In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Some frequently used network devices, such as switches, the composition of routers can be roughly divided into:
one。 Hardware:
1. Memory-RAM (read memory immediately) the device uses at run time, the same as the memory bar of the computer.
2.CPU: the central processing unit of the device, which is the core and key hardware of the device, and reflects the decisive factor of performance.
3. Hard disk-flash: the device is used to store some files and log information
4.ROM (read-only memory) read-only memory
5.nvram nonvolatile memory
two。 Software:
1. System file-IOS (internet operating system) boot system
two。 Configuration file-running-config (running configuration file, saved in RAM memory, easy to lose in case of power outage)
3. Configuration file-startup-config (the configuration file loaded at boot time is saved in nvram and will not be lost when the device is powered off)
When debugging a device, we can implement it in a variety of ways, which are briefly introduced in two ways:
one。 Local Management:
Connect the computer console port with the console line (reversal line). When entering commands through this port, there is a default timeout time of 10 minutes. Note: how to turn off the timeout function 1.Cisco (config) # line console 0 / / enter the console port; 2.isco (config-line) # exec-timeout 0 0
two。 Remote Management:
That is, access the management IP address (management interface-line vty) of the device through the network. By default, remote access requires a password and a privileged password, which must be configured.
Note: the number of vty supported varies with different types of devices; when using vty lines, remote connections are selected according to the size of the line number, from small to large. The authentication function under line vty is turned on by default. We can also close it, but it is not recommended to do so, it is not safe!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.