There are five passwords used to secure your Cisco routers: console, auxiliary, telnet (VTY),enable password, and enable secret. Just as you learned earlier in the chapter, the first two passwords are used to set your enable password that’s used to secure privileged mode. This will prompt a user for a password when the enable command […]
Continue reading…
Network
Howto setup cisco router Hostnames
You can set the identity of the router with the hostname command. This is only locally significant,which means that it has no bearing on how the router performs name lookups or how the router works on the internetwork.
Continue reading…
Mount a remote file system through ssh Using sshfs
If you want to access a remote file system through ssh you need to install sshfs.sshfs is a filesystem client based on the SSH File Transfer Protocol. Since most SSH servers already support this protocol it is very easy to set up: i.e. on the server side there’s nothing to do. On the client side […]
Continue reading…
Gip – IP calculator for GNOME desktop environment
Gip is an IP address calculator that integrates well with the GNOME desktop environment.Gip provides system administrators with tools for IP address based calculations. For example, an administrator who needs to find out which IP prefix length equals the IP netmask 255.255.240.0, just types in the mask and gets the prefix length presented. But many […]
Continue reading…