<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1839717565525447308</atom:id><lastBuildDate>Sat, 05 Oct 2024 01:59:26 +0000</lastBuildDate><category>IP Phones</category><category>Routing Protocols</category><category>Cisco IOS</category><category>Router</category><category>Router Configuration</category><category>PORTS</category><category>Ping Command</category><category>RIP</category><category>TACACS</category><title>Cisco Networking</title><description></description><link>http://i-networking.blogspot.com/</link><managingEditor>noreply@blogger.com (insanely~positive)</managingEditor><generator>Blogger</generator><openSearch:totalResults>13</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-464578431699717071</guid><pubDate>Mon, 01 Jun 2009 12:20:00 +0000</pubDate><atom:updated>2009-06-01T05:25:09.755-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">RIP</category><category domain="http://www.blogger.com/atom/ns#">Routing Protocols</category><title>Routing Information Protocol (RIP)</title><description>RIP is a distance vector protocol meaning that it uses only hop counts to determine the best way to a remote network. By default, a maximum of 15 hops are made to the destination network, on the 16th hop the network is identified as unreachable. In order to configure routing we use router and network commands. &lt;br /&gt;&lt;br /&gt;There are two versions of RIP. Version 1 does not support classless routing, which means that it does not support subnets; so all the devices in the network should be from the same network. However, RIP version 2 supports classless routing.&lt;br /&gt;&lt;br /&gt;Let us consider the following network and assume that the ip address for the interfaces has been assigned. Let us see how to configure RIP&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjya4aLlRzjT0AYJ7cf6YzIBQaYhX-wiCvoxkUcPog__rXhPmM2jAZb_X6SMGVtV4zLrQSRLmjGrsWGZUCu1lLcMxhO_MCpuQWpxM1Ov1HXrIepI2NAzG2is2bl1nwCGwOsbQEdFfB6JWvE/s1600-h/1.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 146px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjya4aLlRzjT0AYJ7cf6YzIBQaYhX-wiCvoxkUcPog__rXhPmM2jAZb_X6SMGVtV4zLrQSRLmjGrsWGZUCu1lLcMxhO_MCpuQWpxM1Ov1HXrIepI2NAzG2is2bl1nwCGwOsbQEdFfB6JWvE/s400/1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5342333370151010770&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Router A(config)#router rip&lt;br /&gt;Router A(config-router)#network 192.168.10.0&lt;br /&gt;Router A(config-router)#network 192.168.20.0&lt;br /&gt;Router A(config-router)#^Z&lt;br /&gt;Router A#&lt;br /&gt;&lt;br /&gt;Router B(config)#router rip&lt;br /&gt;Router B(config-router)#network 192.168.20.0&lt;br /&gt;Router B(config-router)#network 192.168.30.0&lt;br /&gt;Router B(config-router)#network 192.168.40.0&lt;br /&gt;Router B(config-router)#^Z&lt;br /&gt;Router B#&lt;br /&gt;Router C(config)#router rip&lt;br /&gt;Router C(config-router)#network 192.168.40.0&lt;br /&gt;Router C(config-router)#network 192.168.50.0&lt;br /&gt;Router C(config-router)#^Z&lt;br /&gt;Router C#&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;br /&gt;The ‘show ip route’ command will give you the details of the routing &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Router A#sh ip route&lt;br /&gt;R 192.168.50.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0&lt;br /&gt;R 192.168.40.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0&lt;br /&gt;R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0&lt;br /&gt;C 192.168.20.0 is directly connected, Serial0/0&lt;br /&gt;C 192.168.10.0 is directly connected, FastEthernet0/0&lt;br /&gt;Router A#&lt;br /&gt;&lt;br /&gt;Router B#sh ip route&lt;br /&gt;R 192.168.50.0 [120/1] via 172.16.40.2, 00:00:11, Serial0/1&lt;br /&gt;C 192.168.40.0 is directly connected, Serial0/1&lt;br /&gt;C 192.168.30.0 is directly connected, FastEthernet0/0&lt;br /&gt;C 192.168.20.0 is directly connected, Serial0/0&lt;br /&gt;R 192.168.10.0 [120/1] via 172.16.20.1, 00:00:21, Serial0/0&lt;br /&gt;Router B#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Router C#sh ip route&lt;br /&gt;C 192.168.50.0 is directly connected, FastEthernet0/0&lt;br /&gt;C 192.168.40.0 is directly connected, Serial0/0&lt;br /&gt;R 192.168.30.0 [120/1] via 192.168.40.1, 00:00:04, Serial0/0&lt;br /&gt;R 192.168.20.0 [120/1] via 192.168.40.1, 00:00:26, Serial0/0&lt;br /&gt;R 192.168.10.0 [120/2] via 192.168.40.1, 00:00:04, Serial0/0&lt;br /&gt;Router C#&lt;br /&gt;&lt;br /&gt;In the above ‘show ip route’ result, C represent directly connected while R represents network added dynamically through RIP. [120/1] represents the administrative distance and metric. For directly connected network administrative distance is 1 and for RIP it is 120. The metric shows the number of hop; each time the packet goes though a router to reach the destination, one hop is added. If the destination network is not reached within 16 hops, destination unreachable message is given.&lt;br /&gt;&lt;br /&gt;Even though RIP is simple and easy to configure, the disadvantage is that the routing table is broadcasted every 30 seconds by the routers, so there is a big wastage of bandwidth. Also the default hop count is 16; therefore it cannot be used in large networks.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;To configure RIP version 2 is easy in case of Variable Length Subnet Masked networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Router C(config)#router rip&lt;br /&gt;Router C (config-router)#network 192.168.40.0&lt;br /&gt;Router C (config-router)#network 192.168.50.0&lt;br /&gt;Router C (config-router)#version 2</description><link>http://i-networking.blogspot.com/2009/06/routing-information-protocol-rip.html</link><author>noreply@blogger.com (insanely~positive)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjya4aLlRzjT0AYJ7cf6YzIBQaYhX-wiCvoxkUcPog__rXhPmM2jAZb_X6SMGVtV4zLrQSRLmjGrsWGZUCu1lLcMxhO_MCpuQWpxM1Ov1HXrIepI2NAzG2is2bl1nwCGwOsbQEdFfB6JWvE/s72-c/1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-3119283636397369758</guid><pubDate>Mon, 22 Dec 2008 01:06:00 +0000</pubDate><atom:updated>2008-12-21T17:32:44.113-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Routing Protocols</category><title>Static Routing</title><description>&lt;div style=&quot;text-align: left;&quot;&gt;Static routing is a straight forward process. If you want packets to be routed between two routers, update each router’s routing table with the network address of the other router as well as the path to get there&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;This is how it is done,&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Name the routers and give the Ethernet and Serial ports desired IP address&lt;/li&gt;&lt;br /&gt;&lt;li&gt;When you give IP addresses, make sure the serial link that connects both the router are in same network&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Add the destination network to each router’s routing table using the add route command in the Global config mode.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(102, 51, 0);&quot;&gt;Let’s configure static routing in the network shown below,&lt;/span&gt;&lt;/p&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJnNudkn73jCGPYCw8LN1NFhEatbAJNuzgZ1CPKkr5AWP1CJbBtc8Xxo0tq3YG-00sa2ffZvU3tmzkNIEr-Q2ZjBGzamg1uXbEOwkJnDCG4eFjpB9rkGPsLs7YyX7QpzP63jS9BTkPV9rb/s400/Drawing1.jpg&quot; style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 119px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5282417901730808914&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; line-height: 18px; &quot;&gt;&lt;ul&gt;&lt;li&gt;Assign IP address to the Ethernet and Serial ports of the first router R1&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNlMGueWdE_63EeMsaNgQBPDfZeXnacSNSsaJFgnnJLbBdO3YHry1pHopxZ3F8N8ip8rXQyQ490O5Sx1-8Q_bkgopODrt_oLwDPBXes3BPA6PdMvG5UNw_2EX4tc58hA3b2zglz0ReL8Ve/s400/5-assign+IP.jpg&quot; style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 273px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5282417916795988882&quot; /&gt;&lt;ul&gt;&lt;li&gt;Set      the clock rate to 64000 at the serial port of DCE - Data Communication      End. When two routers are connected in a network, one acts as the DCE and      the other as a DTE – Data Termination End&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1gTLQjhPLb5am7XjhfvaQskKgYVJTFW63fiF9UrRZ5gkHrjSEf8TBSMATZv-fKk8h__QNu3D5sb6aPRvRfjP3sem43FdVDcxz0YsQRGfphIFPpuGEzAmd3u-eczcuCbwYdIhIWYGKKyYV/s400/clock.jpg&quot; style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 328px; height: 77px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5282417918870523874&quot; /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: left;margin-bottom: 0.0001pt; &quot;&gt;&lt;span style=&quot;font-size:12.0pt;line-height:115%; font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;color:black&quot;&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li style=&quot;text-align: center;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: left;margin-bottom: 0.0001pt; &quot;&gt;&lt;span style=&quot;font-size:12.0pt;line-height:115%; font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;color:black&quot;&gt;Now add the destination network to the routing table and check whether it is connected serially using &lt;i style=&quot;mso-bidi-font-style:normal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(102, 51, 0);&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;show ip route&lt;/span&gt;&lt;/span&gt; &lt;/i&gt;command&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxVxBX0iOMobpddAPSCLHbTHA2vcThMIytxtQ0J4h8zZzzfUk7gMelTLiBftkmWG-TMtxSN2TY7PN4Pgs1lT5dIC_boMnoDVUnFr8YV24_SPoIO3qZ6Lvas7qXWkWiGp03PtLLPMa68ImE/s400/Add+network.jpg&quot; style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 179px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5282417913611251682&quot; /&gt;&lt;/li&gt;&lt;li style=&quot;text-align: left;&quot;&gt;The same procedure is done on the second router. Once this is done, you can ping all the ports successfully&lt;/li&gt;&lt;/ul&gt;&lt;/span&gt;</description><link>http://i-networking.blogspot.com/2008/12/static-routing.html</link><author>noreply@blogger.com (insanely~positive)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJnNudkn73jCGPYCw8LN1NFhEatbAJNuzgZ1CPKkr5AWP1CJbBtc8Xxo0tq3YG-00sa2ffZvU3tmzkNIEr-Q2ZjBGzamg1uXbEOwkJnDCG4eFjpB9rkGPsLs7YyX7QpzP63jS9BTkPV9rb/s72-c/Drawing1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-6075390862749794242</guid><pubDate>Mon, 22 Dec 2008 00:58:00 +0000</pubDate><atom:updated>2008-12-21T17:06:32.925-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Routing Protocols</category><title>Routing Basics</title><description>&lt;div align=&quot;left&quot;&gt;&lt;strong&gt;Routing Basics&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;The router must know the following details in order to route packets to the destined address&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;left&quot;&gt;Destination Address&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;left&quot;&gt;Neighbor routers from which it can learn about remote networks&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;left&quot;&gt;Possible routes to all remote networks&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;left&quot;&gt;The best route to each remote network&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p align=&quot;left&quot;&gt;The router can learn these information from the neighboring router or an administrator can manually feed all these information. In &lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;dynamic routing&lt;/span&gt;&lt;/strong&gt;, the routing table is automatically updated with all these information. In case of &lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;static routing&lt;/span&gt;&lt;/strong&gt; an administrator has to manually feed in the network details of the neighboring as well as remote networks for the packet to be route and every time a device is added or removed, the administrator has to manually update each and every routing table&lt;/p&gt;</description><link>http://i-networking.blogspot.com/2008/12/routing-basics.html</link><author>noreply@blogger.com (insanely~positive)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-4420733894349916255</guid><pubDate>Wed, 10 Dec 2008 01:14:00 +0000</pubDate><atom:updated>2008-12-09T17:30:01.291-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Router</category><category domain="http://www.blogger.com/atom/ns#">Router Configuration</category><title>Configuring a Cisco Router</title><description>&lt;div&gt;In the previous posts, I have explained how to upload the IOS and create a start up configuration, now we can configure the router which includes naming and setting passwords.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#660000;&quot;&gt;Name the Router: &lt;/span&gt;&lt;/strong&gt;An un-configured router will show the device name as &lt;strong&gt;Router&gt;&lt;/strong&gt; by default; you have to give it a specific name so that it can be identified easily in a network. For this, we enter the Privilege EXEC mode and give it a host name,&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#660000;&quot;&gt;Router&gt;&lt;br /&gt;Router&gt;enable&lt;br /&gt;Router#configure terminal&lt;br /&gt;Router(config)#hostname CORE&lt;br /&gt;CORE(config)&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Now we have named the Router as ‘CORE’. This is the same way how you name a Cisco Switch.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#660000;&quot;&gt;Password protecting a router:&lt;/span&gt;&lt;/strong&gt; There are three types of password that can be use to control access on a router. The first one is to limit access to the User EXEC mode; the second one is to limit access to the Privileged EXEC mode and the third one to limit access to the router through telnet.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#660000;&quot;&gt;Console Password:&lt;/span&gt;&lt;/strong&gt; The console password would limit access to the User EXEC mode in a router, which means that if someone connects a PC to the router, he won’t be able to get to the User EXEC mode.&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color:#660000;&quot;&gt;CORE&gt;enable&lt;br /&gt;CORE#configure terminal&lt;br /&gt;CORE(config)#line console 0&lt;br /&gt;CORE(config-line)#password 12345&lt;br /&gt;CORE(config-line)#login&lt;br /&gt;CORE(config-line)#exit&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#660000;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;It’s important to use the &lt;em&gt;login&lt;/em&gt; command because it’s like asking the router to prompt for the password when someone tries to login. Without the login command, the user won’t be asked for a password. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#660000;&quot;&gt;Enable Mode Password:&lt;/span&gt;&lt;/strong&gt; This password control access to the Privileged EXEC mode. So you can give the user a low level access with the console password and a high level access with the enable mode password.&lt;br /&gt;Continuing with the above configuration,&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;span style=&quot;color:#660000;&quot;&gt;CORE(config)#enable password 121212&lt;br /&gt;CORE(config)#enable secret NETWORK&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#660000;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;There are two ways of setting enable password, you can either use the command &lt;span style=&quot;color:#660000;&quot;&gt;enable password &lt;pw&gt;&lt;/span&gt;or &lt;span style=&quot;color:#660000;&quot;&gt;enable secret &lt;pw&gt;&lt;/span&gt;. The difference is that if don’t use enable secret, the password you type in will appear in the running configuration as plain text, but if you use the enable secret command, the password will be encrypted. If you use both the methods like I did in the above configuration, only the encrypted password will be accepted. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#660000;&quot;&gt;Telnet Password:&lt;/span&gt;&lt;/strong&gt; Telnet is used to login to a router remotely. While the two passwords explained above are optional, Telnet won’t work unless and until you set a password for Telnet in your router.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#660000;&quot;&gt;CORE(config)#line vty 0 4&lt;br /&gt;CORE(config-line)#password CISCO&lt;br /&gt;CORE(config-line)#login&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Here &lt;em&gt;vty 0 4&lt;/em&gt; refers to 5 virtual terminals, which means that 5 users can connect to your router at the same time.&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;div&gt;This is how the configuration would look like,&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5277966182606480674&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 465px; CURSOR: hand; HEIGHT: 455px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTiD59Tl2a2C8pE98WXE_crJMZxh_nUAPG8mqpYhcKyDSGnSUk0V_PEuz4NJpVBHiuNvO7CBYv0H3swWQzjRCYY0ZDfGmoON_iHrXfuznZY9NQ_lzzkRxUVhydsHVqOWllGuDhxA_1gQ8S/s400/4.jpg&quot; border=&quot;0&quot; /&gt;Now we have to save this configuration in the NVRAM, so that in case you have to reboot the router, the configuration is not erased. For this, you can use ‘&lt;em&gt;Write’&lt;/em&gt; of ‘&lt;em&gt;copy running-config startup-config&lt;/em&gt;’.  This procedure can be anytime while configuring also.&lt;/p&gt;&lt;p&gt;If you run ‘show run’ command, you can see that only the enable mode password is encrypted, the rest are in plaintext. In order to encrypt the entire password you can run the ‘&lt;em&gt;&lt;span style=&quot;color:#660000;&quot;&gt;Service password-encryption&lt;/span&gt;&lt;/em&gt;’ in the config mode.&lt;/p&gt;</description><link>http://i-networking.blogspot.com/2008/12/configuring-cisco-router.html</link><author>noreply@blogger.com (insanely~positive)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTiD59Tl2a2C8pE98WXE_crJMZxh_nUAPG8mqpYhcKyDSGnSUk0V_PEuz4NJpVBHiuNvO7CBYv0H3swWQzjRCYY0ZDfGmoON_iHrXfuznZY9NQ_lzzkRxUVhydsHVqOWllGuDhxA_1gQ8S/s72-c/4.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-7995884137017327935</guid><pubDate>Sun, 07 Dec 2008 00:22:00 +0000</pubDate><atom:updated>2008-12-06T16:28:24.458-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Router Configuration</category><title>Router booting process</title><description>The points below are the step by step process which runs in a router when you switch it on.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;The first thing it does is a POST, Power On Self Test, which checks whether all the components like the fan, interfaces, memory and CPU are working.&lt;/li&gt;&lt;li&gt;The router then loads the IOS. There are three possible locations to find an IOS,&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;          - Flash Memory, which is the default location&lt;/p&gt;&lt;p&gt;         - TFTP server&lt;/p&gt;&lt;p&gt;         - ROM, the router will boot in the ROM Monitor Mode&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;br /&gt;Now the router has booted up and it looks for a startup configuration file in the NVRAM. Whenever we configure a router, the changes are done in the RAM memory and it has to copied to the NVRAM (Non-Volatile RAM) using the ‘write’ command, so that when you restart the router the startup configuration file is still there. &lt;/li&gt;&lt;li&gt;If there is no valid startup configuration file, the router prompts you to go to a set up mode. This is a tedious method, so type No and then the router prompts whether you would like to have an auto install. Press Enter key. The router auto configures and takes you to the User EXEC mode.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Now you have a fresh Cisco router with an IOS and a startup configuration, the next thing we configure is Host names and password for access control.&lt;/p&gt;</description><link>http://i-networking.blogspot.com/2008/12/router-booting-process.html</link><author>noreply@blogger.com (insanely~positive)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-6507244458324934656</guid><pubDate>Wed, 03 Dec 2008 20:27:00 +0000</pubDate><atom:updated>2008-12-03T12:46:53.667-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco IOS</category><category domain="http://www.blogger.com/atom/ns#">Router</category><title>Setting up a Cisco Device – Installing IOS</title><description>IOS, as you know refers to Internetwork Operating System which works only on Cisco devices; it comes in the form of binary (.Bin) file. While selecting an IOS image, you have to first check whether it’s compatible with your device.&lt;br /&gt;&lt;br /&gt;The naming of the IOS image is done in such a manner that it contains the compatible device name, the version, in which memory the IOS is going to run and the compression type.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;PPPPP - FFFF - MM&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;• ‘P’ refers to the Platform. It’s usually the device name. Keep in mind that it may not be a router always, but can be any Cisco device that runs on an IOS.&lt;br /&gt;• ‘F’ refers to the features. Like n for IPX, d for Desktop Subset etc.&lt;br /&gt;• The first ‘M’ refers to the run time memory, i.e. where the image is going to run on the router. (F-Flash, M-RAM, R-ROM, L-Relocated at run time)&lt;br /&gt;• The second ‘M’ refers to the compression technique used to compress the image so that it can be transferred to the router. (Z-Zip Compression, X-MZIP Compression, W-STAC Compression)&lt;br /&gt;&lt;br /&gt;Examples of an image file &lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;c3640–ds–mz.&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Getting ready to upload an image file:&lt;/strong&gt;&lt;br /&gt;If you are uploading IOS image file on a fresh device or just upgrading with a latest version, make sure the version of the IOS is compatible with your device and you have enough flash memory. Use ‘&lt;strong&gt;show version&lt;/strong&gt;’ and ‘&lt;strong&gt;show flash&lt;/strong&gt;’ command for this.&lt;br /&gt; In order to upload the IOS file into the device you require a TFTP server. Once you have the TFTP server installed in your system, it has to set in the server mode then ping your Cisco device to check for connectivity.  Now you are good to go.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;IOS uploading process:&lt;/strong&gt;&lt;br /&gt;. Launch the TFTP server and set the default directories for upload and download&lt;br /&gt;In the privileged mode, type the command ‘&lt;strong&gt;copy tftp flash&lt;/strong&gt;’. This will copy the IOS file in the upload directory to the flash memory&lt;br /&gt;. When prompted for the address of the remote host, type in the IP address of your system&lt;br /&gt;. And when prompted for the source file name, type in the IOS image file name and add the extension .bin&lt;br /&gt;. Once the erase and upload process is done, the device restarts and boot under the new IOS.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;When the IOS is corrupted of erased:&lt;/strong&gt;&lt;br /&gt;If something goes wrong, like uploading a non compatible IOS image or the image gets corrupted, the devices gets booted in a ‘&lt;strong&gt;ROM monitor mode&lt;/strong&gt;’  which is like the ‘safe mode’ in Windows. This can be identified with the prompt ‘&lt;strong&gt;hostname (boot)&gt;&lt;/strong&gt;’&lt;br /&gt;&lt;br /&gt;This is possible because an operating system is loaded in the ROM memory of the device to boot in case the IOS image fails and since this OS is in the ROM memory, there is no question of it getting corrupted.&lt;br /&gt;Now you can continue the process of uploading IOS and make sure you don’t make any mistakes this time.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some copy commands:&lt;/strong&gt;&lt;br /&gt;To copy from router to system:       R#copy run tftp&lt;br /&gt;To copy from system to router:       R#copy tftp run&lt;br /&gt;To copy from flash to system:        R#copy flash tftp&lt;br /&gt;To copy from system to flash:        R#copy tftp flash&lt;br /&gt;For all the above copy commands to work TFTP server should be running and the router should be able to ping that system.&lt;/p&gt;&lt;p&gt;TFTP servers are small in size and available for free download. There are a lot of free TFTP servers out there, pick one that’s easy to use.&lt;br /&gt;If you are using Windows Visata, you won’t see HyperTerminal in that. You can download this for free from internet.&lt;/p&gt;</description><link>http://i-networking.blogspot.com/2008/12/setting-up-cisco-device-installing-ios.html</link><author>noreply@blogger.com (insanely~positive)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-1654304532913673601</guid><pubDate>Sun, 30 Nov 2008 20:15:00 +0000</pubDate><atom:updated>2008-11-30T12:31:50.499-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco IOS</category><title>Cisco IOS Modes of Operation</title><description>Commands can be executed in Cisco IOS software under  access modes: &lt;span style=&quot;font-weight: bold;&quot;&gt;User &lt;/span&gt;and&lt;span style=&quot;font-weight: bold;&quot;&gt; Privileged&lt;/span&gt;. The commands in the User mode is in a way, a low level access version of the Privileged mode.&lt;br /&gt;&lt;br /&gt;The below table explains the different modes, what can be done in these modes and the prompt telling you which mode you are in.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWWb-JhUljLYfILO_RZZwukqHc0gHvOq3Pv-oKQbXfhZJ3Bx7_MTs7BVFjCmecJxIWuOwnnqibPS-MyeysCQgKB3PI5gHy0EL4EoQJWwnhyphenhyphenbd0jQvw6WAc_thhqc9avUMgce3WpQY9T64d/s1600-h/modes.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 436px; height: 268px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWWb-JhUljLYfILO_RZZwukqHc0gHvOq3Pv-oKQbXfhZJ3Bx7_MTs7BVFjCmecJxIWuOwnnqibPS-MyeysCQgKB3PI5gHy0EL4EoQJWwnhyphenhyphenbd0jQvw6WAc_thhqc9avUMgce3WpQY9T64d/s400/modes.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5274547490561192450&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;User mode:&lt;/span&gt; You enter this mode when you start a router. You can see ‘Router&gt;’ prompt. Command like ‘&lt;span style=&quot;font-style: italic;&quot;&gt;ping, telnet, and rlogin&lt;/span&gt;’ run in this mode, also you can get information regarding the IOS if you type ‘&lt;span style=&quot;font-style: italic;&quot;&gt;show version&lt;/span&gt;’. So this mode gives you information but does not let you make any modification in the configuration. For any configuration or modification of the router you have to enter into the privileged mode by giving the command ‘&lt;span style=&quot;font-weight: bold;&quot;&gt;enable&lt;/span&gt;’&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Privileged mode:&lt;/span&gt;  You will be prompted to enter a password in order to access this mode (while configuring a router for the first time, the password for the privileged mode can be avoided but that’s a security risk). You can modify the router configuration, the interfaces on the router or create an initial configuration following the sub-modes.&lt;br /&gt;&lt;br /&gt;In order to make things easier, the sub modes can be identified from the prompt. For example, the privileged mode shows ‘router#’ and if you enter the command ‘configure terminal’ here, the prompt changes to ‘router (config) #’, so this tells you that you are in the ‘Global Configuration Mode’&lt;br /&gt;&lt;br /&gt;A list of every command that run in each mode can be displayed by entering ‘?’ while in that particular mode, so this makes things a lot easier. Also you don’t have to type every command, you just have to type the first few letters and let the IOS auto-complete it.&lt;br /&gt;Example: Instead of typing ‘&lt;span style=&quot;font-weight: bold;&quot;&gt;Router#configure terminal&lt;/span&gt;’ you can type ‘&lt;span style=&quot;font-weight: bold;&quot;&gt;Router#conf ter&lt;/span&gt;’&lt;br /&gt;&lt;br /&gt;There are a few Hot Keys that will help you work faster while working on Cisco IOS,&lt;br /&gt;&lt;br /&gt; &lt;table style=&quot;border-collapse: collapse; width: 318pt;&quot; width=&quot;424&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;col style=&quot;width: 68pt;&quot; width=&quot;91&quot;&gt;  &lt;col style=&quot;width: 250pt;&quot; width=&quot;333&quot;&gt;  &lt;tbody&gt;&lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; width: 68pt; padding-bottom: 0in; padding-top: 0in;&quot; width=&quot;91&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL A&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;width: 250pt;&quot; width=&quot;333&quot;&gt;&lt;span style=&quot;&quot;&gt;Moves cursor to the beginning of the line&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL E&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Moves cursor to the end of   the line&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL B&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Moves cursor back one   character&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL F&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Moves cursor forward one   character&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;ESC B&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Moves cursor back one word&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;ESC F&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Moves cursor forward one   word&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL D&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Delete one character&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;Backspace&lt;span style=&quot;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot;&gt;&lt;span style=&quot;&quot;&gt;Delete   one character to the left of cursor&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL R&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Redisplays a line&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL V&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Erases a line&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;CTRL W&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Erases a word&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;Ctrl Z&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;Exits configuration mode&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=&quot;height: 18.75pt;&quot; height=&quot;25&quot;&gt;   &lt;td class=&quot;xl63&quot; style=&quot;height: 18.75pt; padding-bottom: 0in; padding-top: 0in;&quot; height=&quot;25&quot;&gt;&lt;span style=&quot;&quot;&gt;TAB&lt;/span&gt;&lt;/td&gt;   &lt;td class=&quot;xl63&quot; style=&quot;padding-bottom: 0in; padding-top: 0in;&quot;&gt;&lt;span style=&quot;&quot;&gt;auto completes partially   entered word&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;</description><link>http://i-networking.blogspot.com/2008/11/cisco-ios-modes-of-operation.html</link><author>noreply@blogger.com (insanely~positive)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWWb-JhUljLYfILO_RZZwukqHc0gHvOq3Pv-oKQbXfhZJ3Bx7_MTs7BVFjCmecJxIWuOwnnqibPS-MyeysCQgKB3PI5gHy0EL4EoQJWwnhyphenhyphenbd0jQvw6WAc_thhqc9avUMgce3WpQY9T64d/s72-c/modes.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-7499789297645532099</guid><pubDate>Fri, 16 May 2008 13:08:00 +0000</pubDate><atom:updated>2008-06-09T14:17:33.563-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IP Phones</category><title>Connecting the Cisco IP phone 7940G</title><description>The inbuilt Cisco two-port Ethernet switch allows for a direct connection of the IP phone to a 10/100BASE-T Ethernet network via an RJ-45 interface. A single LAN connection will be enough for both the phone and a nearby PC.&lt;br /&gt;&lt;br /&gt;The system administrator can designate separate virtual LANs (VLANs) for the PC and Cisco IP Phones providing improved security and reliability of voice and data traffic.&lt;br /&gt;&lt;br /&gt;The Cisco IP Phone 7940G can also receive power down the LAN from any of the Cisco inline power-capable blades and boxes&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Network Requirements &lt;/strong&gt;&lt;br /&gt;.The network must have a working VOIP network, which means Voice over IP (VoIP) configured on your Cisco routers and gateways&lt;br /&gt;. Cisco CallManager* Release 3.0 or higher installed in your network and configured to handle call processing&lt;br /&gt;. IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Adding a Cisco IP Phone Using Cisco CallManager&lt;/strong&gt;&lt;br /&gt;The IP phone has to be added to the CallManager before we can actually use it. This is done with Cisco CallManager Administration using either auto-registration or without auto-registration.&lt;br /&gt;&lt;br /&gt;Auto-registration allows you to automatically add Cisco IP Phones to Cisco CallManager Administration simply by plugging them into a Cisco CallManager network. Auto-registration automatically assigns a directory number (selected from a range of numbers) to the telephone.&lt;br /&gt;&lt;br /&gt;By default, auto-registration is turned off. When Cisco CallManager Administration is configured, you can turn on auto-registration by specifying a range of numbers from which auto-registration can choose directory numbers. Then, when new phones are added, they are automatically assigned the next available directory number. If a phone is moved to a new location, its phone number does not change.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Turning on Auto-Registration: &lt;/strong&gt;&lt;br /&gt;.Open Cisco CallManager Administration.&lt;br /&gt;.Click Configuration.&lt;br /&gt;.In the Auto-Registration area, click Configure. Type the start and end directory numbers (provided by the telephone company).&lt;br /&gt;.Click &lt;em&gt;Update.&lt;/em&gt; (The range of directory numbers auto-registration can use is configured, and auto-registration is enabled. When a new phone is added to the system, its directory number is automatically assigned by auto-registration).&lt;br /&gt;&lt;br /&gt;Turning auto-registration off prevents unauthorized devices from registering with and gaining access to the Cisco CallManager.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Turning off Auto-Registration: &lt;/strong&gt;&lt;br /&gt;.Open Cisco CallManager Administration.&lt;br /&gt;.Click Configuration.&lt;br /&gt;. In the Auto-Registration area, click Configure. ( Type the same directory number in both the start number and end number boxes. For example, type 1000 as the start number, and 1000 as the end number).&lt;br /&gt;.Click Update.( Auto-registration is turned off. New phones added to the system must be manually configured in Cisco CallManager Administration).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;*Cisco CallManager:&lt;/strong&gt; A software that runs on a Windows 2000 server and sets up and tears down calls between phones, integrating traditional PBX functionality with IP network. Cisco CallManager manages the components of the IP telephony system—the phones, access gateways, and the resources necessary for such features as call conferencing and route planning.&lt;br /&gt;&lt;br /&gt;(More on CallManager some other time…)</description><link>http://i-networking.blogspot.com/2008/05/connecting-cisco-ip-phone-7940g.html</link><author>noreply@blogger.com (insanely~positive)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-5714953089690627127</guid><pubDate>Tue, 06 May 2008 14:07:00 +0000</pubDate><atom:updated>2008-05-07T05:44:50.807-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IP Phones</category><title>Cisco IP phone: 7940 series</title><description>.&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMtQMLy125RdNMnIdtxhyphenhyphenhr73rn6_jGqfrFo45Rbtd4jl8h3TXoHzIG_6LqvLkCFoMNL19deaXilMERfPrMrCNA_hPfPFcfQxheeWHrKNMy89WHFecskFMYppbEJLEdlfTmMstfpSaZlYz/s1600-h/2.JPG&quot;&gt;&lt;/a&gt;&lt;strong&gt;IP phone front view and buttons.&lt;/strong&gt;&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5197615823322581074&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPpLPPz-vqN8sBJsnqBKdwAPysw0zGUpbNytwC03hxC1b_oIo_86YXztEKMl_fNXRGkqblfbnOx4UREImCa12BmXwzXZ6uurOg5qSuZidW4Prk1qYd-WKeU0I6XKPA7CgweCeqHRi4ygfQ/s400/2.jpg&quot; border=&quot;0&quot; /&gt;1 - Handset light strip: Indicates an incoming call or new voice message&lt;br /&gt;2 - Phone screen: Shows phone features&lt;br /&gt;3 - Model type: Indicates your Cisco IP phone model&lt;br /&gt;4 – Programmable buttons&lt;br /&gt;· Phone lines&lt;br /&gt;· Speed-dial numbers&lt;br /&gt;· web-based services (eg: Personal address book button)&lt;br /&gt;· Phone features (eg: privacy buttons)&lt;br /&gt;5 – Footstand button: Allow you to adjust the angle of the phone base&lt;br /&gt;6 – Directories button: Opens/closes the Directories menu. Use it to access call logs and corporate directories.&lt;br /&gt;7 – Help button: Activates the help menu.&lt;br /&gt;8 – Settings button&lt;br /&gt;9 – Speaker button&lt;br /&gt;10 – Mute button&lt;br /&gt;11 – Headset button&lt;br /&gt;12 – Volume button&lt;br /&gt;13 – Services button; Opens/closes the Services menu.&lt;br /&gt;14 – Message button: Typically auto-dials your voice message services.&lt;br /&gt;15 – Navigation button&lt;br /&gt;16 – Keypad&lt;br /&gt;17 – Softkey button – Each activates a softkey option displayed in the screen.&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Cisco IP phone back end connectivity:&lt;/strong&gt;&lt;/p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggs2ptEDPLzkuyGoRdCsiliVW2g8TaDyZ9PC2OX2JH4_iThvH9gwHYbTkkLYu4MV_Mjw4zM8GJ_NJcYR_z4gHn5Nj-Ocp7AbYWAue2nVcgrslla4X2TWQXGrrjYxIzymZAoCagi3zhg65D/s1600-h/untitled.JPG&quot;&gt;&lt;/a&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5197614294314223682&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-PPbACB1CsxNhY2pwOjPtz_-AfVkY3YyX7Wc8DZbeTb1FFba3Fn0fkiDRXBuY-OjrajvPA-rEOI2PIUnISNY8z8AxdbXcNOrs57RI_YEFemEviFRy2CXIDCOvImrZEsSx5ucIjAlWyQpI/s400/untitled.JPG&quot; border=&quot;0&quot; /&gt;1 – DC adapter port (DC48V) for phones not provided with inline power.&lt;br /&gt;2 – AC to DC power supply&lt;br /&gt;3 – AC power chord&lt;br /&gt;4 – Network port (10/100SW) for connecting to the network&lt;br /&gt;5 – Access port (10/100 PC) for connecting your phone to your computer&lt;br /&gt;6 – Handset port&lt;br /&gt;7 – Headset port&lt;br /&gt;8 – Footstand button&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;Lines v/s Calls:&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;/strong&gt; &lt;/div&gt;&lt;div&gt;&lt;strong&gt;Lines:&lt;/strong&gt; Cisco IP phone supports up to two lines. The number of lines available is decided by the administrator and you can see the number of lines available on your phone screen.&lt;br /&gt;&lt;strong&gt;Calls:&lt;/strong&gt; Each line can support multiple calls. Therefore, you can handle several calls on the same line itself. Default number of calls is 4; it can be up to a max of 200 calls.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The features and functions of IP phones are surprisingly easy for anyone to understand. I don&#39;t think I&#39;ll have to explain it here. :)&lt;/div&gt;&lt;/div&gt;</description><link>http://i-networking.blogspot.com/2008/05/cisco-ip-phone-7940-series.html</link><author>noreply@blogger.com (insanely~positive)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPpLPPz-vqN8sBJsnqBKdwAPysw0zGUpbNytwC03hxC1b_oIo_86YXztEKMl_fNXRGkqblfbnOx4UREImCa12BmXwzXZ6uurOg5qSuZidW4Prk1qYd-WKeU0I6XKPA7CgweCeqHRi4ygfQ/s72-c/2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-2025392207033718632</guid><pubDate>Mon, 05 May 2008 10:16:00 +0000</pubDate><atom:updated>2008-05-05T03:18:37.348-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IP Phones</category><title>IP Phones</title><description>&lt;p class=&quot;MsoNormal&quot;&gt;An &lt;b&gt;IP phone&lt;/b&gt; uses Voice over IP technologies allowing telephone calls to be made over the internet instead of the ordinary PSTN system. &lt;b&gt;Voice over Internet Protocol&lt;/b&gt; is a protocol optimized for the transmission of voice through the Internet or other packet switched networks.&lt;/p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;The most attractive part of implementing such a system is the lower calling cost. When calling other IP phones over the internet one pays for the fixed cost of internet bandwidth. Therefore IP phones are widely used in making international calls in Call centers and other business organizations.      &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;br /&gt;All you need to do is to get an IP phone adapter from your VoIP service provider and that’s it. The good thing about using IP phones is that you do not need any special equipment to make it work, just the adapter. When you use IP phone systems, it works with an Ethernet port (or also called RJ-45) rather than using a regular wall phone jack. When use your IP phone service to make calls, your digital IP phone will connect through your broadband Internet modem.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;&quot;&gt; &lt;/span&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Advantages of VoIP:&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;If you have a broadband connection with either DSL or cable, then you can use VoIP to make low cost calls. For a PC-to-PC phone call it can even be no cost to any other computer anywhere in the world (that has VoIP service installed as well, of course). Skype, Gtalk and Yahoo messenger provides this service. While there is usually a cost to make a PC-to-phone connection, it is usually less than a “traditional” long distance call.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;Many VoIP service providers will charge a monthly fee allowing you to make unlimited calls within a specified geographical area, with a nominal extra charge for calls outside that set area. VoIP provides the advantage of portability if you are a traveler, you just have to sign in to your VoIP service wherever you are and make the call.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;This portability is available for phone-to-phone VoIP service as well. Your VoIP service provider will provide you with an internet phone number that follows you wherever you go. &lt;/p&gt;  &lt;p&gt;Services like call forwarding, call waiting, voicemail, caller ID, three-way calling and more are available through your IP phone, usually at no extra charge. You can also send data, as you would expect with a broadband internet connection, like pictures and documents, all while talking on the phone.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Disadvantages of VoIP:&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;The biggest problems of VoIP are power interruptions, quality of service and reliability.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;The normal phones are not powered by your power line and thus they work when you have a power outage. These phones are powered by the phone line itself. This isn’t the case with an IP phone. If the power goes out, then there is nothing to power your internet connection or your IP phone. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;There are also issues with VoIP sound quality and reliability. Just like any data sent over the internet, it is sent through the network scrambled into “packets”. Email and other documents sent over the internet are easily “reassembled” at the other end for a seamless transmission. Due to the real-time nature of voice communication, this reassembly process becomes more of a problem with VoIP. In order to minimize the delay of the voice connection, some data packets may occasionally need to be “dropped” if they don’t arrive in time, resulting in short periods of silence in the audio stream.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;The amount of dropped data depends on the distance and speed of the connection. High traffic networks may experience more dropouts, especially at times of peak usage. One workaround that service providers can use is to create dedicated data paths for audio transmission.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;I’ll explain about the popular 7940 series Cisco IP phone and how it is configured in another post.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;span style=&quot;font-size: 12pt; font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Cheers ;)&lt;/span&gt;</description><link>http://i-networking.blogspot.com/2008/05/ip-phones.html</link><author>noreply@blogger.com (insanely~positive)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-8453088250031447980</guid><pubDate>Sat, 03 May 2008 20:31:00 +0000</pubDate><atom:updated>2008-05-05T04:02:30.421-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ping Command</category><title>The Ping Command</title><description>&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;.&lt;br /&gt;I’d say the ping and traceroute commands are the simplest yet the most powerful commands in network troubleshooting. It comes very useful while isolating network hardware problems and incompatible configurations.&lt;br /&gt;&lt;br /&gt;Ping (&lt;strong&gt;P&lt;/strong&gt;acket &lt;strong&gt;I&lt;/strong&gt;nter&lt;strong&gt;N&lt;/strong&gt;et &lt;strong&gt;G&lt;/strong&gt;rouper) works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies. Ping estimates the round-trip time, generally in milliseconds, and records any packet loss, and displays a summary.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;ping 127.0.0.1&lt;/strong&gt; - This command pings the loopback address and verify the TCP/IP configuration.&lt;br /&gt;&lt;strong&gt;ping &lt;/strong&gt;&lt;em&gt;&lt;strong&gt;IP_address_of_local_host&lt;/strong&gt; - &lt;/em&gt;This veries that the local computer is added to the network correctly&lt;br /&gt;&lt;strong&gt;ping &lt;/strong&gt;&lt;em&gt;&lt;strong&gt;IP_address_of_default_gateway&lt;/strong&gt; -&lt;/em&gt; This command verify that the default gateway is functioning and that you can communicate with a local host on the local network.&lt;br /&gt;&lt;strong&gt;ping &lt;em&gt;IP_address_of_remote_host&lt;/em&gt;&lt;/strong&gt; - You can ping the IP address of the remote host to verify that you can communicate through a router.&lt;br /&gt;&lt;br /&gt;Shown below is a picture perfect scene. everything is ok in this ping reply.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Microsoft Windows XP [Version 5.1.2600]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;(C) Copyright 1985-2001 Microsoft Corp.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;C:\Documents and Settings\home&gt;ping comp1&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Pinging comp1.homenet.com [10.161.133.26] with 32 bytes of data:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Reply from 10.161.133.26: bytes=32 time&lt;1ms ttl=&quot;127&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Reply from 10.161.133.26: bytes=32 time&lt;1ms ttl=&quot;127&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Reply from 10.161.133.26: bytes=32 time&lt;1ms ttl=&quot;127&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Reply from 10.161.133.26: bytes=32 time&lt;1ms ttl=&quot;127&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Ping statistics for 10.161.133.26: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;as you can see, the packet loss is 0% which means that the communication is healthy. This may not be the case all the time, but then the ping reply can give you a lot of information regarding the network. Since it&#39;s almost 3 in the morning, I&#39;ll write about it in the next post - hopefully :)&lt;br /&gt;&lt;br /&gt;Check out these Ping command prefixes, they are extremely useful. You will get the below mentioned list by typing the following command &lt;strong&gt;ping /?&lt;/strong&gt; in the command line.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;ping -t &lt;em&gt;a.b.c.d&lt;/em&gt;&lt;/strong&gt; - This command keeps pinging the IP address a.b.c.d until you give the break command Ctrl+C. Its useful when you have to see the effect on connectivity in realtime while doing some changes.&lt;br /&gt;&lt;strong&gt;ping -a &lt;em&gt;a.b.c.d&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; - &lt;/em&gt;This command resolves IP address to host names. Put in the IP address and you will get the host name of the system.&lt;br /&gt;&lt;strong&gt;ping -n 20 &lt;/strong&gt;&lt;em&gt;&lt;strong&gt;a.b.c.d&lt;/strong&gt; &lt;/em&gt;- This command can be used to send 20 (or any number of) echo request to a particular IP.&lt;br /&gt;Similarly there are others which are less used compared the above three.&lt;br /&gt;&lt;strong&gt;-l size &lt;/strong&gt;-&lt;strong&gt; &lt;/strong&gt;Send buffer size.&lt;br /&gt;&lt;strong&gt;-f&lt;/strong&gt; - Set Don&#39;t Fragment flag in packet.&lt;br /&gt;&lt;strong&gt;-i TTL&lt;/strong&gt; - Time To Live.&lt;br /&gt;&lt;strong&gt;-v TOS&lt;/strong&gt; - Type Of Service.&lt;br /&gt;&lt;strong&gt;-r count&lt;/strong&gt; - Record route for count hops.&lt;br /&gt;&lt;strong&gt;-s count&lt;/strong&gt; - Timestamp for count hops.&lt;br /&gt;&lt;strong&gt;-j host-list&lt;/strong&gt; - Loose source route along host-list.&lt;br /&gt;&lt;strong&gt;-k host-list&lt;/strong&gt; - Strict source route along host-list.&lt;br /&gt;&lt;strong&gt;-w timeout&lt;/strong&gt; - Timeout in milliseconds to wait for each reply.&lt;br /&gt;&lt;br /&gt;That&#39;s all for now. Gotta catch some sleep ;)&lt;/span&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://i-networking.blogspot.com/2008/05/ping-command.html</link><author>noreply@blogger.com (insanely~positive)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-6861364330483016313</guid><pubDate>Fri, 02 May 2008 18:29:00 +0000</pubDate><atom:updated>2008-05-02T12:02:12.868-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TACACS</category><title>TACACS</title><description>&lt;strong&gt;.&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Terminal Access Controller Access-Control System (TACACS)&lt;/strong&gt; is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks.&lt;br /&gt;&lt;strong&gt;TACACS&lt;/strong&gt; allows a client to accept a username and password and send a query to a TACACS authentication server, sometimes called a TACACS daemon or simply TACACSD. This server is normally a program running on a host. The host would determine whether to accept or deny the request and send a response back. The TIP would then allow access or not, based upon the response. In this way, the process of making the decision is &quot;opened up&quot; and the algorithms and data used to make the decision are under the complete control of whoever is running the TACACS daemon.&lt;br /&gt;&lt;br /&gt;The below diagram shows user accessing the network through the Network Access Server and then disconnecting.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5195850036437881042&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfXoDIxv6yG-5EnZ_D01wHY7-88_4tgXQZfNzVnCoEKC5zFToORXWO8LVZ4ICcW0dbLDY98Kd4XoTdkX2oA9R4O4cH-foQ-hPxPb2efsSVPNhFJr3zXCZ9xOVjP5G-9qt5HtjUUsWf9TSX/s320/tacacs.gif&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Network Access Server get username/password pair from remote user, and sends this with a &#39;Login&#39; to the TACACS Server (Authentication phase). &lt;/li&gt;&lt;li&gt;When the user and password combination is valid then the TACACS Server sends a &#39;Reply&#39; accepted.&lt;/li&gt;&lt;li&gt;The NAS sends a &#39;Logout&#39; request to permit the TACACS server to go into SLIP mode. &lt;/li&gt;&lt;li&gt;The TACACS server replies with a &#39;Reply&#39; accepted and logs the user out. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;TACACS protocol provides access control for routers, network access servers and other networked computing devices via one or more centralized servers.&lt;/p&gt;&lt;p&gt;A later version of TACACS introduced in 1990 was called XTACACS (extended TACACS). These two versions have generally been replaced by TACACS+ and RADIUS in newer or updated networks. TACACS+ is a completely new protocol and is therefore not compatible with TACACS or XTACACS.&lt;/p&gt;&lt;p&gt;TACACS is an encryption protocol and therefore less secure than the later TACACS+ and Remote Authentication Dial-In User Service protocols. &lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://i-networking.blogspot.com/2008/05/tacacs.html</link><author>noreply@blogger.com (insanely~positive)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfXoDIxv6yG-5EnZ_D01wHY7-88_4tgXQZfNzVnCoEKC5zFToORXWO8LVZ4ICcW0dbLDY98Kd4XoTdkX2oA9R4O4cH-foQ-hPxPb2efsSVPNhFJr3zXCZ9xOVjP5G-9qt5HtjUUsWf9TSX/s72-c/tacacs.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1839717565525447308.post-7114715727188227322</guid><pubDate>Fri, 02 May 2008 13:35:00 +0000</pubDate><atom:updated>2008-05-02T12:25:05.707-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">PORTS</category><title>Port and Port Numbers</title><description>&lt;span style=&quot;color:#ff0000;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;A&lt;/span&gt; port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. For TCP and UDP, a port number is a 16-bit integer that is put in the header appended to a message unit. Therefore, ports are typically used to map data to a particular process running on a computer.&lt;br /&gt;&lt;br /&gt;Imagine IP addresses as the street address of an apartment building, and the port number as the number of a particular apartment within that building. If a letter (a data packet) is sent to the apartment building (IP) without an apartment number (port number) on it, then nobody knows who (which service) it is for. In order for the delivery to work, the sender needs to include an apartment number along with the address to ensure the letter gets to the right address.&lt;br /&gt;&lt;br /&gt;In both TCP and UDP, each packet header will specify a source port and a destination port, each of which is a 16-bit unsigned integer (i. e. ranging from 0 to 65535), as well as specifying the source and destination network addresses (IP - numbers) among other things. A process may &quot;bind&quot; to a particular port to send and receive data, meaning that it will listen for incoming packets whose destination port matches that port number, and/or send outgoing packets whose source port is set to that port number. Processes may also bind to multiple ports.&lt;br /&gt;&lt;br /&gt;As an example, a server used for sending and receiving email may provide both an SMTP (for sending) and a POP3 (for receiving) service; these will be handled by different server processes, and the port number will be used to determine which data is associated with which process. By convention, the SMTP server will listen on port 25, while POP3 will listen on port 110, although it is possible to use different ports.&lt;br /&gt;&lt;br /&gt;Not all network transport layer use network ports; for example, although UDP and TCP use ports, ICMP does not.&lt;br /&gt;&lt;br /&gt;The port numbers are divided into three ranges:&lt;br /&gt;&lt;strong&gt;The Well Known Ports are those from 0 through 1023.&lt;/strong&gt; The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet&#39;s TCP or UDP.&lt;br /&gt;&lt;strong&gt;The Registered Ports are those from 1024 through 49151.&lt;/strong&gt; Registered port numbers are network ports in the range 1024-49151 (out of a range of 216 = 65536). They can be registered to certain protocols by software companies, similar to the way domain names are registered.&lt;br /&gt;Eg: Port 28960 assigned for the game Call of Duty 2 (PC Version), Port 27010 assigned for Half-Life and its mods, such as Counter-Strike.&lt;br /&gt;&lt;strong&gt;The Dynamic and/or Private Ports are those from 49152 through 65535. &lt;/strong&gt;The dynamic port numbers (a.k.a private port numbers) are the port numbers that are available for use by any application to use in communicating with any other application, using the Internet&#39;s TCP or UDP.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers&quot;&gt;List of TCP and UDP port numbers:&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Before the arrival of ICANN, the port numbers were administered by the Internet Assigned Numbers Authority (IANA).</description><link>http://i-networking.blogspot.com/2008/05/z.html</link><author>noreply@blogger.com (insanely~positive)</author><thr:total>0</thr:total></item></channel></rss>