Showing posts with label cisco. Show all posts
Showing posts with label cisco. Show all posts

Monday, June 23, 2014

Difference Between Switch and Bridge

What is the Difference Between Switch and Bridge in Networking

SWITCHBRIDGE

 Switches are available in both manageable and non manageable. Bridges are available only in non manageable

Number of ports are more than bridgeNumber of ports are less than switch

They can have separate spanning tree for  each VLANs in the switchThey can have only one spanning tree instance per bridge.

Large frame buffersLow frame buffer

Switches are Hardware based, perform forwarding in hardwareBridges are software based, perform forwarding in software

Switches were just the next step which eliminated the collision domain completelyBridges were historically used to reduce the size of collision domain created by hubs

Supports cut-through switchingDoesn't supports cut-through switching

 A switch is a network access device that provides a centralized point for LAN communications,media connections and management activities-like Hub. A bridge is an inter networking device used to contact separate LAN's or link two network segments, and to filter information between them as well as traffic collisions, and other network problems.

putty as HyperTerminal in Windows Vista/ Windows 7

How to use putty as HyperTerminal in Windows Vista/ Windows 7

In this post I covered how to use Putty as HyperTerminal in Windows Vista or Windows 7 machines. HyperTerminal is no longer part of Windows Operating systems. There are several options you can use to replace its functionality. Earlier I covered how to use XP HyperTerminal client in Windows Vista orWindows 7.

Download Putty:

Download and use open source Putty terminal software.
You can get Putty and click here for  Download.

For Laptops:



1. First install DB 9 to USB converter drivers in your Laptop. Plug in your console cable to Cisco router, connect other end to DB9 to USB converter and plug in USB in your Vista or Windows 7 Laptop.


2. Now, you have to check the communication port (COM port) number from Computer Management (Start –> Control Panel –> Administrative Tools –> Computer Management –> Device Manager and look at Port (COM & LPT).

For Desktops:

3.      Plug in Console cable in Cisco Router or Switch and connect other end in COM 1 or COM 2 port on Desktop machine.

Configure Putty with Console Settings:

4.      Start Putty by double clink on it and configure HyperTerminal settings by visiting Category-> Connection->Serial from left side.
For Cisco Router or Switch follow below console port settings:
Bits per Second –> 9600
Data bit –> 8
Parity –> None
Stop bit–> 1
Flow control –> None
Putty Serial Settings
Putty Hyperterminal Settings











Start putty:

6. To start putty select category-> session ->serial and click on open, It will open the device in separate window and enter login credentials to access the device.
Putty Serial Login
Putty Serial Login











Putty Login
Putty Login








Other options for hyperTerminal software in Windows Vista/ 7

  • TeraTerm Pro open source terminal
  • HyperTerminal Private Edition version 6.3
  • If you have an old Windows XP installation, find and copy the file named “hypertrm.dll” and “hypertrm.exe” to Windows Vista in the same location. Run hypertrm.exe from run > cmd.
from: ciscoconsole website

Friday, August 2, 2013

setup PPPoE, NAT, DHCP server on Cisco Router

How to setup PPPoE, NAT,  DHCP server on Cisco Router 

Set up PPPoE, DHCP server, NAT in router cisco.
Figure:

Configuration file:

-------------------------------------------------------------------------------------------------
Current configuration : 1489 bytes
!
version 15.0
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
ip source-route
!
!
ip cef
!
!#########Create DHCP Server###########
ip dhcp pool InternalIP
   network 192.168.1.0 255.255.255.0
   dns-server 203.189.128.2 203.189.128.1
   default-router 192.168.1.1
!######################################
!        
!        
multilink bundle-name authenticated
!        
!        
!        
license udi pid CISCO2821 sn FGL151311SM
username cisco password 0 cisco
!        
!        
!        
!        
!        
!
!##############Enable PPPoE client on GigabitEthernet0/0##########        
interface GigabitEthernet0/0
 no ip address
 ip tcp adjust-mss 1452
 duplex auto
 speed auto
 pppoe enable group global
 pppoe-client dial-pool-number 1
 no cdp enable
!##################################################################
!        
interface GigabitEthernet0/1
 ip address 192.168.1.1 255.255.255.0
 ip nat inside
 ip nat enable
 ip virtual-reassembly
 ip tcp adjust-mss 1452
 duplex auto
 speed auto
!  
!###########setup PPPoE dialer 0 interface#################     
interface Dialer0
 description Connect to ONLINE
 ip address negotiated
 ip mtu 1454
 ip nat outside
 ip nat enable
 ip virtual-reassembly
 encapsulation ppp
 ip tcp adjust-mss 1452
 dialer pool 1
 dialer-group 1
 ppp authentication pap callin
 ppp pap sent-username Your_Username password 0 Your_Password
 no cdp enable
!###########################################################
!        
ip forward-protocol nd
!        
!        
no ip http server

###########Setup NAT########################
ip nat inside source list 99 interface Dialer0 overload
ip route 0.0.0.0 0.0.0.0 Dialer0
!        
access-list 99 permit 192.168.1.0 0.0.0.255

######################################
!        
!        
control-plane
!        
!        
line con 0
 login local
line aux 0
!##########Enable Telnet Access#########################
line vty 0 4
 privilege level 15
 password onlinecisco
 login
!#######################################################   
!        
scheduler allocate 20000 1000
end  

Thursday, August 1, 2013

Configure Router-on-a Stick, sub-interface on router (CISCO)

Configure Router-on-a Stick, sub-interface on router (CISCO)

What is Router-on-a-stick
Router-on-a-stick allows multiple virtual LANs to coexist on the same physical LAN. This means that two machines attached to the same switch cannot send Ethernet frames to each other even though they pass over the same wires. If they need to communicate, then a router must be placed between the two VLANs to forward packets, just as if the two LANs were physically isolated. The only difference is that the router in question may contain only a single Ethernet NIC that is part of both VLANs. Hence, "one-armed".  (wikipedia.org)

How to configure router-on-a-stick in cisco packet tracer.
-Network Diagram

-Router R1 configuration: Sub-interface

R1#sh running-config
Building configuration...

Current configuration : 708 bytes
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname R1
!
!!
!
interface FastEthernet0/0
 no ip address
 duplex auto
 speed auto
!
interface FastEthernet0/1
 no ip address
 duplex auto
 speed auto
!
interface FastEthernet0/1.10
 encapsulation dot1Q 10
 ip address 192.168.10.1 255.255.255.0
!
interface FastEthernet0/1.20
 encapsulation dot1Q 20
 ip address 192.168.20.1 255.255.255.0
!
interface FastEthernet0/1.30
 encapsulation dot1Q 30
 ip address 192.168.30.1 255.255.255.0
!
interface Vlan1
 no ip address
 shutdown
!
ip classless
!!
!
line con 0
line vty 0 4
 login
!
!
!
end\


-Switch SW1 configuration: Vlan and Trunk

SW1#sh run
Building configuration...

Current configuration : 1048 bytes
!
version 12.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname SW1
!
!
!
interface FastEthernet0/1
 switchport mode trunk
!
interface FastEthernet0/2
 switchport access vlan 10
!
interface FastEthernet0/3
 switchport access vlan 20
!
interface FastEthernet0/4
 switchport access vlan 30
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface Vlan1
 no ip address
 shutdown
!
!
line con 0
!
line vty 0 4
 login
line vty 5 15
 login
!
!
end




--------------------------------------------------------------------------------------------------------------

You can download the cisco packet tracer file: router-on-a-stick.pkt

Sunday, January 6, 2013

Password Recovery/Reset Steps for Cisco Catalyst Switch


Password Recovery/Reset Steps for Cisco Catalyst  Switch


The Cisco switch configuration allows an end user to recover from a lost password by interrupting the boot sequence during power-on with physical access and we can assign new password for theCisco Switch. These recovery procedures require that you have physical access to the switch. Theprocedure for recovering the password will vary depending upon the Cisco Catalyst series and model. You’ll need a few items in place before you begin to attempt a Cisco password reset.
I will cover password recovery procedure for Cisco Catalyst Switch 2960 and this procedure will also work for other Cisco Catalyst switches 2900XL/3500XL, 2940, 2950/2955, 2960, and 2970 Series, as well as the Cisco Catalyst Layer 3 fixed configuration switches 3550, 3560, and 3750 Series.
Next, find the below PDF document  for step-by-step instruction on how to reset and recover the password on your Cisco Catalyst switch.

Password Recovery Steps for Cisco Catalyst 2960 Switch

Step 1:
Connect your PC to the console port of the Cisco switch and open terminal emulation Software on your PC (Ex. Hyper Terminal).
Use the following terminal emulation settings:
  • Bits per second (baud): 9600
  • Data bits: 8
  • Parity: None
  • Stop bits: 1
  • Flow Control: Xon/Xoff
Cisco Password Recovery



Step 2:
First Power off the switch, then press and hold ”mode button” while you power on the switch again. Hold it for about 15 seconds until the SYS led is solid green, and then release it.
switch should then give you this prompt:
switch:
Step 3:
To initialize the flash file system, execute the flash_init command:
switch: flash_initInitializing Flash…
flashfs[0]: 5 files, 1 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32514048
flashfs[0]: Bytes used: 8059904
flashfs[0]: Bytes available: 24454144
flashfs[0]: flashfs fsck took 10 seconds.
…done Initializing Flash.
The switch will now give a bunch of messages about the flash memory, hopefully one of them will be ‘done initializing flash’ as above shown
Step 4:
You can now list the contents of your flash by running
switch: dir flash:
Directory of flash: /
2 -rwx 12300 <date> config.text
4 -rwx 1906 <date> private-config.text
5 -rwx 676 <date> vlan.dat
6 -rwx 8040418 <date> c2960-lanbasek9-mz.122-50.SE3.bin
7 -rwx 2072 <date> multiple-fs
Step 5:
There should be a file named ‘config.text’, in the Flash directory. Now you have to rename this file as follows:
switch: rename flash:config.text flash: oldconfig.backup
Step 6:
Now run the Switch by using  boot command as:
switch: boot
Step 7:
When the switch is booted, then old configuration will be gone.Enable switch now using below command.
Switch>enable
Switch#
Step 8:
To recover the old configuration, change the configuration file and re-name back to “config.text”.
Switch#rename flash: oldconfig.backup flash:config.text
And now to replace the running configuration with the backup
Switch#copy flash: config.text running-config
Destination filename [running-config]?
Press enter, and you will have your old switch configuration back and you are enabled.
Step 9:
Copy the configuration file into memory.
Switch#copy flash:config.text system:running-config
Destination filename [running-config]?—–Press Return or Enter.1131 bytes copied in 0.760 secs
Switch#
The configuration file is now reloaded.
Step 10:
Overwrite the current passwords that you do not know.
Switch# conf t
Switch(config)#enable secret <new_secret_password>
Switch(config)#enable password <new_enable_password>
Switch(config)#line vty 0 15
Switch(config-line)#password <new_vty_password>
Switch(config-line)#login
Switch(config-line)#line con 0
Switch(config-line)#password <new_console_password>
Write the running configuration to the configuration file with the write memory
Switch#write memory
Building configuration..
[OK]
Switch#
Step 11:
Reload the switch using the reload command to cross verify new login details.
Switch#reload
Note: The password recovery procedure can be different depending on the Cisco switch series, so you should refer to the product documentation before you attempt a password recovery.
Reference:
1.http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_tech_note091
86a00801746e6.shtml
2.CCNA Exploration 4.0 – 2.4 Configuring Switch Security
Video- Cisco Catalyst Switch Password Recovery:
Watch the Video on Cisco Catalyst Switch 2960 password recovery procedure.


How to Setup and Configure Cisco PIX and ASA Firewall in GNS3


How to Setup and Configure Cisco PIX and ASA Firewall in GNS3


Setup and Configure Cisco PIX and ASA Firewall in GNS3

Fallow the below steps to setup, run and configure Cisco PIX and ASA Firewall in GNS3 and also you can find the video on how to setup and Configure Cisco PIX and ASA Firewall in GNS3.

1. Download GNS3 Simulator software and Install Simulator Software

b. GNS3 v0.7.4 all-in-one install under Windows

Fig. GNS3 simulator download










2. Download all GNS3 files for Cisco PIX and ASA Firewalls.
You can download required GNS3 files from blow or by vising below link.
GNS3 Files For Cisco ASA and PIX Firewall
download cisco asa gns3 files
Fig. Download GNS3 files for Cisco PIX and ASA










3. Cisco PIX Firewall Setup in GNS3
GNS3 configuration for Cisco ASA and PIX
Fig. GNS3 configuration for Cisco ASA and PIX









a. Click on Edit
b. Click on Prefrences
c. Click on Qemu
d. Click on the PIX tab
e. Open the file pixinfo.txt that you downloaded
f. Enter the information for the Key and Serial number
Pix configuration on GNS3
g. Point the binary file to the pix724.bin file you downlaoded
h. Identifier Name type PIX724
i. Click on Apply and OK
Now you drag and drop Cisco PIX  Firewall from left side GNS3 Symbols, run and configure it.

 4. Cisco ASA Firewall Setup in GNS3

a. Click on Edit
b. Click on Prefrences
c. Click on Qemu
d. Click on the ASA tab
e. point both files asa802-k8.initrd.gz and asa802-k8.kernel in respected tab.
f. add Identifier Name for ASA firewall.
g. Click on Apply and OK
Fig. Cisco asa setup on GNS3
Fig. Cisco ASA setup on GNS3










5. Video- How to setup and Configure the Cisco PIX  Firewall in GNS3


6. Video- How to setup and Configure the Cisco ASA Firewall in GNS3

*************Note***********************
License Activation Keys for Cisco ASA Firewall
activation-key 0x4a3ec071 0x0d86fbf6 0x7cb1bc48 0x8b48b8b0 0xf317c0b5
activation-key 0xb23bcf4a 0x1c713b4f 0x7d53bcbc 0xc4f8d09c 0x0e24c6b6