What is the basics of the router -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------ What makes the network to each other? Is a router. Routers are the hub of the Internet, "Traffic Police". At present, the router has been widely used in all walks of life, and all kinds of different grades of products have become the main force of implementing the internal connection, backbone interconnection and backbone network and the Internet interconnection. The so-called route refers to the activity of moving information from the source location to the target location by interconnecting networks. In general, during the routing process, the information will pass at least one or more intermediate nodes. Typically, people will compare routing and exchanges, mainly because the functions implemented in ordinary users are exactly the same. In fact, the main difference between routing and exchange is to exchange the second layer (data link layer) that occurs in the OSI reference model, while the route occurs in the third layer, ie the network layer. This difference determines that the route and exchange in the process of mobile information requires different control information, so the approach to each function is different. As early as 40 years, the discussion of routing technology has emerged, but it has gradually entered commercial use in the 1980s. The reason why routing technology is not widely used in the early adventive. It is because the network structure before the 1980s is very simple, and the routing technology has no use of martial arts. Until for more than a decade, a large-scale Internet network gradually became popular, providing a good foundation and platform for the development of routing technology. The router is the main node device of the Internet. The router is forwarded through the route decision data. The forwarding policy is called routing, which is the origin of the router name (Router, forwarder). As a hub connected between different networks, the router system constitutes the main context of TCP / IP International Interconnection Network Internet, which can also be said that the router constitutes an Internet's skeleton. Its processing speed is one of the main bottlenecks of network communication, and its reliability directly affects the quality of network interconnects. Therefore, in the area network, regional network, and even the entire Internet research area, router technology is always at the core position, its development history and direction, has become a microcosm of the entire Internet research. On the occasion of my country's network infrastructure and information construction, the role, status and development direction of the router in the interconnection network are discussed, and the development direction of network technology, network construction, network construction, and clarity of domestic network technology. Various similar to not concepts are of great significance. Router's role --------------------------------------------- ------------------------------- The role of the router is to connect different networks, and the other is to choose information transmission. Line. Choose a smooth shortcomings, greatly improve communication speed, reduce network system communication load, save network system resources, improve network system smoothness, so that network systems have played greater benefits. From the perspective of filtering network traffic, the role of the router is very similar to the switch and bridge. However, with work in the network physical layer, different software protocols using special software protocols from logically, from the physical partitioning network segment. Divide the entire network. For example, a router that supports IP protocols can divide the network into multiple subnet segments, only network traffic to special IP addresses, can pass the router. For each received packet, the router recalculates its checkup and writes a new physical address. Therefore, the speed of using the router forwarding and filtering data is often slower than the switch that only views the physical address of the data package. However, for those structural complex networks, using routers can improve the overall efficiency of the network.
Another obvious advantage of the router is to automatically filter network broadcasts. Overall, the entire installation process of adding a router in the network is more complicated than plug-and-play switches. Generally speaking, heterogeneous network interconnection and multiple subnet interconnections should be accomplished by routers. The main job of the router is to find a best transfer path for each data frame of the router and effectively transmit the data to the destination site. It can be seen that the policy of selecting the best path is the key to the router is the key to the router. To complete; this work, the related data of various transmission paths (Routing Table) is saved in the router, and is used when used. The logo information of the subnet is saved in the path table, the number of online routers, and the name of the next router, etc. The path table can be fixed by the system administrator, or the system is dynamically modified, and can be automatically adjusted by the router or by the host. 1. Static Path Table is pre-set in advance based on the network configuration when the system is installed in advance, which is not preset according to the configuration of the network when installing. Change. 2. The dynamic path surface dynamic (Dynamic) path table is the path table that is automatically adjusted by the router according to the operation of the network system. The router automatically calculates the best path for data transfer when needed by the function, automatic learning and memory network operations, automatic learning and memory network operations according to the function provided by Routing Protocol. Router type --------------------------------------------- ------------------------------- The Internet can be seen in the network. Access network allows families and small businesses to connect to an internet service provider; routers in the enterprise network connect a campus or thousands of computers within the company; the router terminal system on the backbone is usually directly accessible, they Connect the ISP and corporate network on the backbone online. The rapid development of the Internet has brought different challenges to the backbone network, enterprise network or access network. The backbone requires that the router can forward high-speed routing for minority links. Enterprise-class routers not only require more ports, low prices, but also require simple and convenient configuration, and provide QoS. 1. Access router Access to the router to connect small business customers within the family or ISP. Access routers have begun not just providing SLIP or PPP connections, but also support virtual private network protocols such as PPTP and IPSec. These protocols must be run on each port. Things such as ADSL will soon improve the available bandwidth of each family, which will further increase the burden of access routers. Due to these trends, access routers will support many heterogeneous and high-speed ports in the future, and can run multiple protocols at all ports, while also avoiding the telephone exchange network. 2. Enterprise-class router companies or campus routers are connected to many terminal systems. The main goal is to achieve as much endpoint interconnection as much as possible, and further require support for different quality of service. Many existing enterprise networks are connected by Hub or bridges. Although these devices are cheap, it is easy to install, there is no need to configure, but they do not support service levels. Conversely, the network with router participating can divide the machine into multiple collision domains and thus control the size of a network. In addition, the router also supports a certain service level, at least allows for a plurality of priority. But each port cost of the router is expensive, and a large number of configurations are required before you can use. Therefore, the success or failure of the enterprise router is whether there is a large number of ports and the cost of each port is low, whether it is easy to configure, whether QoS is supported. In addition, enterprise-class routers can also effectively support broadcast and multicast. Enterprise networks also deal with various LAN technology left in history, support multiple protocols, including IP, IPX, and VINE.
They also support firewalls, pack filters, and a large number of management and security strategies and VLANs. 3. The backbone-grade router backbone router realizes the interconnection of enterprise-class networks. The requirements for it are speed and reliability, and the cost is in the secondary position. Hardware reliability can be obtained using techniques used in telephone exchange networks, such as thermal backup, dual power, dual data path, etc. These techniques are almost standard for all backbone routers. The main performance bottleneck of the backbone IP router is the time consumption of a route in the forwarding table. When a package is received, the input port finds the destination address of the package in the forwarding table to determine its destination port, the shorter the packet, or when the package is to be sent to many destination ports, it will increase the price of routing findings. Therefore, placing some of the destination ports of some regular access can be enhanced in the cache to improve the efficiency of routing lookups. Whether it is an input buffer or an output buffer router, there is a bottleneck problem with routing. In addition to performance bottlenecks, the stability of the router is also a problem that is often overlooked. 4. In the three main technologies used in the future, the three main technologies used in the future, the fibers and DWDM are already mature and ready-made. If there is no router corresponding to the original bandwidth provided with existing fiber optic technology and DWDM technology, the new network infrastructure will not be fundamentally improved, so it has become a high-performance backbone exchange / router (too bit router) has become An urgent requirement. Too bit router technology is now mainly in the development experimental phase. Router structure ----------------------------------------------- ------------------------------- The architecture of the router is seen from the architecture, and the router can be divided into the first generation. Single bus single CPU structure router, second generation single bus master from CPU structure router, third generation single bus symmetric multi-CPU structure router; fourth generation multi-bus multi-CPU structure router, fifth generation shared memory structure router, Six-generation cross-switching architecture router and a plurality of routers based on the charter system. The configuration of the router has four elements: input port, output port, switching switch, and routing processor. The input port is the import of physical links and input packages. The port is usually provided by a line card, a piece of card typically supports 4, 8 or 16 ports, and an input port has a number of functions. The first function is to encapsulate and decompose data link layers. The second function is to find the input packet destination address in the forwarding table to determine the destination port (called routing lookup), routing can be implemented using a general hardware, or by embedding a microprocessor on each line card . Third, in order to provide QoS (service quality), the port is to divide the received package into several predefined service levels. Fourth, ports may need to run data link-level protocols such as SLIP (serial line Internet protocol) and PPP (point-to-point protocol) or network-level protocols such as PPTP (point-to-point tunnel protocol). Once the routing lookup is completed, you must send the package to its output port with the switch switch. If the router is an input to add a queue, there are several inputs sharing a switched switch. The last function of the input port is to participate in the arbitration protocol to public resources (such as switching switches). The switch can be implemented using a variety of different techniques. Using the most exchange switching technology to date is a bus, cross switch, and shared memory. The simplest switch uses a bus to connect all inputs and output ports, the disadvantage of the bus switch is that its exchange capacity is limited to the capacity of the bus and the additional overhead of the shared bus arbitration. The cross-switch provides a plurality of data paths through the switch, and the cross switch with N × N intersections can be considered 2N bus. If a cross is closed, the data on the input bus is available on the output bus, otherwise it is not available. The closure of the intersection is controlled by the scheduler, so the scheduler limits the speed of the switching switch.
In the shared memory router, the incoming package is stored in the shared memory, which is only the pointer of the package, which increases the exchange capacity, but the speed of the switch is limited to the access of the memory. speed. Although the memory capacity can be doubled every 18 months, the access time of the memory is only 5% per year, which is an inherent restriction of the shared memory switch switch. The output port is stored in the package before the package is sent to the output link, and the complex scheduling algorithm can be implemented to support priority. Like the input port, the output port also supports the package and solution packages of the data link layer, and many higher protocols. Routing Processor Calculates the Transfer Method to implement the routing protocol, and run the software to configure and manage the router. At the same time, it also handles those destination addresses that are not online card transfer. Basic protocols and technology of routers -------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------ VPN VPN (Virtual Private Network- Virtual Special Network) One of the important functions of the router. Its solution is approximately as follows: 1. Access controls are generally divided into two protocols of PAP (Password Authentication Protocol) and CHAP (Advanced Password Authentication Protocol). PAP requires the login to provide the username and password to the target router, which is consistent with the information in the Access List to allow it to log in. Although it provides a certain security, user login information is not encrypted online, which is easy to steal. The CHAP came into being, it translated a random initial value with the user's original login information (username and password) and formed a new login information after translating the Hash algorithm. In this way, the user login information transmitted online is opaque, and because the random initial value is different, the user's final login information will be different, even if the user login information is steadped, the hacker can not reuse . It should be noted that CHAP is not interoperable because each manufacturer takes the different HASH algorithms. To establish a VPN requires the same brand router on both ends of the VPN. 2. Data encryption is a very important parameter during the encryption process. It is directly related to the difficulty of decryption, where the Intel 9000 Series router is most excellent, and is more than 100 digits. 3. NAT (Network Address Translation-Network Address Conversion Protocol) Like the user login information, IP and MAC addresses are not secure on the Internet. NAT can translate legitimate IP addresses and MAC addresses into illegal IP addresses and MAC addresses to pass online. After reaching the target router, the anti-translation into legitimate IP and MAC address, this process is a bit like chap, translation algorithm manufacturer has different standards, cannot Realize interoperability. QoS QoS (QUALITY OF Service - Service Quality) is a dedicated term in ATM (Asynchronous Transmit Mode). It is not to talk to QoS on IP, but more and more applications such as multimedia information such as IP biography VOD. A packaged protocol appears to be a bit of heart: delay long and not value, the loss of the packet is not continuous and the distortion is large. To solve these problems, the manufacturer provides a number of solutions: the first solution is based on the priority of different objects, and the packets sent by certain devices (multimedia applications) can be transmitted. The second program is based on the priority of the protocol, and the user can define which protocol is high, and it can be supported by the first transmission, Intel and Cisco support.
The third solution is to do link integration MLPPP (Multi Link Point to Point Protocol), Cisco Support can be given to bandwidth by bringing a plurality of lines of a plurality of lines, thereby increasing bandwidth. The fourth solution is to do resource reserved RSVP (Resource Reservation Protocol), which will partly distribute a portion of the bandwidth to multimedia signals, and other protocols should not occupy this part of the bandwidth in any case. These solutions can effectively improve transmission quality. RIP, OSPF and BGP protocols, now a large number of routing protocols, RIP (Routing Information Protocol-Routing Information Protocol), OSPF (Open Shortest Path First - Open Shortest Road Priority) and BGP (Border Gateway Protocol-Border Gateway Protocol ). RIP, OSPF is an internal gateway protocol, which is an autonomous system that is operated by a unified routing protocol for a single ISP. BGP is a routing agreement between autonomous systems and is an external gateway protocol. Rip is the longest route protocol to launch time, and is the simplest routing protocol. It mainly transmits routing information (routing tables) to broadcast routing. Every 30 seconds, broadcast a routing table, maintain the relationship between adjacent routers, while calculating your own routing table based on the routing table received. RIP is easy to run, suitable for small networks, and the Internet is also partially used in part. The OSPF protocol is an abbreviation for "open shortest road priority". "Open" is for the "private" routing agreement of some manufacturers at that time, it is because of the openness of the protocol, it has made OSPF have powerful vitality and extensive use. It receives network information by transmitting link status (connection information), maintaining a network to topology, and utilizing the minimum generating tree algorithm to get routing tables. OSPF is a relatively complex routing protocol. In general, OSPF, RIP is a routing protocol within the autonomous system, suitable for use in a single ISP (autonomous system). Generally speaking, the entire Internet is not suitable for running a single routing protocol, because each ISP has its own interests, unwilling to provide a detailed routing information of your own network. In order to ensure the ISP benefits, the Standardization organization has developed the routing protocol between ISPs. BGP handles routing between each ISP. It is characterized by a wealth of routing strategies, which is the protocols such as RIP, OSPF. Because they need the overall information to calculate the routing table. BGP adds a certain policy to the router of the ISP boundary, selecting filter routing, transmitting routing of RIP, OSPF, BGP, etc. to each other. The global, extensive Internet is an example of the route processing between multiple ISPs in BGP. The emergence of BGP has caused major changes in the Internet, which connects multiple ISP organic connections to truly become a network within a global. The side effects brought are the route explosion of the Internet. Now the route of the Internet is about 60,000, which is still "aggregated" numbers. Configuring BGP requires very much understanding of user needs, network status and BGP protocol, but also very careful, BGP is running relative core, once an error, the loss caused! The Internet in the rapid development of IPv6 technology will no longer connect to the computer's network, which will develop into information communication infrastructure that can be similar to the telephone network, cable TV network. Therefore, IP (Internet protocol) is in a difficult to compete, and people are urgently hoping that the next generation IP is the emergence of IPv6. IPv6 is a version of IP, in the Internet communication protocol TCP / IP, is the transfer protocol of the OSI model 3rd floor (network layer).
It is extensively used in the currently used, and the address is extended to 128 bits compared to the IPv4 proposed in 1974. In theory, the number of addresses was increased from the original 4.3 × 109 to 4.3 × 1038. The reason why you must use the current IPv4 to use IPv6, mainly two reasons. 1. Due to the rapid development of the Internet, the number of addresses is not enough, which makes the energy and cost of network management are unbearable. The depletion of the address is the primary reason to transition to the 128-bit address space. 2. As the number of hosts increases, the routing table determined that the data transmission route is constantly increasing. The processing performance of the router cannot keep this rapid growth. In the past, Internet connections will be difficult to provide stable services. Via IPv6, the number of routing can reduce a quantity level. In order to connect the Internet to many things, it is easy to use, IPv6 must be used. IPv6 can do this because it uses four technologies: an extension of address space, allows routing tables to reduce address constructs, automatically set addresses, and improve security confidentiality. IPv6 inherits the favorable aspects of IPv4 in routing technology, representing the development direction of future routing technology, many router vendors have now put large power to produce routers that support IPv6. Of course, IPv6 also has some places that are not paying attention to, IPv4 / Nat and IPv6 will coexist for a long time. Router configuration and debug ---------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------- Router has a pivotal position in computer network, is the bridge of computer network . By not only different networks, you can also select the path to the data transfer, and can block illegal access. The configuration of the router is not a very easy thing for beginners. The general configuration and simple debugging of the router is now introduced to everyone, and the friends are in configuring the router reference, and this paper takes Cisco2501 as an example. Cisco2501 has an Ethernet port (AUI), a Console port (RJ45), an AUX port (RJ45) and two synchronous serial ports, supporting DTE and DCE devices, supporting EIA / TIA-232, EIA / TIA-449, V. 35, X.25 and EIA-530 interfaces. One. Configuration 1. Configuring Ethernet Port # Conf T (From Terminal Configuring Router) # INT E0 (Specify E0 Port) # ip addr abcd xxxx (Abcd is Ethernet address, xxxx is a subnet mask) # ip addr abcd xxxx secondary (E0 port Supports two address types. If the first is a class A address, the second is B or C address) # no shutdown (activation E0 port) # EXIT After completing the above configuration, check if the E0 port is normal. If it is not normal, it is generally because there is no activation of the port, and beginners tend to easily ignore. Use the no shutdown command to activate E0. 2. X.25 Configuration # Conf T # int S0 (specified S0 port) # ip addr abcd xxxx (ABCD is the IP address of Ethernet S0, xxxx is a subnet mask) # ENCAP X25-ABC (Package X.25 protocol.
ABC specifies that the X.25 is DTE or DCE operation, default is DTE) # x25 addr abcd (ABCD is an X.25 port address of S0, supplied by the Post Office) # x25 MAP IP ABCD XXXX BR (Mapping X.25 address. ABCD is an IP address of the other party router (such as: s0), XXXX is the X.25 port address of the other party router (such as: S0) # x25 HTC X (configuring the highest bidirectional channel number. X value range 1-4095, According to the actual digital configuration of the Posts and Telecommunications) # x25 nVC X (configuring the virtual circuit number, X cannot exceed the number of data actually provided by the Postsho Administration) # EXIT S0 port configuration is completed, use the no shutdown command to activate E0 port. If the PING S0 port is normal, the X.25 IP address of the PING map is that the other router port IP address is not, it may be caused by: 1) Native X.25 address configuration error, re-post office check (X. 25 address length is 13); 2) Native mapping IP address or X.25 address configuration error, reconfiguration correct; 3) The other party IP address or X.25 address configuration error; 4) Native or other route configuration error. Ability to communicate with the other party, but have packet loss. In this case, there is generally the following possibilities: 1) The line conditions are not good, or the NIC, the RJ45 plug contact is poor; 2) X25 HTC maximum two-way channel number x value range and X25NVC virtual circuit number X beyond the post and telecommunications Bureau Number. The maximum bidirectional channel number and the virtual circuit have both the two values, but it is absolutely unable to exceed the digitally provided by the Post Office, otherwise the packet loss will occur. 3. Configuration # conf T # INT S2 (specified S2 port) # ip addr abcd xxxx (IP address for ABCD S2, XXXX is the subnet mask) # ip it 口 配置 完成 完成 完成 完成 完成 完成 完成 口can. 4. Frame relay configuration # conf T # int S0 # ip addr abcd xxxx (Abcd is the IP address of S0, xxxx is a subnet mask) # ENCAP FRANTE_RELAY (package FRANTE_RELAY protocol) # no nrzi_encoding (nrzi = no) # frame_relay lmi_type Q933A (LMI uses Q933A standard. LOCAL Management Interface "3: ANSI: T1.617, CCITTY: Q933A and Cisco unique standards) # fram-relay intf-type ABC (ABC is a frame relay device type, they The DTE device, DCE switch or NNI (Network contact interface) supported) # frame_relay interface_dlci 110 BR (Configure DLCI (DBL Connection Identifier)) # frame-relay Map IP Abcd XXXX Broadcast (establish a frame relay mapping.
ABCD is the other party IP address, XXXX is a local DLCI number, Broadcast allows broadcast forward to forward or update routing) # no shutdown (activation this port) # EXIT Frame Relay S0 port configuration, check S0 port with the ping command. If it is not normal, it is usually because the port is not activated, and S0 is activated with the no shutdown command. If the PING S0 port is normal, the IP address of the ping map is not normal, and may be a frame relay switch or a counter-configuration error that requires a comprehensive investigation. 5. Configure synchronous / asynchronous port (for 2522) # Conf T # int S2 # ph asyn (configurable S2 is asynchronous port) # pH sync (configurable S2 as synchronization port) 6. Dynamic Route Configuration # conf T # Router EIGRP 20 (using the EIGRP routing protocol. Common route protocols include RIP, IGRP, IS-IS, etc.) # passive-interface serial0 (if S0 is connected to X.25, enter this article) # Passive-Interface Serial1 (If S1 is connected to X.25, enter this article instruction) # network abcd (Abcd is the Ethernet address of this machine) # network xxxx (xxxx is the IP address of S0) # no auto-summary # exit 7. Static route configuration # ip router abcd xxxx yyyy 90 (ABCD is the Ethernet address of the other party router, xxxx is a subnet mask, YYY is a wide area network port address corresponding to the other party) # Dialer-List 1 Protocol IP Permail II. Comprehensive debugging When all the routers are all configured, a comprehensive debug can be made. 1. First activate the router's Ethernet port and all serial ports to be used. The method is to enter the mouth and perform NO SHUTDOWN. 2. The host connected to the router plus the default route (the central router's Ethernet address). The method is to execute under the ultra user of the UNIX system: Router Add Default XXXX 1 (XXXX is the E0 port address of the router). Each host has to increase the default routing, otherwise, it will not communicate properly. 3. Ping This router's router Ethernet port, if not, may not be activated or not on a network segment. Ping WAN No, if you don't pass, there is no default routing. Ping each other wide area network port, if not, the router configuration error. Ping host Ethernet port, if not, the other host does not add default routing. 4. Add the gateway (static routing) on the line X.25 host. The method is to execute under the ultra user of the UNIX system: router add x.x.x y.y.y.y 1 (x.x.x is the other party Ethernet address, y.y.y is the otherwise wide area network address). 5. Use Tracert to track routing to determine unparalleled network segments.
Router purchase ------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------- When choosing routers, pay attention to security, control software, network extension capabilities, network management System, with electric swolt capacity, etc. 1. Since the router is a key device in the network, the router must have the following security features for the network: (1) Reliability and line security reliability requirements are proposed for fault recovery and load capabilities. For routers, reliability is primarily reflected in both interface failures and network traffic increases, for this purpose, backup is an indispensable means of routers. When the primary interface fails, the backup interface automatically puts work to ensure the normal operation of the network. When the network traffic is increased, the backup interface can take the load sharing task. (2) Identity authentication in the identity authentication router mainly includes identity authentication when accessing the router, the identity authentication of the peer router, and the authentication of routing information. (3) Access control For the access control of the router, the hierarchical protection is required. Access control based on IP addresses and user access control. (4) When information is hidden with peer communication, it is not necessary to communicate with real identity. With address conversion, you can do hidden network addresses, just access external networks in a common address. In addition to the connection initiated by the internal network, the external users cannot directly access the network resources through the address conversion. (5) Data Encryption (6) Attack Detection and Prevention (7) Safety Management 2. The control software of the router is a key part of the router functions. From the installation of the software, the parameters are automatically set, the upgrade to the software version is essential. The more convenient software installation, parameter settings, and debugging, the easier user use, the easier to master, and can be better applied. 3. With the gradual increase in computer network applications, existing network scale may not meet the actual needs, and will result in an increase in network size, so the expansion capability is a network that must be considered during design and construction. The size of the extension mains mainly looks at the number of expansion slots supported by the router or the number of expansion ports. 4. With the construction of the network, the network scale will get more and large, the more difficult the network is maintained and managed, so network management is particularly important. 5. In the process of we install, debug, overhaul, and maintenance or expand the computer network, it will not be added to the network to increase or decline the device, which means that the network part may be swapped. Then the router supports charging and unlocking, is an important performance indicator of the router. The choice of external size If the network has completed building level integrated wiring, the engineering requires a network device to centrally manage, the 19-inch wide rack router, such as Cisco2509, Huawei 2501 (configured with Cisco2501). Without the above requirements, desktop routers such as Intel's 8100 and Cisco 1600 Series have a higher performance price ratio. The choice of protocols Since the initial LAN does not first go out and out of the product, many manufacturers such as Apple and IBM have proposed their own standards, producing the AppleTalk and IBM protocol, Novell's network operating system running IPX / SPX protocol, in When connecting these heterogeneous networks, you need a router to support these protocols. The Intel9100 Series and 9200 Series routers provide free support, 3COM series routing products also provide more extensive protocol support. Router as "black box" in network devices, working in the background.
When the user selects a router, more from the technical perspective, such as ductility, routing protocol interoperability, wide area data service support, internal ATM support, SAN integration capabilities. In addition, the choice of routers should also follow the following basic principles: the principle of standardization, the principle of technology, the principle of environmental adaptability, manageability principles, and fault-tolerant redundancy. For high-end routers, more should also consider whether and how to adapt to the high reliability, interface high scalability, and routing and data forwarding. High reliability, high scalability, and high performance "three high" characteristics are the key to the high-end router distinguish between low-end routers. -------------------------------------------------- -------------------------------------------- Cisco Router Introduction Many netizens of beginner router knowledge may be very unfamiliar with the initial configuration of the router. I am also confused when I start school, because I have a lot of questions I don't know how to be good, the initial configuration of a Cisco3640 that is recently debugged will sort out and you. Netizens exchange, if there is an omission, please refer to you. 1. With Cisco randomly with console line, one end connects at the Cisco router's console port, one end connects to the computer's COM port. 2. Turn on the computer and start the super terminal. Take a name for your connection, such as Cisco_Setup, use COM1 when you select the connection, next to select the second bit 9600, data bit 8, parity no, stop bit 1. Data stream control is not. The final selection is determined.
3. Open the router power, then the super terminal will appear: System Bootstrap, Verstem 11.1 (20) AA2, Early Deployment Release Software (fc1) Copyright (c) 1999 By Cisco Systems, Inc.c3600 Processor with 32768 KBYTES of Main WITH 32768 KBYTES OF MAIN Memory Main MEMORY IS Configured to 64 Bit Mode with Parity Disabled Program Load Complete, Entry Point: 0x80008000, Size: 0x4ed478 Self Decompressing the Image: ################################################################################################################################################################################################################################ ################################################################################################################################################################################################################################################ ######################################################################################################################################################################################################################################################################################################## #################################################################################################################################################################################################################################### ######################################################################################################################################################################################################################################################################################################### ############################################################################################################################################################################################################################################################################# ######################################################################################################################################################################################################################################################################################################## ################################################################################################################################################################################################################################################################################################## ############################################################################### ############################################# ] Restricted Rights Legend Use, Duplication, or Disclosure by The Government IS Subject To Restrictions As Set Forth In Subparagraph (C) of The Commercial Computer Softwar e -. Restricted Rights clause at FAR sec 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec 252.227-7013 cisco Systems, Inc. 170 West Tasman Drive.. San Jose, California 95134-1706 Cisco Internetwork Operating System Software (tm) 3600 Software (C3640-IM) IOS, Version 12.1 (2) T, RELEASE SOFTWARE (fc1) Copyright (c) 1986-2000 by cisco Systems, Inc. Compiled TUE 16-May-00 12:26 by ccai image text-base: 0x600088f0, data-base:
0x60924000 cisco 3640 (R4700) processor (revision 0x00) with 24576K / 8192K bytes of memory. Processor board ID 25125768 R4700 CPU at 100Mhz, Implementation 33, Rev 1.0 Bridging software. X.25 software, Version 3.0.0. 2 FastEthernet / IEEE 802.3 interface (s) 1 Serial network interface (s) DRAM configuration is 64 bits wide with parity disabled 125K bytes of non-volatile configuration memory 8192K bytes of processor board System flash (Read / Write) --- System Configuration Dialog.. - - Would you like to enter the initial configuration dialog? [YES / NO]: Y You enter the initialization configuration dialogue, choose Y AT Any Point You May ENTER A Question Mark '?' For Help. Uses Ctrl-C To Abort Configuration dialog at any prompt. Default settings are in square brackets '[]'. Basic management setup configures only enough connectivity for management of the system, extended setup will ask you to configure each interface on the system Would you like to enter basic management setup? [YES / NO]: N You enter Basic Configuration Installation, Choose N First, Would You Like To See The Curre NTITERFACE SUMMARY? [YES]: Y First, do you look at the current port status Any Interface listed with ok? Value "no"
does not have a valid configuration Interface IP-Address OK Method Status Protocol FastEthernet0 / 0unassigned NO unset up down Serial0 / 0 unassigned NO unset down down FastEthernet0 / 1unassigned NO unset up down Configuring global parameters:? Enter host name [Router]: RouterA input the name of the router the enable secret is a password used to protect access to privileged EXEC and configuration modes This password, after entered, becomes encrypted in the configuration enter enable secret:.. aaa input ciphertext the enable password is used when you do not specify an enable secret password, with some older software versions, and some boot images enter enable password:. bbb password (can not ciphertext same) The virtual terminal password is used to protect access to the router over a network interface enter virtual terminal. Password: CCC Enter the password of the virtual terminal (in remote login) Configure SNMP NetWork Management? [YES]: N configuration simple network management? Choose n configure ip? [YES]: Y Configure IP? NETE CONFIGURE IGRP ROUTING? [ YES: N Configuring the IGRP Routing Protocol? Choose N Configure Rip Routing? [NO]: Configure IGRP Routing Protocol? Select N Configu Re Bridging? [NO]: Configure the bridging? Choose n async Lines accept incoming modems calls. If you will have users DIALING IN VIA MODEMS, CONFIGURE THESE LINES. Configure async lines? [YES]: N-configured asynchronous line? Choose N Configuring Interface Parameters: Do you want to configure FasteThernet0 / 0 Interface? [YES]: YES: YES Do you want to configure FasteThernet0 / 0 interface? NEWNECTOR? [YES]: Y RJ45 with RJ45, choose Y Use THE 100 BASE-TX (RJ-45) Connector? NE OPERATE IN FULL-DUPLEX MODE? [NO]: Y Use full duplex mode? NOS: YES: Y is configured on this interface? NE IP Address For this interface: 192.168.0.1 Configuring the IP address of the interface (at this address of 192.168.0.1 Subnet Mask for this interface [255.255.255.0]: Configure the subnet mask of the interface. (The default is 255.255.255.0, you can Manual input modification) Class C NetWork IS 192.168.0.0, 24 Subnet Bits
Mask is / 24 do you want to configure serial0 / 0 interface? [YES]: Y Do you want to configure the Serial0 / 0 interface? SETE SOME Supported Encapsulations Are PPP / HDLC / FRAME-RELAY / LAPB / X25 / ATM-DXI / SMDS Choose Encapsulation Type [HDLC]: Select package (default package is HDLC, you can decide what to use the package type NO Serial Cable Seen. Choose Model (DCE /) based on the package type selected by your router. DTE) [DTE]: (Because you don't have a series of ports, you will choose the device type) Configure IP on this interface? [YES]: Y (Configuring IP on the Interface Configure IP Unnumbered On this Interface? [no]: ip Address for this interface: 172.16.0.5 Configuring the IP address of the interface (at this address is 172.16.0.5) Subnet Mask for this interface [2555.255.0]: 255.255.255.252 Configuring the subnet mask of the interface. (The default is 255.255.0.0, can be modified by manual input to 255.255.255.252) Class B NetWork IS 172.16.0.0, 30 Subnet Bits; Mask IS / 30 (Contains the same below) Do you want to configure Fastethernet0 / 1 Interface? [YES]: use the the 100 Base-TX (RJ-45) Connector? [YES]: OPERATE IN FULL-DUPLEX MODE? [NO]: Y Configure IP on this interface? [YES]: Y ip address for this interface: 172.16.0.9 Subnet Mask for The Interface [2555.255.0]: 255.255.255.252 Class B NetWork is 172.16.0. 0, 30 Subnet Bits;
mask is / 30 The following configuration command script was created: (to display your configuration out) hostname aaa enable secret 5 $ 1 $ ul / V $ ezbZFgvzGHD.YPSieC0Ew / enable password RouterA line vty 0 4 password ccc no snmp-server ip! routing no bridge 1! interface FastEthernet0 / 0 media-type 100BaseX full-duplex ip address 192.168.0.1 255.255.255.0! interface Serial0 / 0 encapsulation hdlc ip address 172.16.0.5 255.255.255.252! interface FastEthernet0 / 1 media-type 100BaseX full- Duplex IP Address 172.16.0.9 255.255.255.252 Dialer-List 1 protocol ip permit dialer-list 1 protocol ipx permit! End The following prompts if you save this setting [0] Go to the ios Command Prompt without saving this config. [1] Return Back to the setup without saving this config. [2] Save this configuration to nvram and exit. Enter Your Selection [2]: 2 Select 2 Save Settings and Deposit into NVRAM BUILDING Configuration ... [OK] Use the enabled mode 'configure'