12. ﺳﺮاﺳﺮي ﻣﻮرد اﺳﺘﻔﺎده در آزﻣﺎﯾﺸﮕﺎهWAN ﺗﺼﻮﯾﺮ 1: ﺗﻮﭘﻮﻟﻮژي
Frame relay ﺗﻨﻈﯿﻤﺎت ﺳﻮﯾﯿﭻ
Local Router
R1
R1
R1
R1
R2
R2
R2
R2
R3
R3
R3
R3
R4
R4
Page 11 of 290
Local Int.
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Serial 0/0
Local DLCI Remote Router Remote Int.
122
R2
Serial 0/0
123
R3
Serial 0/0
124
R4
Serial 0/0
125
R5
Serial 0/0
221
R1
Serial 0/0
223
R3
Serial 0/0
224
R4
Serial 0/0
225
R5
Serial 0/0
321
R1
Serial 0/0
322
R2
Serial 0/0
324
R4
Serial 0/0
325
R5
Serial 0/0
421
R1
Serial 0/0
422
R2
Serial 0/0
Remote DLCI
221
321
421
521
122
322
422
522
123
223
423
523
124
224
25. IOS (tm) 3600 Software (C3620-IK9O3S7-M), Version 12.3(25), RELEASE SOFTWARE
(fc1)
ﺗﻮﺟﻪ ﮐﻨﯿﺪ.اﯾﻦ ﻋﺒﺎرت ﺑﯿﺎﻧﮕﺮ وﯾﮋﮔﯿﻬﺎ و ﻧﻮع ﺑﺎرﮔﺬاري)در اداﻣﻪ ﺗﻮﺿﯿﺢ دادهC3620-IK9O3S7-M در ﺧﻂ دوم ﺑﻪ
. در ﺣﺎل ﺑﺎرﮔﺬاري اﺳﺖ.در اداﻣﻪ آن ﺷﻤﺎره ﻧﮕﺎرش ﻧﻤﺎﯾﺶ داده ﺷﺪه اﺳﺖIOS (ﺧﻮاﻫﺪ ﺷﺪ
اﺳﺖ.اﯾﻦ دﺳﺘﻮر اﻃﻼﻋﺎتShow Version اﺳﺘﻔﺎده از دﺳﺘﻮرIOS راﯾﺞ ﺗﺮﯾﻦ راه ﺑﻪ دﺳﺖ آوردن ﻣﺸﺨﺼﻪ ﻫﺎي
و ﻣﺠﻤﻮﻋﻪ وﯾﮋﮔﯿﻬﺎي ان ﻫﻤﯿﻨﻄﻮر اﻃﻼﻋﺎت ﺳﺨﺖ اﻓﺰاري ﻣﺮﺗﺒﻂ ﺑﺎ دﺳﺘﮕﺎه ﻣﻮردIOS ﻣﺨﺘﻠﻔﯽ درﻣﻮرد ﺷﻤﺎره ﻧﮕﺎرش
.اﺳﺘﻔﺎده را ﻧﺸﺎن ﻣﯽ دﻫﺪ
ﻟﯿﺴﺖ زﯾﺮ ﺧﺮوﺟﯽ اﯾﻦ دﺳﺘﻮر را ﺑﺮ روي روﺗﺮ 0263 ﻧﺸﺎن ﻣﯿﺪﻫﺪ
Router#show version
Cisco Internetwork Operating System Software
IOS (tm) 3600 Software (C3620-IK9O3S7-M), Version 12.3(25), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2008 by cisco Systems, Inc.
Compiled Mon 28-Jan-08 20:16 by alnguyen
ROM: System Bootstrap, Version 11.1(20)AA2, EARLY DEPLOYMENT RELEASE SOFTWARE (fc1)
Router uptime is 23 minutes
System returned to ROM by reload
System image file is "flash:c3620-ik9o3s7-mz.123-25.bin"
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco 3620 (R4700) processor (revision 0x81) with 60416K/5120K bytes of memory.
Processor board ID 24807256
R4700 CPU at 80MHz, Implementation 33, Rev 1.0
Bridging software.
X.25 software, Version 3.0.0.
2 FastEthernet/IEEE 802.3 interface(s)
32 terminal line(s)
DRAM configuration is 32 bits wide with parity disabled.
29K bytes of non-volatile configuration memory.
32768K bytes of processor board System flash (Read/Write)
Page 24 of 290
26. Configuration register is 0x2102
Router#
ﻫﻤﺎﻧﻄﻮر ﮐﻪ از ﺧﺮوﺟﯽ ﺑﺮﻣﯽ آﯾﺪ ﺧﻂ ﻫﺎي 2و3و4 ﻫﻤﺎﻧﻨﺪ اﻃﻼﻋﺎت اﺧﺬ ﺷﺪه از ﻓﺮاﯾﻨﺪ ﺑﻮت ﻣﯽ ﺑﺎﺷﻨﺪ و ﺗﻔﺎوﺗﯽ ﻣﺸﺎﻫﺪ
“flash:c3620-ik9o3s7-mz.123- ﻧﻤﯽ ﺷﻮد.در ﺧﻂ 31 ﺧﻮاﻫﯿﺪ دﯾﺪ ﮐﻪ ﻓﺎﯾﻠﯽ ﮐﻪ ﺳﯿﺴﺘﻢ از آن ﺑﻮت ﺷﺪه اﺳﺖ
. ﻓﺎﯾﻠﯽ اﺳﺖ ﮐﻪ در ﺣﺎل ﺣﺎﺿﺮ روﺗﺮ ﺑﺮ ﻣﺒﻨﺎي آن ﮐﺎر ﻣﯿﮑﻨﺪImage .52 ﻧﺎم دارد اﯾﻦ ﻧﺎم واﻗﻌﯽbin”
ﺑﻮد.اﯾﻦ ﻗﻮاﻋﺪ ﻧﺎم ﮔﺬاريIOS ﻗﺒﻞ از ﻧﮕﺎرش 4.21 ﺳﯿﺴﮑﻮ داراي ﻣﮑﺎﻧﯿﺰم ﻧﺎم ﮔﺬاري ﭘﯿﭽﯿﺪه اي ﺑﺮاي ﺑﯿﺎن وﯾﮋﮔﯿﻬﺎي
. ﺑﻮدIOS ﻣﺸﺘﻤﻞ ﺑﺮ ﺣﺮوﻓﯽ ﺑﻮدﻧﺪ ﮐﻪ ﻫﺮﯾﮏ ﺑﯿﺎﻧﮕﺮ وﯾﮋﮔﯽ ﺧﺎﺻﯽ در
.ﺟﺪول زﯾﺮ ﺷﺎﻣﻞ ﺣﺮوف و ﮐﺎراﮐﺘﺮﻫﺎي ﺷﻨﺎﺳﺎﯾﯽ اﺳﺖ ﮐﻪ ﭘﯿﺶ از ﻧﺴﺨﻪ 4.21 از آن اﺳﺘﻔﺎده ﻣﯿﺸﺪ
I
Y
S
S6
S7
J
O
K
K8
K9
X
G
C
*C
B
N
V
*V
R
U
P
Telco
Boot
IP
IP on 1700 Series Routers
IP Plus
IP Plus – No ATM
IP Plus – No Voice
Enterprise
IOS Firewall/Intrusion Detection
Cryptography/IPSEC/SSH
56Bit DES Encryption (Weak Cryptography)
Triple DES / AES Encryption (Strong Cryptography)
H323
Service Selection Gateway (SSG)
Remote Access Server
Can also be Packet Data Serving Node (PDSN)
Apple Talk
Novel IP/IPX
VOX
This can be Video Feature set as well in the near future.
IBM
Unlawful Intercept
Service Provider Services
Telecommunications Feature Set
Boot Image (Used on high end MSR’s such as 7200 Series)
IOS ﺟﺪول 1.2-ﻧﺸﺎﻧﮕﺮﻫﺎي ﺑﯿﺎﻧﮕﺮ وﯾﮋﮔﯿﻬﺎي ﻓﻨﯽ
ﻣﺜﺎل ﺧﻮدﻣﺎن ﻣﯿﮑﻨﯿﻢ. ﻧﺎم ﻓﺎﯾﻞ ﻣﺬﺑﻮرIOS اﮐﻨﻮن ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻗﻮاﻋﺪ ﻓﻮق اﻗﺪام ﺑﻪ ﺷﻨﺎﺳﺎﯾﯽ ﻣﺸﺨﺼﻪ ﻫﺎي
: ﺑﻮد ﮐﻪ ﺑﺎ ﺷﮑﺴﺖ ان ﺑﻪ اﺟﺰاي ﺗﺸﮑﯿﻞ دﻫﻨﺪه ﺧﻮاﻫﯿﻢ داﺷﺖflash:c3620-ik9o3s7-mz.123-25.bin
Page 25 of 290
27. در ﻗﺪم ﺑﻌﺪي ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺟﺪول ﺑﺎﻻ ﻣﺸﺨﺼﻪ ﻫﺎي IOSرا ﺷﻨﺎﺳﺎﯾﯽ ﻣﯿﮑﻨﯿﻢ
i = IP
)k9 = Strong Cryptography (3DES / AES
o3 = IOS Firewall/Intrusion Detection
)s7 = Plus (7 = No Voice
ﺑﯿﺸﺘﺮ Imageﻓﺎﯾﻠﻬﺎي IOSدر ﻧﺤﻮه ﺑﺎرﮔﺬاري و ﻓﺸﺮدﮔﯽ ﺑﺎ ﻫﻢ ﺗﻔﺎوت دارﻧﺪ.اﯾﻦ دو ﻣﺸﺨﺼﻪ ﻧﯿﺰ در ﻓﺮاﯾﻨﺪ ﻧﺎم ﮔﺬاري
IOSﻟﺤﺎظ ﺷﺪه اﺳﺖ ﺑﺎ دﻗﺖ ﺑﻪ ﺳﺎﺧﺘﺎر ﺗﻔﮑﯿﮏ ﺷﺪه ﻗﺒﻞ درﺧﺼﻮص ﻧﺤﻮه ﻓﺸﺮده ﺳﺎزي و ﺑﺎرﮔﺬاري و ﻣﺮاﺟﻌﻪ ﺑﻪ
ﺟﺪول زﯾﺮ در ﺧﻮاﻫﯿﻢ ﯾﺎﻓﺖ ﮐﻪ imageﻣﻮرد ﻧﻈﺮ ﻣﺎ از ﻓﺸﺮه ﺳﺎزي Zipاﺳﺘﻔﺎده ﻣﯿﮑﻨﺪ و ﺑﺎرﮔﺬاري آن ﻧﯿﺰ از RAM
ﺻﻮرت ﻣﯽ ﮔﯿﺮد.
.The image executes from Flash memory
.The image executes from RAM
The image executes from ROM
.The image is relocatable
.The image is compressed using ZIP format
.The image is compressed using MZIP format
.The image is compressed using STAC format
f
m
r
l
z
x
w
ﺟﺪول 2.2-ﻧﺸﺎﻧﮕﺮﻫﺎي ﻓﺸﺮه ﺳﺎزي و ﺑﺎرﮔﺬاري
از ﻧﮕﺎرش 4.21 ﺑﻪ ﺑﻌﺪ ﺳﯿﺴﮑﻮ ﻗﺮارداد ﺟﺪﯾﺪي را ﺑﺮاي ﻧﺎم ﮔﺬاري ﻣﺠﻤﻮﻋﻪ ﻣﺸﺨﺼﻪ ﻫﺎي IOSﻣﻌﺮﻓﯽ ﮐﺮد.اﯾﻦ ﻗﺮارداد
ﺟﺪﯾﺪ در ﻧﮕﺎرش 3.21 آﻏﺎز ﺷﺪ و اوﻟﯿﻦ در ﻧﮕﺎرش 4.21 ﻣﻮرد اﺳﺘﻔﺎده ﻗﺮار ﮔﺮﻓﺖ
092 Page 26 of
28. ﺷﮑﻞ زﯾﺮ درﺑﺮدارﻧﺪه اﺻﻮل ﺟﺪﯾﺪ ﻧﺎم ﮔﺬاري IOSﻫﺎي ﺳﯿﺴﮑﻮ از ﻧﺴﺨﻪ 12.3Tﺑﻪ ﺑﺎﻻ اﺳﺖ
ﺗﺼﻮﯾﺮ 1.2-ﻗﺮارداد ﺟﺪﯾﺪ ﻧﺎم ﮔﺬاري IOSروﺗﺮﻫﺎي ﺳﯿﺴﮑﻮ
ﺑﺎ ﺣﺮﮐﺖ از ﭘﺎﯾﯿﻦ ﺑﺎ ﺑﺎﻻي درﺧﺖ ﻓﻮق در ﻣﯿﺎﺑﯿﻢ ﮐﻪ IP Baseاﯾﻤﯿﺞ ﭘﺎﯾﻪ اﺳﺖ،از اﯾﻦ اﯾﻤﯿﺞ ﭘﺎﯾﻪ IP Voiceﺳﺎﺧﺘﻪ
ﻣﯿﺸﻮد و ﭘﺲ از ان دو ﺷﺎﺧﻪ اﺻﻠﯽ Advanced Securityو Enterprise Baseرا ﺧﻮاﻫﯿﻢ داﺷﺖ.
IP Voiceﻫﻤﭽﻨﯿﻦ داراي ﻗﺎﺑﻠﯿﺖ ارﺗﻘﺎء ﺑﻪ ﺳﺮوﯾﺴﻬﺎي Service Providerاﺳﺖ ﻣﺸﺘﻤﻞ ﺑﺮ ﻣﺸﺨﺼﻪ ﻫﺎي SP
Servicesو IP Voiceو .IP Base
ﻓﻘﻂ اﯾﻤﯿﺞ ﻫﺎي ” “Advancedداراي ﻣﺸﺨﺼﻪ رﻣﺰ ﻧﮕﺎري ) Advanced Encryption Standard (AESﻫﺴﺘﻨﺪ.
ﺧﻼﺻﻪ ﻗﺮاردادﻫﺎي ﺟﺪﯾﺪ ﻧﺎم ﮔﺬاري را در ﮔﺮوه ﻫﺎي زﯾﺮ ﻣﺸﺎﻫﺪه ﻣﯿﮑﻨﯿﻢ
: Baseاﯾﻤﯿﺞ ﭘﺎﯾﻪ ﺑﺎ ﻣﺸﺨﺼﻪ IP Base, Enterprise Base
: Servicesﻣﻌﺮف ﺳﺮوﯾﺴﻬﺎي ﭘﯿﺸﺮﻓﺘﻪ Voice over Frame Relay and Atm ، MPLS ، Voiceﺑﺎ
ﻣﺸﺨﺼﻪ SP Services, Enterprise Services
: Advancedﻣﻌﺮف ﻗﺎﺑﻠﯿﺘﻬﺎي Intrusion ، IPSec، 3DES encryption،Cisco IOS Firewall ، Vpn
:Enterpriseﻣﻌﺮف ﭘﺮوﺗﮑﻠﻬﺎي اﺿﺎﻓﻪ اي ﻫﻤﭽﻮن Ipx,Apple talkﺑﺎ ﻣﺸﺨﺼﻪ Enterprise Baseو
) Detection Systems (IDSﺑﺎ ﻣﺸﺨﺼﻪ Advanced Security, Advanced IP Services
Enterprise Servicesاﺳﺖ.
092 Page 27 of
49. ﺗﺼﻮﯾﺮ 2.8.1 – ﺻﻔﺤﻪ ﺗﻨﻈﯿﻤﺎت cloud
از ﻟﯿﺴﺖ Generic Ethernet Nioﮐﻪ ﺣﺎوي ﻟﯿﺴﺖ ﮐﺎرﺗﻬﺎي ﺷﺒﮑﻪ و Loopback adapterﻫﺎ اﺳﺖ Loopbak
1 adapterرا اﻧﺘﺨﺎب ﻣﯿﮑﻨﯿﻢ و ﺑﺎ ﻓﺸﺮدن دﮐﻤﻪ Addﺑﻪ ﻟﯿﺴﺖ ﻣﯿﺎﻧﯽ ﺻﻔﺤﻪ اﺿﺎﻓﻪ ﻣﯿﮑﻨﯿﻢ.
ﺗﺼﻮﯾﺮ 3.8.1 – اﻧﺘﺨﺎب Loopback adapterو اﺗﺼﺎل آن ﺑﻪ Cloud
ﭘﺲ از اﻓﺰودن Cloudو اﺗﺼﺎل آن ﺑﻪ ﮐﺎرت ﺷﺒﮑﻪ ﻣﺠﺎزي اﯾﺠﺎد ﺷﺪه در ﺳﯿﺴﺘﻢ ﻋﺎﻣﻞ ﻧﻮﺑﺖ اﺗﺼﺎل آن ﺑﻪ ﯾﮑﯽ از
ﭘﻮرﺗﻬﺎي ﺳﻮﯾﯿﭻ واﻗﻊ در 3 Gnsو ﺗﺴﺖ ان اﺳﺖ.ﺑﺎ اﻓﺰودن ﻣﺎژول Nm-16eswﺑﻪ روﺗﺮ 5273 ﺑﻪ ﻧﻮﻋﯽ از آن ﺑﻪ ﻋﻨﻮان
ﺳﻮﯾﯿﭻ اﺳﺘﻔﺎده ﺧﻮاﻫﯿﻢ ﮐﺮد.
092 Page 48 of
50. ﺗﺼﻮﯾﺮ 5.8.1- اﻓﺰودن ﻣﺎژول NM-16ESWﺑﻪ روﺗﺮ
ﭘﺲ از اﻧﺘﺨﺎب Cloudو اﺗﺼﺎل آن از ﻃﺮﯾﻖ 54 Rjﺑﻪ 0/1 Fروﺗﺮ و در واﻗﻊ ﺳﻮﯾﯿﭻ ! ، ﺻﺤﺖ اﺗﺼﺎﻻت را ﭼﮏ ﻣﯿﮑﻨﯿﻢ
092 Page 49 of
51. NM-16ESW ﺑﻪ ﭘﻮرت ﺳﻮﯾﯿﭻ از ﻃﺮﯾﻖ ﻣﺎژولcloud ﺗﺼﻮﯾﺮ 6.8.1 – اﺗﺼﺎل
وF1/0 اﻣﺘﺤﺎن ﻣﯿﮑﻨﯿﻢ.آدرس 42/1.552.861.291 را ﺑﻪR1 ﺑﻪip 4. اﮐﻨﻮن ﺻﺤﺖ اﺗﺼﺎﻻت را ﺑﺎ ﺗﺨﺼﯿﺺ
. ﺗﺨﺼﯿﺺ ﻣﯿﺪﻫﯿﻢLoopback .42/01.552.861.291 را ﺑﻪ
Router con0 is now available
Press RETURN to get started!
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname SW1
SW1(config)#interface FastEthernet 1/0
SW1(config-if)#ip add 192.168.255.1 255.255.255.0
SW1(config-if)#no shut
SW1(config-if)#end
SW1#ping 192.168.255.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.255.10, timeout is 2 seconds:
..!!!
Success rate is 60 percent (3/5)
SW1#ping 192.168.255.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.255.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/5/8 ms
Page 50 of 290
53. ﻓﺼﻞ دوم : ﻣﺪﯾﺮﯾﺖ ﭘﺎﯾﻪ روﺗﺮﻫﺎ و ﺳﻮﯾﯿﭽﻬﺎي ﺳﯿﺴﮑﻮ
آزﻣﺎﯾﺶ 1.2-ﭘﺴﻮرد رﯾﮑﺎوري روﺗﺮﻫﺎي ﺳﺮي 0052
در اﯾﻦ آزﻣﺎﯾﺶ ﺑﺎ ﻣﺮاﺣﻞ Reset/clearﮐﺮدن ﭘﺴﻮرد Consoleو Enableروﺗﺮﻫﺎي ﺳﺮي 0052 آﺷﻨﺎ ﺧﻮاﻫﯿﻢ ﺷﺪ.
ﮐﺎرﺑﺮد ﻋﻤﻠﯽ
ﺳﺮي 0052 از ﻗﺪﯾﻤﯽ ﺗﺮﯾﻦ رده روﺗﺮﻫﺎي ﺳﯿﺴﮑﻮ ﻣﯽ ﺑﺎﺷﺪ و ﺑﻌﻀﺎ ﻣﺸﺎﻫﺪه آﻧﻬﺎ در ﻣﺤﯿﻄﻬﺎي اﺟﺮاﯾﯽ ﺑﺎ Uptimeﻫﺎي
ﻧﺰدﯾﮏ 8 ﺳﺎل ﺑﺎﻋﺚ ﺷﮕﻔﺘﯽ ﻣﯽ ﺷﻮﻧﺪ.اﻣﺮوزه ﻋﻤﺪه ﮐﺎرﺑﺮد اﯾﻦ ﺳﺮي ﺟﻬﺖ اﻫﺪاف آﻣﻮزﺷﯽ و در آزﻣﺎﯾﺸﮕﺎﻫﻬﺎي
ﺷﺒﮑﻪ ﻣﯽ ﺑﺎﺷﺪ و اﺑﺰارﻫﺎي ﻓﻮق اﻟﻌﺎده اي ﺟﻬﺖ ﻣﻌﺮﻓﯽ و آﺷﻨﺎﯾﯽ ﺑﺎ IOSﺳﯿﺴﮑﻮ ﻣﺤﺴﻮب ﻣﯿﺸﻮﻧﺪ.
ﭘﯿﺶ ﻧﯿﺎزﻫﺎي آزﻣﺎﯾﺶ
ﯾﮏ دﺳﺘﮕﺎه روﺗﺮ 0052 ﺑﺎ ﭘﺴﻮرد Consoleﯾﺎ Enableﮔﻢ ﺷﺪه!
ﺑﺮﻗﺮاري ارﺗﺒﺎط ﺑﺎ ﭘﻮرت ﮐﻨﺴﻮل دﺳﺘﮕﺎه
اﻫﺪاف آزﻣﺎﯾﺶ
ﻣﺘﻮﻗﻒ ﮐﺮدن ﻓﺮاﯾﻨﺪ ﺑﻮت دﺳﺘﮕﺎه و ورود ﺑﻪ rom monitor mode
ﺗﻐﯿﯿﺮ ﻣﺤﺘﻮاي configuration registerﺑﻪ 2412×0 ﺟﻬﺖ Bypassﮐﺮدن ﻣﺤﺘﻮاي Nvramدر ﻫﻨﮕﺎم
ﺑﻮت و ﭘﺲ از آن ﭘﯿﮑﺮﺑﻨﺪي ﻣﺠﺪد روﺗﺮ
دﺳﺘﻮر اﻟﻌﻤﻞ آزﻣﺎﯾﺶ
ﺑﺎ ﯾﮏ روﺗﺮ 1052 روﺑﺮو ﻫﺴﺘﯿﻢ ﮐﻪ داري ﭘﺴﻮرد ﮐﻨﺴﻮل ﻧﺎﻣﻌﯿﻨﯽ اﺳﺖ.ﺑﺎ ﭼﻨﯿﻦ ﭘﺴﻮردي و ﺑﺪون داﻧﺴﺘﻦ آن ﻗﺎدر ﺑﻪ
ورود ﺑﻪ ﻣﺤﯿﻂ Exec modeﻧﯿﺴﺘﯿﻢ، ﺑﺎ ﭼﻨﯿﻦ ﺳﻨﺎرﯾﻮﯾﯽ در ﻫﻨﮕﺎم ﺧﺮﯾﺪ ادوات دﺳﺖ دوم زﯾﺎد ﺑﺮﺧﻮرد ﻣﯿﮑﻨﯿﻢ.
Router con0 is now available
.Press RETURN to get started
User Access Verification
:Password
092 Page 52 of
54. روﺗﺮ را روﺷﻦ ﻣﯿﮑﻨﯿﻢ ﺗﺎ ﻓﺮاﯾﻨﺪ ﺑﻮت آﻏﺎز ﺷﻮد ، در اﯾﻦ ﺣﯿﻦ ﻧﯿﺎز اﺳﺖ ﺗﺎ ﻓﺮاﯾﻨﺪ ﺑﻮت ﺑﻪ ﺻﻮرت ﻧﺮﻣﺎل ﻣﺘﻮﻗﻒ
.1
اﻧﺠﺎم ﻣﯽ دﻫﯿﻢ ﺗﺎ ﺑﻪCtrl+Puse Breake ﺑﺎﻻ ﺑﯿﺎﯾﺪ ، اﯾﻨﮑﺎر را ﻓﺸﺮدن ﻣﮑﺮرbootrom ﺷﻮد و روﺗﺮ ﺑﺎ
. وارد ﺷﻮﯾﻢbootrom ﻣﺤﯿﻂ
System Bootstrap, Version 11.0(10c), SOFTWARE
Copyright (c) 1986-1996 by cisco Systems
2500 processor with 14336 Kbytes of main memory
Abort at 0x10B1F3C (PC)
>
را ﺑﻪ 2412×0 ﺗﻐﯿﯿﺮ ﻣﯽ دﻫﯿﻢ ﺗﺎ در ﺑﻮت ﺑﻌﺪي روﺗﺮ از ﻃﺮﯾﻖconfiguration register 2. اﮐﻨﻮن ﻣﺤﺘﻮاي
. ﻣﻮرد ﭘﺮدازش ﻗﺮار ﻧﮕﯿﺮدNvram ﺑﻮت ﺷﻮد و ﻣﺤﺘﻮايIOS
>o/r 0x2142
>i
privileged 3. راه اول:ﭘﺲ از ﺑﻮت ﺷﺪن روﺗﺮ ﺑﺎ ﺻﻔﺤﻪ ﺗﻨﻈﯿﻤﺎت اوﻟﯿﻪ روﺗﺮ روﺑﺮو ﻣﯿﺸﻮد ، ﺑﺎ ورود ﺑﻪ ﻣﺤﯿﻂ
running configuration را ﺑﻪstartup configuration ، ﻣﺤﺘﻮايen از ﻃﺮﯾﻖ ﺗﺎﯾﭗ ﮐﺮدنmode
از ﻃﺮﯾﻖNvram ﮐﭙﯽ ﻣﯿﮑﻨﯿﻢ و ﭘﺲ از ان ﭘﺴﻮردﻫﺎ را ﺗﻐﯿﯿﺮ ﻣﯽ دﻫﯿﻢ در ﻧﻬﺎﯾﺖ ﻫﻢ ذﺧﯿﺮه ﺗﻐﯿﯿﺮات در
. اﻧﺠﺎم ﻣﯿﮕﯿﺮدcopy run start
--- System Configuration Dialog --Would you like to enter the initial configuration dialog? [yes/no]: n
Press RETURN to get started!
Router>enable
Router#copy start run
Destination filename [running-config]?
506 bytes copied in 3.868 secs (168 bytes/sec)
ARCVRSR01#configure terminal
ARCVRSR01(config)#enable secret NEWENABLEPASSWORD
ARCVRSR01(config)#line con 0
ARCVRSR01(config-if)#password NEWPASSWORD
ARCVRSR01(config-if)#end
ARCVRSR01#copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
ARCVRSR01#
وارد ﻣﯽ ﺷﻮﯾﻢ اﻣﺎprivileged mode ﺑﻪ ﻣﺤﯿﻂIOS 4. راه دوم : ﻫﻤﺎﻧﻨﺪ روش ﻗﺒﻠﯽ ﭘﺲ از ﺑﻮت از ﻃﺮﯾﻖ
را ﭘﺎك ﻣﯿﮑﻨﯿﻢNvram اﯾﻨﺒﺎر ﻣﺤﺘﻮاي
--- System Configuration Dialog ---
Page 53 of 290
55. Would you like to enter the initial configuration dialog? [yes/no]: n
Press RETURN to get started!
Router>enable
Router#write erase
Erasing the nvram filesystem will remove all files! Continue? [confirm]
[OK]
Erase of nvram: complete
Router#
را ﺑﻪconfiguration register ﻣﺤﺘﻮايNvram 5. در ﻫﺮ دو ﺣﺎﻟﺖ ﭘﺲ از رﯾﺴﺖ ﮐﺮدن ﭘﺴﻮرد ﯾﺎ ﭘﺎك ﮐﺮدن
. ﺑﻮت ﺧﻮاﻫﺪ ﺷﺪNvram 2012×0 ﺑﺮ ﻣﯿﮕﺮداﻧﯿﻢ ﺑﺎ رﯾﺒﻮت ﺑﻌﺪي ﺳﯿﺴﺘﻢ از ﻃﺮﯾﻖ ﺧﻮاﻧﺪن ﻣﺤﺘﻮاي
Router#configure terminal
Router(config)#config-register 0x2102
Router(config)#end
Page 54 of 290