Current location - Recipe Complete Network - Catering training - Advanced required reading for network management: questions and answers related to the use of switches.
Advanced required reading for network management: questions and answers related to the use of switches.
Solution: The switch cannot be assigned an IP address.

For those switches that can support network management, manufacturers usually set the default IP address for them, and we can use TELNET command or Web window to manage and maintain them remotely in the future. However, there are also some switches that support network management, and they are not assigned IP addresses by default. In the face of this type of switch, how to assign an appropriate IP address for it to facilitate remote management and maintenance in the future? In fact, we can skillfully use the serial port of the computer system to allocate the appropriate IP address for the switch. The following are the specific implementation steps:

First, connect the switch with the local computer by using the serial cable provided with the switch. When connecting, we can first insert one end of the serial cable directly into the "console" port on the back of the switch, and pay attention to tighten the fixing screws to ensure reliable line connection. Then, plug the other port of the serial cable into the serial port of the local computer. We need to write down whether the cable is plugged into the COM 1 port or the COM2 port.

After connecting the physical lines, start the switch system and the local computer system respectively, and then check whether there is a "HyperTerminal" program in the local computer system. If it is not found, we can install the program components through Add/Remove Programs.

Then click Start/Programs/Accessories/Communication/HyperTerminal in turn, and a HyperTerminal New Wizard window will pop up. By default, the wizard will think that HyperTerminal is connected through a modem, and we can enter any area code for the connection. If there is no modem device connected to the local computer, the wizard window will pop up "You must install a modem before connecting. Do you want to install it now? When prompted, we just need to click the "No" button;

Easily set up a wireless network print server with an old computer.

At work, there are still many documents that need to be printed by the company, but it is really inconvenient to connect the laptop to the printer, so colleagues who use laptops can only use flash memory to copy the documents to the printing room or the desktop computer in the office for printing. Copying files for a long time is really troublesome, so many colleagues want to set up a * * * printer to enjoy printing, and then realize * * * to enjoy printing on their own computers through the company's wireless network.

In order to facilitate colleagues to print remotely, I set up a wireless network print server in the company, so that colleagues can print the files that need to be printed on any computer through the print server, and we can also manage the print server remotely through the webpage.

The difference between online printing and * * * enjoying printing.

In the early days, a computer on the network was connected to a printer and set to * * * mode. Other computers have to * * * enjoy this printer and connect through * * * mode to realize * * * enjoying printing. If more users use the printer, the computer connected to the printer will be embarrassed, burdened and a little troublesome to manage.

Network printer is an Internet-based network printer. The printer is no longer a peripheral device, but exists as a node on the network. The network printer is directly connected to the network through the network cable slot, and remotely managed through the Web, so as to realize high-speed printing and output at the network speed.

Install the print server

Network printing needs a printer with a network printing server, but the price of such a printer is not cheap. In order to save costs and make full use of existing resources, I virtualized an old computer in the company into a print server, so that colleagues can easily print online in the company LAN.

First, make sure that the computer has installed Windows Server 2003 system and can connect to the company LAN normally. Then, connect the printer to the computer, open the Manage Your Server component, click Add Printer in the printer server (Figure 1), and then follow the prompts to add the printer we need to install and install the printer driver.

Then right-click the printer icon in the Printer and Fax dialog box in Control Panel →, and select Properties Command. In the printer properties dialog box that opens, set the printer to * * * sharing mode and enter a * * * sharing name (Figure 2).

Later, we need to install the printer driver on the computer operated by our colleagues. When installing, open the network neighborhood on the computer and find the computer with the printer installed. At this point, we can see the name of the printer we installed, right-click and select Connect. At this time, the system prompts that the printer driver will be installed on this machine. Select Yes to install the network printer driver.

Set up Web management

After the printer is set up, we need to publish it through IIS to realize network printing. Start the IIS program that comes with the system. First, we create a virtual directory for the network printer.

Tip: IIS components are not installed in Windows XP system by default. If it is not installed in our system, we will install it in Add/Remove programs first.

When creating, in the IIS list, right-click the default website, click New → Virtual Directory, and then open the Create Wizard dialog box. In this wizard, we can set an alias of a virtual directory according to the prompt, such as "print", point the directory to the installation directory of the printer driver, and set the "access right" to "read and run the script". After creating the virtual directory, open the properties dialog box of the site directory and select the Enable default document check box in the document dialog box. Then click the Add button on the right to add a default file name. For example, the default document of HP printer is "Ipp_000 1.asp". Then click the OK button.

When the target printer needs to be managed remotely, run the IE browser program on any computer in the local area network and enter the URL address of the network printer. ): The IP remote configuration of the switch is carried out through the TELNET program, usually after the console port is configured with the IP of the switch. In addition to the above two methods, there are actually two methods:

1, the WEB configuration method, which can only be the general setting of Cisco switch configuration.

2. Applications and special programs attached to hardware are rarely used.

Establish a console to connect to the switch. Generally, the switch comes with a console cable, one end of which is connected to the Comsole port of the switch and the other end is connected to the serial port of the computer. Turn on HyperTerminal, and you can usually connect to the switch. The specific parameters are set as follows so that you can connect to the switch.

After connecting the switch, if it is the first time to start, initialization operation is needed, and general information such as the name and password of the switch are generally set. Since the switch has been initialized, you must enter privileged EXEC mode if you want to perform initialization operation.

Enter: setup at the command prompt to start the initialization operation. Just now, I talked about privileged execution mode. The reason is to talk about several modes of switches. Different modes can execute different operation commands. First, there are two basic modes.

Generally speaking, for security reasons, CISCO divides operation sessions into two different access levels: user execution level and privileged execution level. The user's EXEC level can only use a limited number of commands, and the switch displays switch >: Prompt, so it is impossible for Cisco switch configuration. Look at the example, in the state of user EXEC level: aitg _ frontekcoresw >;; .

Comprehensive description of filtering strategy of intelligent three-layer switch

Layer 3 switches have a lot to learn. Here we mainly introduce the intelligent traffic processing technology of layer 3 switch. The popularization of computer network and the expansion of its application range are changing our world, as well as our thinking and lifestyle. The continuous development of network technology makes us pay more attention to how people will use computers and how to create more living space for mankind by using the network after entering the digital and information era.

First, new topics brought by high bandwidth

In the field of modern data communication, people's thinking can't keep up with the growth of network bandwidth. The network carrying capacity of communication equipment is driven by the increasing demand for data traffic processing and the processing ability based on solving concurrent data streams. With the continuous improvement of network bandwidth, the traditional network data processing methods and data stream distribution methods can no longer meet the throughput requirements of large-capacity data streams. Here, the fast ASIC technology that can handle the data of the second, third and fourth layers of the network will be able to meet the requirements of high bandwidth and high throughput of the network. However, in the environment of large capacity and high bandwidth, if the application is not restricted, the data flow in the network will be like a runaway wild horse and a flood that breaks its banks. Therefore, how to manage and distribute data streams is a new topic in broadband mode.

In the process of network data processing, it is inevitable to encounter the problems of data flow distribution efficiency and data packet stability after data flow distribution. These two problems are blind spots that plague the QoS guarantee of broadband service data flow. People are often blinded by the high transmission speed of data packets in broadband mode, forgetting the distribution efficiency and stability of data streams, reducing the utilization efficiency of broadband networks, increasing transmission costs, making broadband a castle in the air and high transmission speed a mirage.

According to the characteristics of the above problems, the stream processing method based on three-layer switching uses the hardware multi-layer switching technology of ASIC to realize layered data packet processing. Firstly, data streams are classified, and then different data streams are given different priorities, so as to process network data more efficiently without losing data exchange performance and ensure the priority transmission of key data. In other words, this ASIC integrated processing technology provides an integrated and fast processing platform for data packets, so that data packets can complete the whole process of routing and even access policy processing in ASIC chips.

Traditional IP forwarding is realized by software. Compared with modern broadband data exchange mode, simple and simple software forwarding efficiency is undoubtedly a drop in the bucket. Therefore, efficient switching and flow classification capabilities must be based on cached IP switching. Different from Layer 2 switching, Layer 3 switching needs the intervention of CPU, and its main tasks include: running RIP, OSPF and other routing protocols to generate routing tables; Run ARP protocol to resolve IP address; Set cached IP forwarding table entries.

As a basic network, IP network is evolving into a multi-service network. Therefore, network devices must provide platforms for data operation for different strategies. In the intelligent architecture of the port gigabit three-layer switch, each packet can be processed according to the policy through a fast filtering engine.

Second, the filtering strategy of intelligent three-layer switch

The filtering strategy in intelligent switching architecture adopts the method of analyzing the first 80 bytes of data frame, and makes flexible strategies according to the different needs of users to provide corresponding intelligent services. Generally speaking, the main filtering strategies include the following points.

Physical port: mainly solves the filtering of fixed port users.

Two-layer strategy: it mainly solves the filtering of two-layer characteristics of the package, which can be based on the user's MAC address information, VLAN information and so on.

Three-layer strategy: it mainly solves the three-layer feature filtering of the package, which can be based on the source IP address of the user or the destination IP address that the user needs to access. According to the user's source IP subnet, the user can also access the destination IP subnet, and the source and destination IP information can be used in combination.

Application policy: it mainly solves the realization of more than three layers of policies, which can be based on the port number of TCP or UDP and the related characteristics of application data, such as the domain name of DNS packets and other information.

According to the multi-layer information of data packet, we can identify how the data stream establishes the connection, the flow direction of IP packet in the signaling channel and the data type carried by IP packet. By comparing the traffic classification table, we can clearly understand the accurate information of data flow, so as to accurately choose the strategy of data flow and make the data flow exchange smoothly in a benign environment.

Third, the intelligent service of intelligent three-layer switch

Take the Gigabit Layer 3 switch of Harbor Network Company as an example. The main intelligent services it can provide according to the different needs of users include the following. Support packet loss forwarding: In practical network applications, users can get selective services, such as packet loss according to the IP address of the destination site, thus limiting users' access to some sites. Support redirection of packet output port: traffic engineering can be realized in practical network applications. Support the transmission of priority services of 802. 1p on the second floor of the network: different levels of gold, silver and copper services can be realized according to different payments, so as to ensure the service of high-priority users as much as possible. Support network three-layer DiffServ service: provide priority marking and priority differentiation processing of data packets.

The above intelligent services can solve the problems of distribution efficiency and stability of network data streams in transmission. The physical medium of the network is the carrier of all kinds of network data streams. On this carrier, there will inevitably be some broken or long data packets, or data packets of non-important services will occupy a lot of network bandwidth. Selectively discarding data packets and selectively controlling priority can not only solve the problem of network transmission efficiency, but also ensure the quality of service of important applications.