Speed up computer performance is
very cool article nowadays. You may face this problem when you use own computer
from day to day. So today I have some trick to share you to make your computer
faster than before process. Even though there are a lot of method to make it
your computer better, but for me base on my own experience what I show you in
my below video , it is very cool and reliable way. a
KH Computer & Technology
how to speed up your computer
29.July. 2014 / Today I would like to share you how to speed up your computer .
Cisco ASA Site-to-Site VPN
Cisco ASA Site-to-Site VPN sample.
Configurations
ASA01
object network net-localsubnet 192.168.101.0 255.255.255.0
object network net-remote
subnet 192.168.102.0 255.255.255.0
access-list outside_1_cryptomap permit ip 192.168.101.0 255.255.255.0 192.168.102.0 255.255.255.0
tunnel-group 192.168.0.12 type ipsec-l2l
tunnel-group 192.168.0.12 ipsec-attributes
pre-shared-key pass1234
isakmp keepalive threshold 10 retry 2
crypto isakmp enable outside
crypto isakmp policy 10 authentication pre-share
crypto isakmp policy 10 encrypt 3des
crypto isakmp policy 10 hash sha
crypto isakmp policy 10 group 2
crypto isakmp policy 10 lifetime 86400
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs group1
crypto map outside_map 1 set peer 192.168.0.12
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
nat (inside,outside) 1 source static net-local net-local destination static net-remote net-remote
route outside 0 0 192.168.0.1
ASA02
object network net-localsubnet 192.168.102.0 255.255.255.0
object network net-remote
subnet 192.168.101.0 255.255.255.0
access-list outside_1_cryptomap permit ip 192.168.102.0 255.255.255.0 192.168.101.0 255.255.255.0
tunnel-group 192.168.0.11 type ipsec-l2l
tunnel-group 192.168.0.11 ipsec-attributes
pre-shared-key pass1234
isakmp keepalive threshold 10 retry 2
crypto isakmp enable outside
crypto isakmp policy 10 authentication pre-share
crypto isakmp policy 10 encrypt 3des
crypto isakmp policy 10 hash sha
crypto isakmp policy 10 group 2
crypto isakmp policy 10 lifetime 86400
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs group1
crypto map outside_map 1 set peer 192.168.0.11
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
nat (inside,outside) 1 source static net-local net-local destination static net-remote net-remote
route outside 0 0 192.168.0.1
Restroring an IOS Image on a Cisco 2600 Router
Restroring an IOS Image on a Cisco 2600 Router
We
recently had a classroom situation that required us to copy an IOS
image to a router in rom monitor mode using TFTP. I hope you never have
to do this, but if you do, it’s helpful to know how. We had copied a new
IOS image onto the router which turned out to be corrupted. The old IOS
image had already been erased, so the router had no IOS image available
for its use. The router returned a rommon > prompt. By using the
following series of commands, we were able to download a good IOS image
from a TFTP server located at 10.16.0.13 and we were back up and running
in about 15 minutes. This procedure uses the first LAN port (in our
case ethernet 0/0) and can only be used for downloading a file. It
cannot be used to upload a file from the router.
A
tip: After you finish configuring the IP address and various related
parameters, issue the sync command to copy the settings to NVRAM. That
way, if you have to repeat the procedure, at least you won’t have to
reenter all the settings.
You can see what settings are already in place by using the set command in ROM monitor mode.
Here’s a step-by-step guide to what you need to do:
rommon 10 > IP_ADDRESS=10.16.0.14
rommon 11 > IP_SUBNET_MASK=255.240.0.0
rommon 12 > DEFAULT_GATEWAY=10.16.0.1
rommon 13 > TFTP_SERVER=10.16.0.13
rommon 14 > TFTP_FILE=c2600-c-mz.123-3h.bin
rommon 15 > tftpdnld
IP_ADDRESS: 10.16.0.14
IP_SUBNET_MASK: 255.240.0.0
DEFAULT_GATEWAY: 10.16.0.1
TFTP_SERVER: 10.16.0.13
TFTP_FILE: c2600-c-mz.123-3h.bin
rommon 11 > IP_SUBNET_MASK=255.240.0.0
rommon 12 > DEFAULT_GATEWAY=10.16.0.1
rommon 13 > TFTP_SERVER=10.16.0.13
rommon 14 > TFTP_FILE=c2600-c-mz.123-3h.bin
rommon 15 > tftpdnld
IP_ADDRESS: 10.16.0.14
IP_SUBNET_MASK: 255.240.0.0
DEFAULT_GATEWAY: 10.16.0.1
TFTP_SERVER: 10.16.0.13
TFTP_FILE: c2600-c-mz.123-3h.bin
Invoke
this command for disaster recovery only. WARNING: all existing data in
all partitions on flash will be lost!Do you wish to continue? y/n: [n]: y
Receiving c2600-c-mz.123-3h.bin from 10.16.0.13..!!!!!!!!!!!!!!!!!!!!!!!!!!!!…File reception completed.
Copying file c2600-c-mz.123-3h.bin to flash.
Erasing flash at 0×607c0000program flash location 0×60440000
rommon 16 >reset[enter]
RESET ROOT PASSWORD OF RED HAT ENERPRISE LINUX 5.5
RESET ROOT PASSWORD OF RED HAT ENERPRISE LINUX
Red Hat Enterprise Linux is Linux-base operating
system and All of Redhat official support and training. And certificate that
most system administrator acquire is RHCE
Today I would like to show you how to reset the root
password from RHEL 5.5. as below step :
To be able reset the root password , we Must enter single
mode of RHEL 5.5
1.
Start up Red Hat Enterprise system.
2.
Then type letter “e” to edit the Grub
loader
3.
High light to second line as above image and
type letter “e”
4. Type number “1” at the end of the line as
below images then enter
5. After enter, they will go one backward screen then
type letter to “b” (below image)
6.
After boot , you will got single mode then
type command “passwd” to change root password.
7. Done !!!! Enjoy
Subscribe to:
Posts (Atom)