Cisco Catalyst 3750 Series are innovative products that improve LAN operating efficiency by combining industry-leading ease of use and the highest resiliency available for stackable switches. This new product series represents the next generation in desktop switches, and features Cisco Stack Wise technology, a 32-Gbps stack interconnect that allows customers to build a unified, highly resilient switching system-one switch at a time. Using a 32-Gbps stack interconnect, Cisco Stack Wise technology is designed to respond to network changes of all kinds while maintaining constant high network performance. Cisco Stack Wise technology unites up to nine Catalyst 3750 switches into a single logical unit via special stack interconnect cables. The stack behaves as a single unit managed by a master switch elected from one of the member switches. Its advanced failover mechanisms create the highest levels of stackable resiliency for hardware and software reliability. Now, let’s share the configuration process of Cisco Catalyst 3750 Series detailedly: 1. Connect the switch's power supply to a grounded AC outlet till the switch's indicator lights "SYST" on the switch turns solid green. 2. Hold the "Mode" button at the bottom-left corner of the switch till the LEDs left of the "Mode" button turn green, and then release it. 3. Connect an Ethernet cable to any of the switch's Ethernet ports then check whether the lights on the switch and your computer's Ethernet card are green or not, and wait 30 seconds. 4. Enter "10.0.0.1" into the address bar of your web browser, which brings you to the Cisco 3750's Express Setup page. 5. Enter "10.0.0.1" into the "IP Address" field of the "Basic Settings" tab. (Note: If you are connecting the switch to the Internet through a modem or router, enter the modem or router's IP address in the "Default Gateway" field. The modem or router's IP address should be in its manual.) 6. Enter a password in the "Switch Password" field, and repeat it in the "Confirm Switch Password" field. (Enter a name for the switch and fill in the date, time and time zone information under "Optional Settings" if you wish). Basic configuration is now complete, though you may wish to alter some advanced settings as well. 7. Click on the "Advanced Settings" tab. 8. Click "Enable" beside "Telnet Access" if you plan to use Telnet to manage the switch using a command-line interface. Enter a password into the "Telnet Password" and "Confirm Telnet Password" fields as well. 9. Click "Enable" beside "SNMP" to enable Simple Network Management Protocol (SNMP). This option should only be enabled if you plan to manage the switch using Cisco Works 2000 or another SNMP system. You must enter the "Read Community," "Write Community," "System Contact" and "System Location" information if you enable SNMP. 10. Check the "Enable IPv6" box if you wish to enable it. IPv6 features better support for mobile devices like cell phones and PDAs, simplified address auto-configuration, and improved data encryption, compared to IPv4. Enabling IPv6 will restart your switch when exiting Express Setup. 11. Click "Submit" to save and apply your settings. Your Cisco 3750 should now be configured and ready to install in your service network.
Sometimes, you may buy used Cisco device for your Cisco home lab, but that router/switch configuration most likely already erased to default configuration by the reseller. Or what if you got a router/switch with password in it but you forgot the password you gave to the device? The password recovery procedure will wipe out all configurations in the router/switch, it is always a good idea to back up your configuration regularly and use the backup to reconfigure the router/switch after password recovery procedure. Now, make sure that we can solve some simple problems on Cisco 2600 and Cisco 2800 series by ourselves, let’s share the details at the following words. Through some devices might have different procedure for password recovery, (some Cisco switches series have a button on the chassis that you must press for password recovery), the steps that I'm showing here are for Cisco 2600 and 2800 series routers, but most routers have the common steps to follow. Cisco 2800 password recovery procedure Now that your hardware is connected, establish a serial connection with the router. The settings you need are: Baud: 9600 Data bits: 8 Parity: No Stop bits: 1 Flow Control: None Detailed steps: Break the original Process. 1. Press the "Break" key within the first 60 seconds of restarting a router to break out of the boot process for Cisco routers copy the configuration file stored in their memory into the system on boot.; (For break key sequences, refer to this Cisco link: http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note0...) 2. Type "confreg 0x2142" to boot from Flash, after you are dropped into the ROMmon console that allows you to modify some essential settings. 3. Type "reset" to restart the router. 4. Press "Ctrl" and "C" simultaneously to skip the initial setup procedure. 5. Type "enable" to begin reconfiguring the router. Change the password 1. Type "configure memory" to copy the NVRAM into the router's system memory. 2. Type "show running-config" to view the configuration. If you were using unencrypted passwords, you will be able to view them. However, if they are encrypted, you will need to change to a new password. 3. Type "configure-terminal," then "enable secret PASS" where "PASS" is your new password. Restart running 1. Type "config-register 0x2102" to change the router's configuration register back to the normal 0x2102. 2. Type "Ctrl" and "Z" simultaneously to exit the configuration mode. 3. Type "write memory" to write your changed settings to the NVRAM so the changes will stick when the router resets. After those steps, we do the Cisco 2600 or 2800 password recovery successfully. The article referred to: http://www.ehow.com/info_8683062_cisco-router-2600-password-recovery.html
No matter for businesses or home networks systems, keeping network secure is a constant struggle in this modern world. As Internet Security Threat Report estimates a 93 percent increase in Web attacks from 2010, protecting the valuable information against constantly evolving malware, identity theft, hacktivism, state sponsored hacking, etc. have gained more and more attention. But how to build the more secure and flexible networks practically? 1. Installing a firewall is necessary through firewalls are not almighty. ( if you need more details on Cisco firewall configuration, there are some materials to refer to: http://blog.router-switch.com/2012/06/eight-commands-on-a-cisco-asa-security-appliance-you-should-know/ http://blog.router-switch.com/2012/05/vlan-sub-interfaces-on-cisco-asa-5500-firewall-configuration/ ) 2. Make sure anti-virus software is uploaded on every computer for third-party software such as Java, Adobe products and browsers are often gateways for malware. 3. PCs, tablets, switches and routers all need to be constantly updated and monitored to guard against network threats. Using a remote monitoring and management (RMM) tool that includes the ability for both operating system and third-party patching makes this process easy for a solution provider to update all software on an endpoint. (Juniper’s Care Plus and Cisco’s Smart Care are two examples. Those initiatives help solution providers ensure their entire customer networks are healthy, offer access to vendor technical support and also provide reporting on a scheduled basis.) 4. Be sure to change the default administrative password on the new devices such as wireless router, which is typically "password." If possible, create a new administrative user id, and disable the default, which is typically "admin." Perform all administration and configuration tasks through the LAN cable interface. 5. Pay attention to data encryption. Choose the highest encryption level that your computing equipment can support, and choose a pass-phrase that is easy for you to remember but hard for outsiders to guess. Network Data Encryption 6. Remember to take MAC (Media Access Control), which is the actual address of your network interface that is typically burned in by the manufacturer. (Wireless routers allow you to build a table of authorized MAC addresses that may connect to your network. Through some degree of investigative work in determining the MAC address on each of your home computers may increase security for your network, the address can be spoofed (faked), and the hacker still has to know a valid MAC address in order to accomplish this task.) 7. Protect the SSID (Service Set Identifier) - the name that your router broadcasts for others to see. The default is typically the name of the manufacturer of your router, and you should change this to something obscure. Do not give it your family name, address, car tag number or anything else recognizable as your network. And be careful with whom you share your network name. For the maximum security on SSIDs simply turn off SSID broadcasts. We have to admit that we cannot list all the solutions to protect the network safe absolutely, but remember that operating system and software patching, using the most up-to-date anti-malware programs, keeping the network infrastructure healthy and current, and performing regular security testing will go a long way toward ensuring solutions to secure networks and against evolving network threats. So let’s keep the network security from then on with paying attention to details.
Introduction This document answers frequently asked questions about the Cisco Unified Border Element (CUBE). Q1. What are the benefits of using Cisco Unified Border Element ? A: • Multiple physical interconnects, intelligent OAM, Call Admission Control, Billing etc • Security Demarc: FireW...