Tuesday, August 21, 2012

Cisco Router Configuration Command Line Interface (CLI) Modes

You can learn the different Router CLI configuration modes and their specifications here. This article will help you to passing your Cisco certification exams. Generally the lower end Cisco Routers uses different commands than the mid to upper range routers. The commands we are using on different Cisco Routers are almost the same, but there are always a few variations to these commands depending on the interfaces your Cisco Router has, IOS version, and the type of WAN protocols they support.

User Exec Mode:

This is the first mode you'll see on a Cisco Router is user exec mode. This is also the default mode when you are connected the Router using Telnet. You can't write or add to a configuration in this mode, but you can run quite a few show commands. This is a good mode to have users in who need to see the configuration, but shouldn't be allowed to change it.

The user exec mode prompt will look like this:


Privilege or Enable Mode:

This mode has two names, the official one being privileged exec mode. It's more commonly referred to as enable mode, since "enable" is what you type to get into this mode. Now you got complete access privileges of Cisco device but this mode gives you more options for show and other commands, but you still can't configure anything.



Cisco Router Setup Mode:

Cisco Router will go to the setup mode if it is brand new or with default condition. After completing the booting process, Cisco Router will prompt in setup mode for initial configuration dialogue if there is no configuration in the memory. Already configured Cisco Router will not prompt setup mode directly. You can also enter into the Router setup mode any time by using setup command.

The Cisco Router setup mode commands are as follows:

Router # setup

System Configuration Dialog Continue with configuration dialog? [Yes/no]: Y

At any point you may enter a question mark "?" for help

Use ctrl-c to abort the configuration dialog at any prompt

Default settings are in square brackets "[ ]"

Basic management setup configures only enough connectivity for management of the Router, extended setup will ask you to configure each interface on the Router.

Would you like to enter basic management setup? [Yes/no] n

Global Configuration Mode:

To configure the Cisco Router, you must have to enter the global mode. To enter into this mode, issue the configure terminal or config t command from the privileged EXEC mode. All the configurations are done in this mode, and you can also issue a show command like in privilege exec mode by using Do command.

This mode we can call as Global mode or Global configuration mode

Router#conf t

Enter configuration commands, one per line. End with CNTL/Z.


Interface Mode:

To configure any interface, you have to enter the interface's configuration mode. To enter into this mode, issue the interface command from the global configuration mode. You can go back to the privileged EXEC mode by pressing CTRL+Z or issue an END command. To exit from this mode, issue the EXIT command, and you'll be moved to the global configuration mode. You can also use show commands with DO command here.

Router(config)#interface serial0


Sub Interface Configuration Mode:

To configure any logical interfaces on Cisco Router, you have to enter the sub interface's configuration mode. To enter into this, issue the interface command from the global configuration mode with sub or logical interface number.

Router(config)#interface FastEthernet 0/0.1


Router Configuration Mode:

To configure a Router protocol, you have to enter a specific Routing protocol command in global configuration mode. If want to execute a privileged EXEC commands such as the show command, you can execute using DO command. You can go back to the privileged EXEC mode by pressing CTRL+Z or with END command. To exit from this mode, issue the exit command, and you'll be moved to the global configuration mode.

Router(config)#router rip



Line Configuration Mode:

To configure authentication to access the router using the console port or remotely, you have to enter the configuration mode of the specific line(s). To enter into this, issue the line command from the global configuration mode or other configuration mode. If you wish to execute a privileged EXEC command such as the show command, you can precede it by the DO command. You can go back to the privileged EXEC mode by pressing CTRL+Z or with END command. To exit from this mode, issue the exit command, and you'll be moved to the global configuration mode.

The prompt config-line indicates that you're in line configuration mode.

Router#conf t

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#line console 0

Router(config-line)#password cisco


Router(config-line)#line vty 0 4

Router(config-line)#password cisco


Notice that you do not have to exit one interface mode to go to another one. Let's say that you've configured your VTY lines and now want to put an IP address on your Ethernet interface. You don't have to go out with ctrl-z and then start again - you can go straight to interface config mode from line config mode. Just make sure you see the prompt change.

Wednesday, August 15, 2012

What Is System Progressive Protection?

The answer to this question is a fake anti-virus. Unfortunately, this is the only simple answer regarding the malicious System Progressive Protection which schemers invented to steal your money. Of course, the guile is not as straightforward and many Windows users fail to understand or catch the scheme at the right time. Regardless, there is hope as the rogue can and should be defeated. Below you will find essential information regarding System Progressive Protection removal.

Cyber criminals who stand behind the deceitful rogue have enough experience to propagate their creation successfully and efficiently. This is because they are also responsible for releasing Live Security Platinum, Smart Fortress 2012 and other rogue security tool clones. Funnily enough, the latest three infections have the same interfaces, produce the same symptoms and can be removed using the same methods. In the world where people cared about their digital security, the repetitiveness could stop schemers. However, this is not the world we live in.

It has been discovered that the malicious System Progressive Protection can remove access to the Task Manager, disable the Registry Editor and make it impossible to run many of the system's executable files. This not only can restrict the infection's removal, but can also reinforce the illusion that your PC is under an attack of malicious viruses, worms and other infections. This is presented by a completely bogus rogue's scanner which simply lists non-existent threats to grab your attention. Additionally, you may notice fake security notifications popping from the Task Bar, slower PC performance and Internet connection issues. All of this will be concentrated to convince you to purchase the full version of System Progressive Protection. If you do not want your private data leaked and money wasted, you need to ignore such deceitful recommendations.

None of the mentioned symptoms should be linked to infections other than System Progressive Protection. This fake anti-spyware tool is the main danger running on your personal computer, which is why it is essential to delete it before proceeding with any other tasks. You can commence with a special activation key which will disable all symptoms and will allow you to install automatic removal tools or delete System Progressive Protection manually.

The removal of the rogue may become an extremely complicated and time-consuming task, if you proceed manually. Using automatic removal software to delete System Progressive Protection is much more appropriate, because it can also produce requisite computer's protection.

Tuesday, August 7, 2012

Early Installation of Anti-Malware Can Minimize Damage by the Search Redirect Virus

Most of us tend to address problems as they come. Typically, we wait till the last possible minute to take care of a problem that we may have seen coming a while ago. In some instances, this manner of problem resolution doesn't cause a huge snowball effect. But, in the case of the search redirect virus, it may cost you a computer system.

Preparation and Prevention

As soon as a device, whether it's a smartphone, tablet, or computer, connects to the internet it's immediately at risk of an infection. We will focus on computers. So, we all know that measures need to be taken prior to making that connection. The search redirect virus is not biased and will hijack any device that is openly available. To prepare for this threat, it's is imperative that you start with an anti-virus/anti-spyware program that detects rootkits. Next, you will need an anti-malware program, such as Malwarebytes, to scan and quarantine any infection that your anti-virus may overlook. Lastly, either subscribe to an online storage (or cloud) service or get an external hard drive. Be sure to have everything on your computer backed up.

Risks of Not Preparing

Every computer infection can potentially cause serious damage. So, by not making the above preparations, your computer is a breeding ground for search redirect viruses. The worst aspects of these viruses are that they take an element of control of your computer. When this happens, you may or may not have the liberty of downloading all the necessary tools to prevent or remove any threats from your computer. As a result, your computer and all your information will all be compromised by these viruses. You run the risk of having your information extracted for theft and your computer internally destroyed. This is why it's best to go ahead and install all these programs early.

It May Be Too Late

Time is of the essence when dealing with a totally exposed computer using internet. Every second that your computer is unprotected or under-protected, it's offer an opportunity for viruses to come in and make themselves at home. The search redirect virus digs so deep into your systems files, that by the time you start getting signs of its existence, it pretty much already has full control of your web browser. This is never good. Those rootkits are impossible to find manually and even more difficult to remove manually. Take action as soon as possible.

Avoid destroying your computer or devices by preparing and taking preventive measures to stay free of the search redirect virus and all other online threats. The sooner you add the stronger anti-virus and anti-malware program the better you can minimize dame by the search redirect virus.