2013年3月12日星期二

Cisco Command Summary for Cisco Routers



Cisco Router Configuration Commands - Lists how to enable and disable interfaces, add IP addresses to interfaces, enable RIP or IGRP and set passwords.
Cisco Router Show Commands - Handy show commands to check on the status of interfaces.
Cisco Router Basic Operations - Covers getting into and out of different modes. Also, some handy shortcut keys are included.
Cisco Router Copy Commands - How to save and backup your router configuration and IOS file.
Cisco Router Debug Commands - Some useful debug commands.

Cisco Router Configuration Commands
Requirement
Cisco Command
Set a console password to cisco
Router(config)#line con 0
Router(config-line)#login
Router(config-line)#password cisco
Set a telnet password
Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password cisco
Stop console timing out
Router(config)#line con 0
Router(config-line)#exec-timeout 0 0
Set the enable password to cisco
Router(config)#enable password cisco
Set the enable secret password to peter.
This password overrides the enable password and is encypted within the config file
Router(config)#enable secret peter
Enable an interface
Router(config-if)#no shutdown
To disable an interface
Router(config-if)#shutdown
Set the clock rate for a router with a DCE cable to 64K
Router(config-if)clock rate 64000
Set a logical bandwidth assignment of 64K to the serial interface
Router(config-if)bandwidth 64
Note that the zeroes are not missing
To add an IP address to a interface
Router(config-if)#ipaddr 10.1.1.1 255.255.255.0
To enable RIP on all 172.16.x.y interfaces
Router(config)#router rip
Router(config-router)#network 172.16.0.0
Disable RIP
Router(config)#no router rip
To enable IRGP with a AS of 200, to all interfaces
Router(config)#router igrp 200
Router(config-router)#network 172.16.0.0
Disable IGRP
Router(config)#no router igrp 200
Static route the remote network is 172.16.1.0, with a mask of 255.255.255.0, the next hop is 172.16.2.1, at a cost of 5 hops
Router(config)#ip route 172.16.1.0 255.255.255.0 172.16.2.1 5
Disable CDP for the whole router
Router(config)#no cdp run
Enable CDP for he whole router
Router(config)#cdp run
Disable CDP on an interface
Router(config-if)#no cdp enable

Cisco Router Show Commands
Requirement
Cisco Command
View version information
show version
View current configuration (DRAM)
show running-config
View startup configuration (NVRAM)
show startup-config
Show IOS file and flash space
show flash
Shows all logs that the router has in its memory
show log
View the interface status of interface e0
show interface e0
Overview all interfaces on the router
show ip interfaces brief
View type of serial cable on s0
show controllers 0 (note the space between the 's' and the '0')
Display a summary of connected cdp devices
show cdp neighbor
Display detailed information on all devices
show cdp entry *
Display current routing protocols
show ip protocols
Display IP routing table
show ip route
Display access lists, this includes the number of displayed matches
show access-lists
Check the router can see the ISDN switch
show isdn status
Check a Frame Relay PVC connections
show frame-relay pvc
show lmi traffic stats
show frame-relay lmi
Display the frame inverse ARP table
show frame-relay map

Cisco Router Basic Operations
Requirement
Cisco Command
Enable
Enter privileged mode
Return to user mode from privileged
disable
Exit Router
Logout or exit or quit
Recall last command
up arrow or <Ctrl-P>
Recall next command
down arrow or <Ctrl-N>
Suspend or abort
<Shift> and  <Ctrl> and 6 then x
Refresh screen output
<Ctrl-R>
Compleat Command
TAB

Cisco Router Copy Commands
Requirement
Cisco Command
Save the current configuration from DRAM to NVRAM
copy running-config startup-config
Merge NVRAM configuration to DRAM
copy startup-config running-config
Copy DRAM configuration to a TFTP server
copy runing-configtftp
Merge TFTP configuration with current router configuration held in DRAM
copy tftpruning-config
Backup the IOS onto a TFTP server
copy flash tftp
Upgrade the router IOS from a TFTP server
copy tftp flash

Cisco Router Debug Commands
Requirement
Cisco Command
Enable debug for RIP
debug ip rip
Enable summary IGRP debug information
debug ipigrp events
Enable detailed IGRP debug information
debug ipigrp transactions
Debug IPX RIP
debug ipx routing activity
Debug IPX SAP
debug IPX SAP
Enable debug for CHAP or PAP
debug ppp authentication
Switch all debugging off
no debug all
undebug all


2012年10月11日星期四

How to Take Part in this Big Party for Router-switch.com’s 10th Anniversary?



During the past ten years, from 2002 to 2012, router-switch.com has grown up into a global leading Cisco supplier. Indeed, it has experienced several vital moment. Here let’s share some router-switch.com’s big events:
2002, Router-switch.com was founded.
2003, Router-switch.com has experienced a rapid development.
2004, CCIE technical support team was built.
2005, The sales volume maintains 70% growth per year.
2006, Staff in company increased to 20.
2007, Router-switch.com established its marketing department. It attained its reputation in providing timely information of Cisco for clients and Cisco users.
2008, Router-switch.com adopted necessary advanced management tools to improve its service for clients.
2009, Router-switch.com upgraded warehouses in Hongkong and Mainland China. Its inventory is worth over $5 million.
2010, The sales of Router-switch.com have zoomed to $ 30 million.
2011, Router-switch.com released the new version to update service. It supplies free CCIE support. Social network platforms were opened to communicate with customers and clients well.
2012, New Office of router-switch.com landed in US to offer professional local service.

Nowadays, router-switch.com is becoming the world’s largest Cisco reseller online.  It believes that router-switch.com will bemore professional, more reliable and stronger with your support.
Note:A letter from CEO of router-switch.com to thank its customers and sharetheir progress.

More about Router-switch.com:
Router-switch.com, also called YejianTechnologies Co., Ltd, is the worldwide leader in delivering new, used, refurbished Cisco hardware, including Cisco routers, Cisco switches, firewall security, Cisco IP Phones VoIP, wireless AP, Cisco modules & cards, memory, and optical cables, SFP, GBIC, XENPK , etc. It carries over $5 million in inventory of Cisco hardware and Cisco equipment that can meet SOHO, small, midsized and large businesses of all sizes. Also Router-Switch.com owns more than 8,000 customers worldwide, not only because of its original Cisco products with reliable quality and competitive price, but also due to professionalservice, huge inventory, flexible payment and shipment. More information about router-switch.com can be found at http://www.router-switch.com/. For ongoing Cisco info, please go to
Blog.router-switch.com---News, tutorials, tips, info & thoughts on Developments in the Cisco, Cisco network, IT, Software & Network Hardware Industry
http://blog.router-switch.com/.

More Related Router-switch.com News:
Router-switch.com Announced Its Newly Redesigned Website
“Router Switch”, Our New Company Landing in U.S.—Professional Cisco Supply Service is Around You
http://blog.router-switch.com/2012/07/%E2%80%9Crouter-switch%E2%80%9D-our-new-company-landing-in-u-s-professional-cisco-supply-service-is-around-you/
Router-switch.com: A Batch of New Cisco Network Equipment Surprises the Coming Christmas Day
http://blog.router-switch.com/2011/12/router-switch-com-a-batch-of-new-cisco-network-equipment-surprises-the-coming-christmas-day/
Router-Switch.com Uploaded Thousands of New Cisco Products
http://blog.router-switch.com/2011/11/router-switch-com-uploaded-thousands-of-new-cisco-products/

2012年9月17日星期一

Cisco Announced End-of-Sale and End-of-Life for Cisco Catalyst 3750/3560G&E Switches



Cisco announced the end-of-sale and end-of-life dates for the Cisco Catalyst 3750G, 3560G, 3750-E, and 3560-E Series Switches.The official end of sale date is January 30, 2013.As is tradition, support will be provided for 5 years following the last date of sale, so you have until 2018 for the last date of hardware support.

For reference, here's a quick list of dates:
  • End-of-Sale Date - January 30, 2013
  • Last Ship Date: HW - April 30, 2013
  • End of Vulnerability/Security Support: OS SW - January 30, 2016
  • Last Date of Support:HW - January 31, 2018

Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). For customers with active and paid service and support contracts, support will be available until the termination date of the contract, even if this date exceeds the Last Date of Support shown in Table 1.

Please note that the list price of some of the products listed in this announcement may increase in the next 12 months.

Table1. End-of-Life Milestones and Dates for the Cisco Catalyst 3750G, 3560G, 3750-E, and 3560-E Series Switches

HW = Hardware OS SW = Operating System Software App. SW = Application Software

NOTE: More details of End-of-Sale and End-of-Life for Cisco Catalyst 3750/3560G&E Switches you can visit Cisco’s official announcement: Product Part Numbers Affected by This Announcement, Product Migration Options(Customers are encouraged to migrate to the Cisco Catalyst 3750-X and 3560-X Series Switches.…)
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps5023/eol_c51-696372_ps5528_Products_End-of-Life_Notice.html
Full lists for Cisco Catalyst 3750 Series Switches-End-of-Life and End-of-Sale Notices (from 2004-2012)
http://www.cisco.com/en/US/products/hw/switches/ps5023/prod_eol_notices_list.html

More Cisco Announcement and News Related to End-of-Life Cisco Hardware
What You Could Do While Facing End-of-Life Cisco Hardware
http://blog.router-switch.com/2012/08/what-you-could-do-while-facing-end-of-life-cisco-hardware/
Cisco Integrated Services Routers G1, EOL Announcement
http://blog.router-switch.com/2012/04/cisco-integrated-services-routers-g1-eol-announcement/

2012年7月31日星期二

Which VPN Is Best for Your Small Business?


When choosing between IPSec and SSL, you might find you need both kinds of VPNs.
Mobile workers are a fact of life for most small businesses and that is often a good thing—for both the company and the employee or contractor. Users who have remote access to your small business network from their home offices or while traveling tend to be more productive and can helps save your company money. The trick, of course, is making sure that the mobile connections to your network are secure. For that, you need an encrypted virtual private network (VPN), which lets remote users safely connect to your network from any location with Internet access.

There are two different types of VPNs: Internet Protocol Security (IPSec) and Secure Sockets Layer (SSL). Both VPNs allow you to remotely access network resources—providing a secure and private link to your network via the public Internet—but in different ways. Choosing the one that’s right for your small business depends on your existing (or planned) network hardware and the type of users who need remote access to the applications and data on your network.

IPSec vs. SSL VPNs
An IPSec VPN provides secure access to your entire small business network by encrypting data traveling between an IPSec gateway, which is installed on a router or security appliance, and an IPSec remote access client installed on an employee’s laptop or smartphone. An IPSec VPN gives users a network experience similar to sitting in the office with native access to all your applications.

An SSL VPN allows users to securely access only specific applications and services on the network via a web browser and is ideal for those small businesses that want to offer secure access to partners, contractors, consultants and suppliers by providing access to only specific applications and services inside their business network. An SSL VPN uses a web browser’s security capabilities to secure private network traffic. No special client application is necessary, so users can log into an SSL VPN from any device with a browser and an Internet connection. Because SSL VPNs use an Internet protocol, the applications users’ access through this type of VPN must be web-enabled.

In general, an IPSec VPN is more secure than an SSL VPN because it requires a special client and can’t be accessed by non-sanctioned Internet devices, like a public PC at the local library. It also gives employees access to more applications that don’t need a web version to function over the VPN. On the other hand, an SSL VPN makes it easier to give users access to web-based services such as email.

Should you choose one VPN over another, or both?
When deciding which type of VPN to install, the question isn’t so much “Which one is better?” but “Which one is better for my business?”. Both VPNs have their advantages, and you might even decide you need a “hybrid VPN”—an IPSec VPN for a certain group of users such as employees who need to access all the applications and data within the network and an SSL VPN for providing controlled access to specific applications and services that are pertinent to contractors, consultants, suppliers and partners etc.

In fact, depending on which hardware you choose to provide VPN functionality for your business, you don’t necessarily have to choose between the two VPN types. For instance, theCisco Small Business RV Series Routers has built-in IPSec VPN functionality, and some models, including the RV220W Wireless Network Security Firewall offer both IPSec and SSL VPNs.

Are you currently using a VPN for remote offices or mobile employees? Which did you choose—an IPSec or SSL VPN?When choosing between IPSec and SSL, you might find you need both kinds of VPNs

read more: cisco distributors, used cisco equipment, cisco used equipment, used network hardware

2012年5月15日星期二

Which VPN Is Best for Your Small Business?

When choosing between IPSec and SSL, you might find you need both kinds of VPNs.
Mobile workers are a fact of life for most small businesses and that is often a good thing—for both the company and the employee or contractor. Users who have remote access to your small business network from their home offices or while traveling tend to be more productive and can helps save your company money. The trick, of course, is making sure that the mobile connections to your network are secure. For that, you need an encrypted virtual private network (VPN), which lets remote users safely connect to your network from any location with Internet access.

There are two different types of VPNs: Internet Protocol Security (IPSec) and Secure Sockets Layer (SSL). Both VPNs allow you to remotely access network resources—providing a secure and private link to your network via the public Internet—but in different ways. Choosing the one that’s right for your small business depends on your existing (or planned) network hardware and the type of users who need remote access to the applications and data on your network.

IPSec vs. SSL VPNs
An IPSec VPN provides secure access to your entire small business network by encrypting data traveling between an IPSec gateway, which is installed on a router or security appliance, and an IPSec remote access client installed on an employee’s laptop or smartphone. An IPSec VPN gives users a network experience similar to sitting in the office with native access to all your applications.

An SSL VPN allows users to securely access only specific applications and services on the network via a web browser and is ideal for those small businesses that want to offer secure access to partners, contractors, consultants and suppliers by providing access to only specific applications and services inside their business network. An SSL VPN uses a web browser’s security capabilities to secure private network traffic. No special client application is necessary, so users can log into an SSL VPN from any device with a browser and an Internet connection. Because SSL VPNs use an Internet protocol, the applications users’ access through this type of VPN must be web-enabled.

In general, an IPSec VPN is more secure than an SSL VPN because it requires a special client and can’t be accessed by non-sanctioned Internet devices, like a public PC at the local library. It also gives employees access to more applications that don’t need a web version to function over the VPN. On the other hand, an SSL VPN makes it easier to give users access to web-based services such as email.

Should you choose one VPN over another, or both?
When deciding which type of VPN to install, the question isn’t so much “Which one is better?” but “Which one is better for my business?”. Both VPNs have their advantages, and you might even decide you need a “hybrid VPN”—an IPSec VPN for a certain group of users such as employees who need to access all the applications and data within the network and an SSL VPN for providing controlled access to specific applications and services that are pertinent to contractors, consultants, suppliers and partners etc.

In fact, depending on which hardware you choose to provide VPN functionality for your business, you don’t necessarily have to choose between the two VPN types. For instance, theCisco Small Business RV Series Routers has built-in IPSec VPN functionality, and some models, including the RV220W Wireless Network Security Firewall offer both IPSec and SSL VPNs.

Are you currently using a VPN for remote offices or mobile employees? Which did you choose—an IPSec or SSL VPN?When choosing between IPSec and SSL, you might find you need both kinds of VPNs

---Original Reading you can visit: used cisco, refurbished cisco, cisco product, cisco wholesale
http://blogs.cisco.com/smallbusiness/which-vpn-is-best-for-your-small-business/
More Related: How to Choose VPN for Your Small Business?
http://irisdan.livejournal.com/16983.html

2012年4月6日星期五

Connecting Cisco Router/Switch through Console Port and Troubleshooting

What is Console Port of Cisco Switch /Router?
Every Cisco router/switch has a console port on its back. It is there to provide a way to hookup a terminal to the router in order to work on it. The console port (sometimes called the management port) is used by administrators to log into a router directly — that is, without a network connection. The console must be used to install routers onto networks because, of course, at that point there is no network connection to work through.

Connecting the Console Port to a PC

Console (rollover) Cable and Adapters
The console cable can be:
•    RJ-45-to-RJ-45 console cable
•    RJ-45-to-DB-9 adapter
Making the physical connection
Follow these steps to connect the Router/Switch to a terminal or PC running terminal emulation software:
Step 1 Locate the console port on the back of the Router/Switch.

Step 2 Connect the console (or rollover) cable to the console port on the Router/Switch.

Step 3 Use the correct adapter to connect the other end of the cable to your terminal or PC.

Step 4 If your terminal or PC has a console port that does not fit one of the adapters, you must provide the correct adapter for that port.

Connecting using HyperTerminal
Click on the HyperTerminal icon below to launch a pre-configured HyperTerminal connection. This connection is configured for use with all Cisco Router/Switches. (The Router/Switch should be connected to your laptop at this time.

Depending on your browser settings, you may initially see a message asking whether you want to open the file or save it to disk. To launch the connection now, select the "open" option. To save the connection to your local hard-drive for future use, select the "save" option.

If you selected the "open" option, you should now be communicating with the Router/Switch. If you are experiencing problems, make sure the

Router/Switch is powered on; you are attached to the proper Com Port and verify your cabling.

Setting up a HyperTerminal connection file
Using this procedure you will create a named connection that you can save and reuse. (This creates a connection identical to the one provided above, and is included primarily for your reference.)

To set up a HyperTerminal connection on your laptop:

Step 1 Click the Start button on the Windows Taskbar, and select Programs > Accessories > Communications > HyperTerminal. HyperTerminal launches and displays the Connection Description dialog box.

Alternatively, if you previously saved a connection for Cisco equipment, you can launch it by selecting Programs > Accessories > Communications > HyperTerminal >connection_name.

Step 2 Type in a name and optionally select an Icon to represent your HyperTerminal session. Click OK. The Phone Number window appears.

Step 3 Locate the Connect Using field near the bottom of the Phone Number window. Select "Direct to COM1" from the drop-down list to indicate that this connection is a local session (and not a dial-up session). Click OK. The COM1 Properties window appears.

Step 4 On the Port Settings tab, enter the following settings:
•    Speed - 9600
•    Data Bits - 8
•    Parity - none
•    Stop bits - 1
•    Flow Control - none

Step 5 Click OK to make the connection. The COM1 Properties window disappears. You should now see a blinking cursor in the HyperTerminal terminal window.

If there are any problems at this point, then see below the Troubleshooting console port problems to isolate and fix the problem.

Troubleshooting console port problems

SYMPTOM: No connection.
•    Check your laptop's settings to see if COM1 is loaded.
•    Click on Start > Settings > Control Panel. Within the Control Panel window, open the Systems icon. Choose the Device Manager tab, and ensure that COM1 is an option on the Ports drop-down list. If COM1 is missing, reboot your laptop and repeat this check. It should now appear.
SYMPTOM: No response from Router/Switch once connected to Router/Switch via console.
•    Check to ensure you are using the correct cable (roll-over as opposed to straight through).
•    Verify that HyperTerminal is configured to use the correct communications port.
SYMPTOM: Only getting garbage from the Router/Switch.
Ensure HyperTerminal is setup using the correct speed -- 9600 Baud.

2012年3月21日星期三

What’s the Difference between LAN & WAN?

There are two basic types of network, the LAN and WAN. LAN stands for local area network and WAN stands for wide area network. There are obvious differences between the two cisco  network hardware types.

Speaking of local area networks, they are smaller networks, usually within an office base. Connections between the workstations are physical, with cables, and all the office resources are shared and distributed between the network workstations. The most common type of LAN is that of Ethernet. This is a family of frame-based computer networking technologies for LANs.

WAN, or wide area networks, are broader geographic networks, like one city to another. They are more of a collection of interconnected LAN networks. Other WANs, provided by service providers, connect local networks to the Internet. In actual fact the Internet is more a specific Internetwork, not a straight WAN.

While LANs are smaller, collectively they can be linked to create the WAN. This really is done using a series of routers, and bridges, which are basically cisco network equipment devices which enable interconnectivity between separate LANs. With the option of expanding into small-scale WANs,
the real contrasting features of LANs in comparison to WANs is that of their data transfer rate, need for leased lines and geographical range. LANs are faster, with 10 GB data transfer rates. Likewise, as has been mentioned, LANs encompass a smaller geographical area. WANs also rely on common carriers, while LANs do not.

Aside from these differences users of a LAN will more likely need password validation as it will have specific user rights. While smaller WANs might also have this, it is less likely. LAN networks will generally be more private than WAN networks, and will have some sort of networking software and probably a network administrator. Hardware resources are shared on a LAN, while with a WAN the focus is more on communications.

The network topology of LANs is often peer-to-peer. That is to say, each client shares is resources with other workstations in the network. WAN networks will operate on a more cisco supplier client-to-server basis with interconnected LANs. Really, this entire means is that the resources are requested from a central server.

One other big difference between the networks is the cost to set up a LAN in relation to a WAN. A single LAN network will be cheaper to set up than that of a larger WAN, with more workstations and more hardware connection requirements with the need for a leased line. In essence, one big LAN in comparison to a small WAN will be the cheaper option.

So, the differences between LANs and WANs are indeed greater than just that of size. There are differences in network topology, cisco hardware requirements, software requirements as well as technical specifications and cost.