3-1 lists the interfaces that are supported for each router and their associated port labels on the equipment. Table 3-1 Supported Interfaces and Associated Port Labels by Cisco Router Router Interface Port Label Cisco 880 Fast Ethernet LAN LAN, FE0 FE3 Wireless LAN (no label) Cisco 881, 881W, 881G, Fast Ethernet WAN WAN, FE4 881GW Cisco 886, 886W, 886G, ADSLoverISDN ADSLoPOTS 886GW Cisco 887, 887W ADSL2oPOTS WAN ADSLoPOTS Cisco 887V, 887VW, VDSL2oPOTS WAN VDSLoPOTS 887VG, 887VGW Cisco 888, 888W G.SHDSL WAN G.SHDSL Default Configuration When you first boot up your Cisco router, some basic configuration has already been performed. All of the LAN and WAN interfaces have been created, console and vty ports are configured, and the inside interface for Network Address Translation (NAT) has been assigned. Use the show running-config command to view the initial configuration, as shown in the following example for a Cisco 881W: Router# show running-config User Access Verification Password: Router> en Password: Router# show running-config Building configuration... Current configuration : 986 bytes version 12.4 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname Router boot-start-marker boot-end-marker enable secret 5 $1$g4y5$NxDeM.0hON6YA51bcfGvN1 enable password ciscocisco 3-2
3 Chapter 3 Default Configuration no aaa new-model no ip routing no ip cef multilink bundle-name authe archive log config hidekeys interface FastEthernet0 interface FastEthernet1 shutdown interface FastEthernet2 shutdown interface FastEthernet3 shutdown interface FastEthernet4 ip address no ip route-cache duplex auto speed auto interface Vlan1 no ip address no ip route-cache shutdown interface wlan-ap0 description Service Module interface to manage the embedded AP ip unnumbered Vlan1 no cdp enable arp timeout 0 ip route no ip http server no ip http secure-server control-plane 3-3
4 Information Needed for Configuration Chapter 3 line con 0 no modem enable line aux 0 line vty 0 4 password cisco login transport input telnet ssh scheduler max-task-time 5000 webvpn cef end Router# Information Needed for Configuration You need to gather some or all of the following information, depending on your planned network scenario, before configuring your network: If you are setting up an Internet connection, gather the following information: PPP client name that is assigned as your login name PPP authentication type: Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) PPP password to access your ISP account DNS server IP address and default gateways If you are setting up a connection to a corporate network, you and the network administrator must generate and share the following information for the WAN interfaces of the routers: PPP authentication type: CHAP or PAP PPP client name to access the router PPP password to access the router If you are setting up IP routing: Generate the addressing scheme for your IP network. Determine the IP routing parameter information, including IP address and ATM permanent virtual circuits (PVCs). These PVC parameters are typically virtual path identifier (VPI), virtual circuit identifier (VCI), and traffic-shaping parameters. Determine the number of PVCs that your service provider has given you, along with their VPIs and VCIs. For each PVC, determine the type of AAL5 encapsulation supported. It can be one of the following: AAL5SNAP This can be either routed RFC 1483 or bridged RFC For routed RFC 1483, the service provider must provide you with a static IP address. For bridged RFC 1483, you may use DHCP to obtain your IP address, or you may obtain a static IP address from your service provider. AAL5MUX PPP With this type of encapsulation, you need to determine the PPP-related configuration items. 3-4
5 Chapter 3 Configuring Command-Line Access If you plan to connect over an ADSL or G.SHDSL line: Order the appropriate line from your public telephone service provider. For ADSL lines Ensure that the ADSL signaling type is DMT (also known as ANSI T1.413) or DMT Issue 2. For G.SHDSL lines Verify that the G.SHDSL line conforms to the ITU G standard and supports Annex A (North America) or Annex B (Europe). After you have collected the appropriate information, you can perform a full configuration on your router, beginning with the tasks in the Configuring Command-Line Access section on page 3-5. To obtain or change software licenses, see Software Activation on Cisco Integrated Services Routers and Cisco Integrated Service Routers G2. Configuring Command-Line Access To configure parameters to control access to the router, follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. line [aux console tty vty] line-number 2. password password 3. login 4. exec-timeout minutes [seconds] 5. line [aux console tty vty] line-number 6. password password 7. login 8. end DETAILED STEPS Step 1 Step 2 Step 3 Command line [aux console tty vty] line-number Router(config)# line console 0 Router(config-line)# password password Router(config)# password 5dr4Hepw3 Router(config-line)# login Router(config-line)# login Router(config-line)# Purpose Enters line configuration mode, and specifies the type of line. This example specifies a console terminal for access. Specifies a unique password for the console terminal line. Enables password checking at terminal session login. 3-5
6 Configuring Command-Line Access Chapter 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command exec-timeout minutes [seconds] Router(config-line)# exec-timeout 5 30 Router(config-line)# line [aux console tty vty] line-number Router(config-line)# line vty 0 4 Router(config-line)# password password Router(config-line)# password aldf2ad1 Router(config-line)# login Router(config-line)# login Router(config-line)# end Router(config-line)# end Router# Purpose Sets the interval that the EXEC command interpreter waits until user input is detected. The default is 10 minutes. Optionally, add seconds to the interval value. This example shows a timeout of 5 minutes and 30 seconds. Entering a timeout of 0 0 specifies never to time out. Specifies a virtual terminal for remote console access. Specifies a unique password for the virtual terminal line. Enables password checking at the virtual terminal session login. Exits line configuration mode, and returns to privileged EXEC mode. Example The following configuration shows the command-line access commands. You do not need to input the commands marked default. These commands appear automatically in the configuration file generated when you use the show running-config command. line con 0 exec-timeout 10 0 password 4youreyesonly login transport input none (default) stopbits 1 (default) line vty 0 4 password secret login 3-6
7 Chapter 3 Configuring Global Parameters Configuring Global Parameters To configure selected global parameters for your router, follow these steps: SUMMARY STEPS 1. configure terminal 2. hostname name 3. enable secret password 4. no ip domain-lookup DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Command configure terminal Router> enable Router# configure terminal Router(config)# hostname name Router(config)# hostname Router Router(config)# enable secret password Router(config)# enable secret cr1ny5ho Router(config)# no ip domain-lookup Router(config)# no ip domain-lookup Router(config)# Purpose Enters global configuration mode, when using the console port. If you are connecting to the router using a remote terminal, use the following: telnet router name or address Login: login id Password: ********* Router> enable Specifies the name for the router. Specifies an encrypted password to prevent unauthorized access to the router. Disables the router from translating unfamiliar words (typos) into IP addresses. Configuring WAN Interfaces Configure the WAN interface for your router using one of the following as appropriate: Configuring a Fast Ethernet WAN Interface, page 3-8 Configuring a VDSL2 WAN Interface, page 3-8 Configuring ADSL or VDSL on Cisco Multi Mode 886VA and 887VA ISRs, page 3-9 Configuring ADSL Mode, page
8 Configuring WAN Interfaces Chapter 3 Configuring a Fast Ethernet WAN Interface To configure the Fast Ethernet interface on a Cisco 861 or 881 ISR, follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. interface type number 2. ip address ip-address mask 3. no shutdown 4. exit DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Command interface type number Router(config)# interface fastethernet 4 Router(config-if)# ip address ip-address mask Router(config-if)# ip address Router(config-if)# no shutdown Router(config-if)# no shutdown Router(config-if)# exit Router(config-if)# exit Router(config)# Purpose Enters the configuration mode for a Fast Ethernet WAN interface on the router. Sets the IP address and subnet mask for the specified Fast Ethernet interface. Enables the Ethernet interface, changing its state from administratively down to administratively up. Exits configuration mode for the Fast Ethernet interface and returns to global configuration mode. Configuring a VDSL2 WAN Interface The VDSL2 WAN interface is used on the Cisco 887V ISR platforms. Note The VDSL2 WAN interface uses Ethernet as the Layer 2 transport mechanism. To configure VDSL2 on the Cisco 887V ISR, follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. controller vdsl 0 2. interface type number 3-8
9 Chapter 3 Configuring WAN Interfaces 3. ip address ip-address mask 4. shutdown 5. no shutdown 6. exit DETAILED STEPS Command Step 1 controller vdsl 0 Step 2 Step 3 Step 4 Step 5 Step 6 Router# config t Router(config)# controller vdsl 0 interface type number Router(config)# interface ethernet 0 Router(config-if)# ip address ip-address mask Router(config-if)# ip address Router(config-if)# shutdown Router(config-if)# no shutdown Router(config-if)# no shutdown Router(config-if)# no shutdown Router(config-if)# exit Router(config-if)# exit Router(config)# Purpose Enters controller configuration mode and the controller number. Note There is no need to configure any VDSL2 parameters from the CPE side. Any specific VDSL2 settings should be set on the DSLAM side. Enters the configuration mode for Ethernet Layer 2 transport on the VDSL WAN interface on the router. Sets the IP address and subnet mask for the interface. Disables the interface, changing its state from administratively up to administratively down. Enables the interface, changing its state from administratively down to administratively up. Exits configuration mode and returns to global configuration mode. Configuring ADSL or VDSL on Cisco Multi Mode 886VA and 887VA ISRs The Cisco customer premise equipment (CPE) 886VA and 887VA Integrated Services Routers (ISRs) support asymmetric digital subscriber line (ADSL) 1/2/2+ and very high-speed digital subscriber line 2 (VDSL2) transmission modes, also called multi mode. The 886VA supports xdsl over ISDN and the 887VA supports xdsl over a plain old telephone system (POTS). The default CPE operating mode is auto. Auto mode means that the CPE trains up to the mode configured on the digital subscriber line access multiplexer (DSLAM), ADSL1/2/2+ or VDSL2. 3-9
10 Configuring WAN Interfaces Chapter 3 The following examples assume the DSLAM is configured in either ADSL2+ mode or VDSL2, and the CPE is configured in auto mode. Figure 3-1 shows an ATM WAN or Ethernet WAN network topography. Figure 3-1 Example Topology Note A DSLAM in Layer 1 mode may be configured for auto mode. A DSLAM in Layer 2 mode must be configured for ATM mode or packet transfer mode (PTM). Note Cisco 886VA and 887VA allow a maximum of four permanent virtual circuits (PVCs). Configuring ADSL Mode To configure ADSL mode, follow these tasks: Configuring ADSL Auto Mode, page 3-11 Configuring CPE and Peer for ADSL Mode, page 3-11 ADSL Configuration Example, page 3-13 Verifying ADSL Configuration, page 3-14 Verifying CPE to Peer Connection for ADSL, page
11 Chapter 3 Configuring WAN Interfaces Configuring ADSL Auto Mode To configure the DSL controller to auto mode, follow these steps, beginning in global configuration mode: Note Configure the DSLAM in ADSL 1/2//2+ mode prior to configuring the router. SUMMARY STEPS 1. controller vdsl slot 2. operating mode {auto adsl1 adsl2 adsl2+ vdsl2 ansl} 3. end DETAILED STEPS Step 1 Step 2 Step 3 Command controller vdsl slot Router (config) # Controller vdsl 0 operating mode {auto adsl1 adsl2 adsl2+ vdsl2 ansl} Router (config-controller) # operating mode auto end Router (config-conroller) # end Router Purpose Enters config mode for the VDSL controller. Configures the operating mode. The default is auto and is recommended. Exits the configuration mode and enters EXEC mode. When configured in auto, the operating mode does not appear in the show running command. Configuring CPE and Peer for ADSL Mode Configuring the ATM CPE Side When configuring for ADSL, the ATM main interface or ATM sub-interface must be configured with a PVC and an IP address. Perform a no shutdown command on the interface, if needed. To configure the ATM CPE side, follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. interface type number 2. no shutdown 3. interface atm0.1 point-to-point 3-11
12 Configuring WAN Interfaces Chapter 3 4. ip address ip-address mask 5. pvc [name] vpi/vci 6. protocol protocol {protocol-address [virtual-template] inarp} [[no] broadcast disable-check-subnet [no] enable-check-subnet] 7. end DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command interface type number Router (config) # interface atm0 no shutdown Router (config-if) # no shutdown Router (config-if) # interface atm0.1 point-to-point Router (config-if) # interface ATM0.1 point-to-point Router (config-subif) # ip address ip-address mask Router (config-subif)# ip address pvc [name] vpi/vci Router (config-subif) # pvc 13/32 Router (config-if-atm-vc) # protocol protocol {protocol-address [virtual-template] inarp} [[no] broadcast disable-check-subnet [no] enable-check-subnet] Router (config-if-atm-vc) # protocol ip broadcast end Router (config-if-atm-vc) # end Router # Purpose Enters configuration mode for the ATM WAN interface (ATM0). Enables the configuration changes to the ATM interface. Enables the ATM0.1 point-to-point interface. Enters IP address and subnet mask. Creates or assigns a name to an ATM PVC and enters the ATM virtual circuit configuration mode. Configures a static map for an ATM PVC. Exits the configuration mode and enters EXEC mode. 3-12
13 Chapter 3 Configuring WAN Interfaces ADSL Configuration Example The following example shows a typical ADSL2+ configuration set to auto mode. Outputs in bold are critical. Router# show running Building configuration... Current configuration : 1250 bytes Last configuration change at 02:07:09 UTC Tue Mar version 15.1 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname Router boot-start-marker boot-end-marker no aaa new-model memory-size iomem 10 ip source-route ip cef no ipv6 cef license udi pid CISCO887-V2-K9 sn FHK E license boot module c880-data level adviperservices vtp domain cisco vtp mode transparet controller VDSL 0 vlan 2-4 interface Ethernet 0 no ip address shutdown no fair-queue interface BRI0 no ip address encapsulation hdlc shutdown 3-13
14 Configuring WAN Interfaces Chapter 3 isdn termintation multidrop interface ATM0 no ip address no atm ilmi-keepalive interface ATM0.1 point-to-point ip address pvc 15/32 protocol ip broadcast interface FastEthernet0 interface FastEthernet1 interface FastEthernet2 interface FastEthernet3 interface Vlan1 no ip address ip forward-protocol nd no ip http server no ip http secure-server control-palne line con 0 no modem enable line aux 0 line vty 0 4 login transport input all exception data-corruption buffer truncate end Verifying ADSL Configuration Verify that the configuration is set properly by using the show controller vdsl 0 command in the privileged EXEC mode. Outputs in bold are critical. Router# show controller vdsl 0 Controller VDSL 0 is UP Daemon Status: Up XTU-R (DS) XTU-C (US) chip Vendor ID: BDM BDCM Chip Vendor Specific: 0x0000 0x6110 Chip Vendor Country: 0xB500 0xB
15 Chapter 3 Configuring WAN Interfaces Modem Vendor ID: csco BDCM Modem Vendor Specific: 0x4602 0x6110 Modem Vendor Country: 0xB500 0xB500 Serial Number Near: FHK E 887-V2-K 15.1(20100 Serial Number Far: Modem Version Nead: 15.1( :193435) [changahn Modem Version Far: 0x6110 Modem Status: TC Sync (Showtime) DSL Config Mode: AUTO Trained Mode: G (ADSL2+) Annex A TC Mode: ATM Selftest Result: 0x00 DELT configuration: disabled DELT state: not running Trellis: ON ON Line Attenuation: 1.0 db 1.4 db Signal Attenuation: 1.0 db 0.0 db Noise Margin: 6.8 db 13.6 db Atteinable Rate: kbits/s 1253 kbits/s Actual Power: 13.7 dbm 12.3 dbm Total FECS: 0 0 Total ES: 0 0 Total SES: 0 0 Total LOSS: 0 0 Total UAS: 0 0 Total LPRS: 0 0 Total LOFS: 0 0 Total LOLS: 0 0 Bit swap: Full inits: 32 Failed Full inits: 0 Short inits: 0 Failed short inits: 0 Firmware Source Filename (version) VDSL embedded VDSL_LINUX_DEV_ (1) Modem FW Version: Modem PHY Version: _ L.03.A2pv6C030f.d22j A2pv6C030f.d22j DS Channel1 DS Channel0 US Channel1 US channel0 Speed (kbps): Previous Speed: Total Cells: User Cells: Reed-solomon EC: CRC Errors: Header Errors: Interleave (ms): Actual INP: Training Log: Stopped Training Log Filename: flash:vdsllog.bin 3-15
16 Configuring the Fast Ethernet LAN Interfaces Chapter 3 Verifying CPE to Peer Connection for ADSL Ping the peer to confirm that CPE to peer configuration is setup correctly. Router# ping rep 20 Type escape sequence to abort. Sending 20, 100-byte ICMP Echos to , timeout is 2 seconds: Success rate is 100 percent (20/20), round-trip min/avg/max = 20/22/28 ms Router# Configuring the Fast Ethernet LAN Interfaces The Fast Ethernet LAN interfaces on your router are automatically configured as part of the default VLAN and are not configured with individual addresses. Access is provided through the VLAN. You may assign the interfaces to other VLANs. Configuring the Wireless LAN Interface The Cisco 880 series wireless routers have an integrated n module for wireless LAN connectivity. The router can then act as an access point in the local infrastructure. For more information about configuring a wireless connection, see the Basic Wireless Device Configuration section on page 4-1. Configuring a Loopback Interface The loopback interface acts as a placeholder for the static IP address and provides default routing information. To configure a loopback interface, follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. interface type number 2. ip address ip-address mask 3. exit 3-16
17 Chapter 3 Configuring a Loopback Interface DETAILED STEPS Step 1 Step 2 Step 3 Command interface type number Router(config)# interface Loopback 0 Router(config-if)# ip address ip-address mask Router(config-if)# ip address Router(config-if)# exit Router(config-if)# exit Router(config)# Purpose Enters configuration mode for the loopback interface. Sets the IP address and subnet mask for the loopback interface. Exits configuration mode for the loopback interface and returns to global configuration mode. Example The loopback interface in this sample configuration is used to support Network Address Translation (NAT) on the virtual-template interface. This configuration example shows the loopback interface configured on the Fast Ethernet interface with an IP address of /24, which acts as a static IP address. The loopback interface points back to virtual-template1, which has a negotiated IP address. interface loopback 0 ip address (static IP address) ip nat outside interface Virtual-Template1 ip unnumbered loopback0 no ip directed-broadcast ip nat outside Verifying Configuration To verify that you have properly configured the loopback interface, enter the show interface loopback command. You should see a verification output similar to the following example: Router# show interface loopback 0 Loopback0 is up, line protocol is up Hardware is Loopback Internet address is /24 MTU 1514 bytes, BW Kbit, DLY 5000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation LOOPBACK, loopback not set Last input never, output never, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue 0/0, 0 drops; input queue 0/75, 0 drops 3-17
18 Configuring Static Routes Chapter 3 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 output buffer failures, 0 output buffers swapped out Another way to verify the loopback interface is to ping it. Router# ping Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds: Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms Configuring Static Routes Static routes provide fixed routing paths through the network. They are manually configured on the router. If the network topology changes, the static route must be updated with a new route. Static routes are private routes unless they are redistributed by a routing protocol. To configure static routes, follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. ip route prefix mask {ip-address interface-type interface-number [ip-address]} 2. end DETAILED STEPS Step 1 Step 2 Command ip route prefix mask {ip-address interface-type interface-number [ip-address]} Router(config)# ip route Router(config)# end Router(config)# end Router# Purpose Specifies the static route for the IP packets. For details about this command and about additional parameters that can be set, see Cisco IOS IP Routing Protocols Command Reference. Exits router configuration mode and enters privileged EXEC mode. 3-18
19 Chapter 3 Configuring Dynamic Routes Example In the following configuration example, the static route sends out all IP packets with a destination IP address of and a subnet mask of on the Fast Ethernet interface to another device with an IP address of Specifically, the packets are sent to the configured PVC. You do not need to enter the command marked (default). This command appears automatically in the configuration file generated when you use the show running-config command. ip classless (default) ip route Verifying Configuration To verify that you have properly configured static routing, enter the show ip route command and look for static routes signified by the S. You should see a verification output similar to the following: Router# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set /24 is subnetted, 1 subnets C is directly connected, Loopback0 S* /0 is directly connected, FastEthernet0 Configuring Dynamic Routes In dynamic routing, the network protocol adjusts the path automatically, based on network traffic or topology. Changes in dynamic routes are shared with other routers in the network. The Cisco routers can use IP routing protocols, such as Routing Information Protocol (RIP) or Enhanced Interior Gateway Routing Protocol (EIGRP), to learn routes dynamically. You can configure either of these routing protocols on your router. Configuring Routing Information Protocol, page 3-20 Configuring Enhanced Interior Gateway Routing Protocol, page
20 Configuring Dynamic Routes Chapter 3 Configuring Routing Information Protocol To configure the RIP routing protocol on the router, follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. router rip 2. version {1 2} 3. network ip-address 4. no auto-summary 5. end DETAILED STEPS Step 1 Command router rip Router> configure terminal Router(config)# router rip Router(config-router)# Step 2 version {1 2} Task Enters router configuration mode, and enables RIP on the router. Specifies use of RIP version 1 or 2. Step 3 Step 4 Step 5 Router(config-router)# version 2 Router(config-router)# network ip-address Router(config-router)# network Router(config-router)# network Router(config-router)# no auto-summary Router(config-router)# no auto-summary Router(config-router)# end Router(config-router)# end Router# Specifies a list of networks on which RIP is to be applied, using the address of the network of each directly connected network. Disables automatic summarization of subnet routes into network-level routes. This allows subprefix routing information to pass across classful network boundaries. Exits router configuration mode and enters privileged EXEC mode. 3-20
21 Chapter 3 Configuring Dynamic Routes Example The following configuration example shows RIP version 2 enabled in IP network and To see this configuration, use the show running-config command from privileged EXEC mode. Router# show running-config router rip version 2 network network no auto-summary Verifying Configuration To verify that you have properly configured RIP, enter the show ip route command and look for RIP routes signified by R. You should see a verification output like in the following example: Router# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set C R /24 is subnetted, 1 subnets is directly connected, Loopback /8 [120/1] via , 00:00:02, Ethernet0/0 Configuring Enhanced Interior Gateway Routing Protocol To configure the Enhanced Interior Gateway Routing Protocol (EIGRP), follow these steps, beginning in global configuration mode: SUMMARY STEPS 1. router eigrp as-number 2. network ip-address 3. end 3-21
22 Configuring Dynamic Routes Chapter 3 DETAILED STEPS Step 1 Step 2 Step 3 Command router eigrp as-number Router(config)# router eigrp 109 Router(config)# network ip-address Router(config)# network Router(config)# network Router(config)# end Router(config-router)# end Router# Purpose Enters router configuration mode, and enables EIGRP on the router. The autonomous-system number identifies the route to other EIGRP routers and is used to tag the EIGRP information. Specifies a list of networks on which EIGRP is to be applied, using the IP address of the network of directly connected networks. Exits router configuration mode and enters privileged EXEC mode. Example The following configuration example shows the EIGRP routing protocol enabled in IP networks and The EIGRP autonomous system number is 109. To see this configuration, use the show running-config command, beginning in privileged EXEC mode. router eigrp 109 network network Verifying Configuration To verify that you have properly configured IP EIGRP, enter the show ip route command, and look for EIGRP routes indicated by D. You should see a verification output similar to the following: Router# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set C D /24 is subnetted, 1 subnets is directly connected, Loopback /8 [90/409600] via , 00:00:02, Ethernet0/0 3-22
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
Network Scenarios Pagina 1 di 35
Network Scenarios Pagina 1 di 35 Table of Contents Network Scenarios Cisco 827 s Network Connections Internet Access Scenarios Before You Configure Your Internet Access Network Replacing a Bridge or Modem
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel:
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
Configuring Dial Backup and Remote Management
13 CHAPTER Configuring Dial Backup and Remote Management The Cisco 800 series access routers support dial-in (for remote management) and dial-out (for dial backup) capabilities. By allowing you to configure
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
ADSL WAN Connections. Contents
7 ADSL WAN Connections Contents ADSL Overview................................................. 7-4 ADSL Technologies.......................................... 7-5 ADSL2 and ADSL2+: Enhancing Transmission
CISCO ROUTERLAR İLE ISDN BRI DATA HABERLEŞMESİ UYGULAMASI
CISCO ROUTERLAR İLE ISDN BRI DATA HABERLEŞMESİ UYGULAMASI Gökhan AKIN İTÜ 2003 TOPOLOJİ: İSTENENLER: 1. Topolojiyi Legacy DDR tekniği ile kurunuz. 2. Aynõ Topolojiyi Dialer Profile tekniğini kullanarak
Configuring Link Aggregation
10 CHAPTER This chapter describes how to configure link aggregation for the ML-Series cards, both EtherChannel and packet-over-sonet/sdh (POS) channel. For additional information about the Cisco IOS commands
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
Lab: Basic Router Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Def. Gateway R1 Fa0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 192.168.2.1 255.255.255.0 N/A R2 Fa0/0 192.168.3.1 255.255.255.0 N/A
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 R1 Serial 0/0/0 (DCE) 172.17.0.1 255.255.0.0 FastEthernet 0/0 172.16.0.1 255.255.0.0
Basic Software Configuration Using the Cisco IOS Command-Line Interface
Basic Software Configuration Using the Cisco IOS Command-Line Interface This document describes how to use the Cisco IOS command-line interface (CLI) to perform a basic software configuration for your
Brest. Backup : copy flash:ppe_brest1 running-config
Brest Backup : copy flash:ppe_brest1 running-config Cisco SF300-08 Mise en place des services : - Serveurs : 10.3.50.0/24 VLAN 2 (port 1) - DSI : 10.3.51.0/24 VLAN 3 (port 2) - Direction : 10.3.52.0/24
Deployment Guidelines for QoS Configuration in DSL Environment
White Paper Deployment Guidelines for QoS Configuration in DSL Environment Overview In the late 1980s, DSL technology was developed to provide higher-speed digital data transmission over local telephone
Welcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
Configuring InterVLAN Routing and ISL/802.1Q Trunking on Catalyst 2900XL/3500XL/2940/2950/2970 Series Switches Using an External Router
Configuring InterVLAN Routing and ISL/802.1Q Trunking on Catalyst 2900XL/3500XL/2940/2950/2970 Series Switches Using an External Router Document ID: 14976 Introduction Before You Begin Conventions Prerequisites
Lab 7-1 Configuring Switches for IP Telephony Support
Lab 7-1 Configuring Switches for IP Telephony Support Learning Objectives Configure auto QoS to support IP phones Configure CoS override for data frames Configure the distribution layer to trust access
CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0
Background For this lab, we will be analyzing some Wireshark capture files that were captured using the ARP Poisoning technique on Cisco VIOP (Voice Over IP) phones As this lab took special equipment (i.e.
co Sample Configurations for Cisco 7200 Broadband Aggreg
co Sample Configurations for Cisco 7200 Broadband Aggreg Table of Contents Sample Configurations for Cisco 7200 Broadband Aggregation...1 Introduction...1 Configurations...1 PPPoA Session Termination:
Chapter 2 Lab 2-2, EIGRP Load Balancing
Chapter 2 Lab 2-2, EIGRP Load Balancing Topology Objectives Background Review a basic EIGRP configuration. Explore the EIGRP topology table. Identify successors, feasible successors, and feasible distances.
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Topology Objectives Background Configure auto QoS to support IP phones. Configure CoS override for data frames. Configure the distribution
Simple MPLS network topology for Dynamips/Olive
Simple MPLS network topology for Dynamips/Olive R1 version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R1 boot-start-marker
CCNP2 - Implementing Secure Converged Wide-area Networks v5.0
2.6.11 - Configuring a DSL ATM Interface Figures and show the steps you use to configure a DSL ATM interface. Use the dsl operating-mode auto interface configuration command to specify that the router
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNP: Implementing
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
IOS NAT Load Balancing for Two ISP Connections
IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot
Course "Netzwerke" LAB 2 Basic Router Configuration
Course "Netzwerke" LAB 2 Basic Router Configuration Learning Objectives Review of previously learned skills. Basic IOS Command Line Interface operation. Basic Router configuration. Verification and testing
Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)
CNAP @ VCC 1 of 8 LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes) Objectives: Understand the function of a T1 Service Unit (TSU) in network telecommunications Connect routers
Frame Mode MPLS Implementation
CHAPTER 4 Frame Mode MPLS Implementation Lab 4-1: Configuring Frame Mode MPLS (4.5.1) In this lab, you learn how to do the following: Configure EIGRP on a router. Configure LDP on a router. Change the
APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4
APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing
Skills Assessment Student Training (Answer Key)
CCNA: Connecting Networks Skills Assessment Student Training (Answer Key) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Assessment
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
Table of Contents. Cisco DSL Router Configuration and Troubleshooting Guide
Table of Contents...1 Types of Service...1 Step by Step Configuration of a PC Acting as a PPPoE Client...2 Step by Step Configuration...2 Connect the Cisco DSL Router and Your PC...2 Start and Set Up HyperTerminal...2
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
section examines how to configure leased lines between two routers using HDLC and PPP.
4357ix.fm Page 620 Thursday, August 25, 2011 11:22 AM This chapter covers the following subjects: Configuring Point-to-Point WANs: This section examines how to configure leased lines between two routers
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
LAB MANUAL for Computer Network
LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design,
Configuring Remote Access to MPLS VPN
CHAPTER 3 TheCisco 10000 series router supports the IP virtual private network (VPN) feature for Multiprotocol Label Switching (MPLS). MPLS-based VPNs allow service providers to deploy a scalable and cost-effective
Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...
Cisco Inter-network Operating System (IOS) A short guide for the NetAdmin Angelos Stavrou Let's start out at the very beginning with the question: "What is a Command?" The most important thing to understand
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Configuring Voice and Data Support on VWIC3s
First Published: July 21, 2010, OL-22847-01 This module describes how to configure voice and data support on the next generation of voice/wan Interface Cards (VWICs) also known as VWIC3s. The following
Lab 6.1.3 Configure Local AAA on Cisco Router
Lab 6.1.3 Configure Local AAA on Cisco Router Objective Scenario Topology In this lab, the students will complete the following tasks: Securing and testing access to the privileged EXEC, VTY, and console
Laboratorio 3 Comunicación sincrónica Vía Satélite
Laboratorio 3 Comunicación sincrónica Vía Satélite Esquema de la Red WAN 192.168.0.0 /30 192.168.0.1 Router 1 Router 2 10.0.1.1 192.168.0.1 10.0.2.1 Ethernet Ethernet 10.0.1.20 LAN 1 10.0.1.0 /24 LAN 2
Document ID: 45741. Introduction
Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4
How To Configure InterVLAN Routing on Layer 3 Switches
How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement
PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement This feature module describes the PA-MC-T3 Multi-Channel T3 port adapter (PA-MC-T3 [=]), which can now be configured as either customer
Lab 3.5.1: Basic VLAN Configuration (Instructor Version)
(Instructor Version) Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 172.17.99.11 255.255.255.0 N/A S2 VLAN 99 172.17.99.12 255.255.255.0
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
IPv6 for Cisco IOS Software, File 2 of 3: Configuring
IPv6 for Cisco IOS Software, File 2 of 3: Configuring This document provides configuration tasks for the Cisco implementation of IP version 6 (IPv6) in the Cisco IOS software and includes the following
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
Overview of Access VPNs and Tunneling Technologies
Overview of Access VPNs and Tunneling Technologies Introduction A virtual private network (VPN) is a network that extends remote access to users over a shared infrastructure. VPNs maintain the same security
This chapter covers the following topics: ADSL Overview Cisco 6160 DSLAM Overview Cisco 6400 UAC Overview DSL Access Architectures and Protocols
This chapter covers the following topics: ADSL Overview Cisco 6160 DSLAM Overview Cisco 6400 UAC Overview DSL Access Architectures and Protocols C H A P T E R 8 Using DSL to Access a Central Site This
Lab 5-5 Configuring the Cisco IOS DHCP Server
Lab 5-5 Configuring the Cisco IOS DHCP Server Learning Objectives Configure and verify the operation of the Cisco IOS DHCP server Configure an IP Helper address Review the EIGRP configuration Topology
ICND1 Lab Guide. 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by
ICND1 Lab Guide 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0 ii Interconnecting Cisco Networking Devices Part 1 100-101 Lab Guide LM20130929/BV2.01 iii 25 Century Blvd. Ste. 500
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Network Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
Configuring Modem Transport Support for VoIP
Configuring Modem Transport Support for VoIP This chapter explains how to configure modem transport support for Voice over IP (VoIP) and contains the following sections: Modem Transport Support Overview,
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
Ubigate 1000. Quick Reference Guide for Covad. Document Type. Release Note. No of Pages. Item Code. Quick Reference Guide for Ubigate 1000 Page 1
Ubigate 1000 Quick Reference Guide for Covad Document Type Language No of Pages Author Item Code Release Note English / Samsung Quick Reference Guide for Ubigate 1000 Page 1 Revision History Version Date
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt Objective This lab will introduce to the student the CCNP lab equipment and certain IOS features that might be new. This introductory
MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.
MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.
CCBOOTCAMP s Comprehensive ICND2 Study Guide With Sample Questions
CCBOOTCAMP s Comprehensive ICND2 Study Guide With Sample Questions Interconnecting Cisco Networking Devices Part 2 (ICND2) Cisco Exam 640-816 A Unique Study Guide format that compresses important need-to-knowinformation
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Cisco 12 CCNA Certification
Cisco 12 CCNA Certification Application for Board Authorization of Courses District: Chilliwack School District 33 Developed by: John Murtha Date: May7, 2004 School: Sardis Secondary Principal: Bob Patterson
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt Objective This lab may introduce new CCNP lab equipment and certain IOS features. This introductory activity also describes how to
LAB Configuring NAT. Objective. Background/Preparation
LAB Configuring NAT Objective Configure a router to use network address translation (NAT) to convert internal IP addresses, typically private addresses, into outside public addresses. Configure static
Applicazioni Telematiche
Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Cisco 3900 Series, 2900 Series, and 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Cisco 3900 Series, 2900 Series, and 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706
Lab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
Remote Access VPN Business Scenarios
CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote
Chapter 3 Using Maintenance & Troubleshooting Tools & Applications Objectives
Using Maintenance & Troubleshooting Tools & Applications Objectives Describe & utilise Cisco IOS diagnostic tools. Explain the need for specialist tools in the troubleshooting process. Configure software
ADSL MODEM. User Manual V1.0
ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Cisco Quality of Service and DDOS
Cisco Quality of Service and DDOS Engineering Issues for Adaptive Defense Network MITRE 7/25/2001 Contents 1. INTRODUCTION...1 2. TESTBED SETUP...1 3. QUALITY OF SERVICE (QOS) TESTS...3 3.1. FIRST IN,
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Lab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
CCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding
Http://elmaestrodelared.blogspot.com CCNA Exploration 4.0: (II) Routing Protocols and Concepts Chapter 1: Introduction to Routing and Packet Forwarding 1. If a router cannot find a valid configuration
How To Set Up A Netvanta For A Pc Or Ipad (Netvanta) With A Network Card (Netvina) With An Ipa (Net Vanta) And A Ppl (Netvi) (Netva)
VPN WAN LAN PWR STAT TD RD TD RD TD RD VPN WAN LAN PWR STAT TD RD TD RD TD RD NetVanta 3200 NetVanta 3200 NetVanta Series (with T1/FT1 or T1/FT1 + DSX-1 Network Interface Module) Quick Configuration Guide
