Beruflich Dokumente
Kultur Dokumente
Volume 1 Issue1 pp 008-0013 March 2012 www. ijsret.org ISSN 2278 - 0882
example) it will start in setup mode and it will ask if you want to enter the initial configuration dialog. If you answer with No, you'll be taken to the command prompt and you'll be able to configure the router manually. If you answer with Yes, you'll be taken through a list of questions allowing you to configure the router e.g. set a hostname and enable password and secret, configure routed and routing protocols, and assign addresses to interfaces. You can initiate this configuration dialog at any time by using the setup command.
I. INTRODUCTION
A router boots similar to a regular computer as it first performs a power on self test (POST) for the hardware, next loads bootstrap code from ROM, loads the IOS image from Flash into RAM and finally the router locates and loads a configuration file. You can reboot a router by using the power switch or the reload command. The Internetwork Operating System (IOS) and configuration files reside in different locations in a router. So it is very important to understand both where these files are located and how they work. The router configuration is stored in NVRAM. This is the place where the router will search for a configuration file. Alternatively, you can configure the router to load a configuration file from a TFTP server. If the router cannot locate a configuration file (on a new router for
IJSRET @ 2012
The boot field, which consists of bits 0-3 in the configuration register, controls the router boot sequence. Table 3 describes the boot field bits. Table 3: The Boot Field Use Boot Field 00 To boot in ROM monitor mode, set the Configuration register to 2100 01 To boot an IOS image stored in ROM, set the Configuration register to 2101 02-F Any value from 2102 through 210F tells the router to use the boot commands specified in NVRAM IV.
1 1 1 1 1 1 9 8 7 6 5 4 3 2 1 0 5 4 3 2 1 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0
To see the current value of the configuration use the show version command:
Note: The prefix 0 to the configuration register address means that the digits that follow are in hexadecimal. Table 2 lists the configuration register bit meanings. Notice that bit 6 can be used to ignore the NVRAM contents, so this bit is used for password recovery. Table 2: configuration register bit meanings Bit Hex Description 0-3 00000Boot field (see table 3) 0000F 6 00040 Ignore NVRAM contents 7 00080 OEM bit enabled 8 00100 break disabled 10 00400 IP broadcast with all zeros 5, 11- 00800Console line speed 12 01000 13 02000 Boot default ROM software if network boot fails IJSRET @ 2012
Router# show version Cisco IOS Software, 2800 Software (C2800NMIPBASE-M), Version 12.3(14)T7, RELEASE SOFTWARE (fc2) ROM: System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1) Copyright (c) 2000 by cisco Systems, Inc. System returned to ROM by power-on System image file is "flash:c2800nm-ipbasemz.123-14.T7.bin" cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory Processor board ID JAD05190MTZ (4292891495) M860 processor: part number 0, mask 49 1 Ethernet/IEEE 802.3 interface(s) 3 FastEthernet/IEEE 802.3 interface(s) 7 Low-speed serial(sync/async) network interface(s) 239K bytes of NVRAM.
IJSRET @ 2012
IJSRET @ 2012
IJSRET @ 2012
By the help of changing configuration register, you can bypass the booting sequence to enter the router. Now you can recover the password of the router and save the running-configuration file to the startup-configuration for future use. Have a pleasant stay in your router.
REFERENCES
[1] Comer, D. Internetworking with TCP/IP, Volume 1:
Principles, Protocols and Architecture. Upper Saddle River, NJ: Prentice Hall, 2000. [2] Comer, D. Computer Networks. Upper Saddle River, NJ: Prentice Hall, 2004. [3] Huitema, C. Routing in the Internet. Upper Saddle River, NJ: Prentice Hall, 2000. [4] Perlman, R. Interconnection: Bridges, Routers, Switches and Internetworking Protocols. Reading, MA: Addison-Wesley, 2000. [5] Stallings, W. Data and Computer Communications. Upper Saddle River, NJ: Prentice Hall, 2004. [6] Stallings, W. High Speed Networks. Upper Saddle River, NJ: Prentice Hall, 1998. [7] Yuan R. and Strayer, W. Virtual Private Network. Reading, MA: Addison-Wesley, 2001. [8] Tanenbaum, A. Computer Networks. Upper Saddle River, NJ: Prentice Hall, 2003. [9] Peterson, L. and Davie B. Computer Networks: A System Approach. San Francisco, CA: Morgan, Kaufmans, 2000. [10]Moy, J. OSPF: Anatomy of an Internet Routing Protocol. Reading, MA: Addison-Wesley, 1998.
VII. CONCLUSION
IJSRET @ 2012