<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.24pin.tech/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Vlatona</id>
	<title>24PinTech Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.24pin.tech/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Vlatona"/>
	<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/view/Special:Contributions/Vlatona"/>
	<updated>2026-05-08T17:17:01Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=User:Vlatona&amp;diff=1903</id>
		<title>User:Vlatona</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=User:Vlatona&amp;diff=1903"/>
		<updated>2022-08-08T17:49:12Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Alumni Page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
My name is Vincent Latona. I was a member with 24PinTech from 2017-2019 and graduated in 2019. I was primarily a network technician/administrator in my time with 24PinTech. I would describe myself as a hard worker who took initiative during my time with 24PinTech. I completed an entire year's worth of content from the Cisco Networking Academy in the course of 1 semester. I always say that what I was able to achieve is easy to replicate, so long as someone has the passion and the work ethic to achieve their goals. I currently work at the City of Maricopa while attending college. I hope to obtain a job in the IT industry related to Networking and to bring my Computer Science experience to advance in the industry.&lt;br /&gt;
&lt;br /&gt;
== Certifications ==&lt;br /&gt;
&lt;br /&gt;
* TestOut Network Pro&lt;br /&gt;
* TestOut Routing Pro&lt;br /&gt;
* TestOut Switching Pro&lt;br /&gt;
* Cisco Certified Network Associate (2020)&lt;br /&gt;
&lt;br /&gt;
== Awards ==&lt;br /&gt;
&lt;br /&gt;
* 2018 SkillsUSA Arizona Internetworking Bronze Medal (3rd Place)&lt;br /&gt;
* 2019 Arizona SkillsUSA Internetworking Gold Medal (1st Place)&lt;br /&gt;
* 2019 National SkillsUSA Internetworking Gold Medal (1st Place)&lt;br /&gt;
&lt;br /&gt;
== My Mark ==&lt;br /&gt;
In my time with 24PinTech, I was responsible for the configuration of the Console Server for the Networking lab. I also managed the team to design and implement the Networking lab for 24PinTech. I was also the first National champion that Chamberlain had ever had.&lt;br /&gt;
&lt;br /&gt;
== Where Am I? ==&lt;br /&gt;
At time of writing, I am going into my Senior year at Arizona State University in the Computer Science program in the School of Computing and Augmented Intelligence. I also currently work for Maricopa Esports for the City of Maricopa as a Tournament Organizer and as in-house IT support.&lt;br /&gt;
&lt;br /&gt;
== Contact Information ==&lt;br /&gt;
'''Phone''' - 602-903-9040&lt;br /&gt;
&lt;br /&gt;
'''Personal Email''' - vinnielatona@gmail.com&lt;br /&gt;
&lt;br /&gt;
'''Work Email''' - vincent.latona@maricopa-az.gov&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
In conclusion, I hope that others follow my footsteps in 24PinTech and continue to win championships for Chamberlain. I hope that others take the initiative to work hard and to achieve more than I have achieved. Most of all, I hope that the future students advance the program to further heights.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=24PinTechSwitch_Config&amp;diff=1058</id>
		<title>24PinTechSwitch Config</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=24PinTechSwitch_Config&amp;diff=1058"/>
		<updated>2020-01-17T04:07:49Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: /* Running Configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Running Configuration==&lt;br /&gt;
Current configuration : 10309 bytes&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
! Last configuration change at 03:18:05 UTC Fri Jan 17 2020&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
version 16.3&lt;br /&gt;
&lt;br /&gt;
no service pad&lt;br /&gt;
&lt;br /&gt;
service timestamps debug datetime msec&lt;br /&gt;
&lt;br /&gt;
service timestamps log datetime msec&lt;br /&gt;
&lt;br /&gt;
service password-encryption&lt;br /&gt;
&lt;br /&gt;
no platform punt-keepalive disable-kernel-core&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
hostname 24PinTech_Switch&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
vrf definition Mgmt-vrf&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
address-family ipv4&lt;br /&gt;
&lt;br /&gt;
exit-address-family&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
address-family ipv6&lt;br /&gt;
&lt;br /&gt;
exit-address-family&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
enable secret 5 $1$bibk$uwpxgKcUpBT0Qz.R1EfA50&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
no aaa new-model&lt;br /&gt;
&lt;br /&gt;
switch 1 provision ws-c3650-24ps&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
crypto pki trustpoint TP-self-signed-833429682&lt;br /&gt;
&lt;br /&gt;
enrollment selfsigned&lt;br /&gt;
&lt;br /&gt;
subject-name cn=IOS-Self-Signed-Certificate-833429682&lt;br /&gt;
&lt;br /&gt;
revocation-check none&lt;br /&gt;
&lt;br /&gt;
rsakeypair TP-self-signed-833429682&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
crypto pki certificate chain TP-self-signed-833429682&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
license boot level ipbasek9&lt;br /&gt;
&lt;br /&gt;
diagnostic bootup level minimal&lt;br /&gt;
&lt;br /&gt;
spanning-tree mode rapid-pvst&lt;br /&gt;
&lt;br /&gt;
spanning-tree extend system-id&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
redundancy&lt;br /&gt;
&lt;br /&gt;
mode sso&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-topology-control&lt;br /&gt;
&lt;br /&gt;
description Topology control&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-sw-forward&lt;br /&gt;
&lt;br /&gt;
description Sw forwarding, SGT Cache Full, LOGGING&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-default&lt;br /&gt;
&lt;br /&gt;
description DHCP snooping, show forward and rest of traffic&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-sys-data&lt;br /&gt;
&lt;br /&gt;
description Learning cache ovfl, Crypto Control, Exception, EGR Exception, NFL SAMPLED DATA, Gold Pkt, RPF Failed&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-punt-webauth&lt;br /&gt;
&lt;br /&gt;
description Punt Webauth&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-forus&lt;br /&gt;
&lt;br /&gt;
description Forus Address resolution and Forus traffic&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-multicast-end-station&lt;br /&gt;
&lt;br /&gt;
description MCAST END STATION&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-multicast&lt;br /&gt;
&lt;br /&gt;
description Transit Traffic and MCAST Data&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-l2-control&lt;br /&gt;
&lt;br /&gt;
description L2 control&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-dot1x-auth&lt;br /&gt;
&lt;br /&gt;
description DOT1X Auth&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-data&lt;br /&gt;
&lt;br /&gt;
description ICMP_GEN and BROADCAST&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-control-low-priority&lt;br /&gt;
&lt;br /&gt;
description ICMP redirect and general punt&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-wireless-priority1&lt;br /&gt;
&lt;br /&gt;
description Wireless priority 1&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-wireless-priority2&lt;br /&gt;
&lt;br /&gt;
description Wireless priority 2&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-wireless-priority3-4-5&lt;br /&gt;
&lt;br /&gt;
description Wireless priority 3,4 and 5&lt;br /&gt;
&lt;br /&gt;
class-map match-any non-client-nrt-class&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-routing-control&lt;br /&gt;
&lt;br /&gt;
description Routing control&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-protocol-snooping&lt;br /&gt;
&lt;br /&gt;
description Protocol snooping&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
policy-map port_child_policy&lt;br /&gt;
&lt;br /&gt;
class non-client-nrt-class&lt;br /&gt;
&lt;br /&gt;
bandwidth remaining ratio 10&lt;br /&gt;
&lt;br /&gt;
policy-map system-cpp-policy&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-data&lt;br /&gt;
&lt;br /&gt;
police rate 200 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-sys-data&lt;br /&gt;
&lt;br /&gt;
police rate 100 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-sw-forward&lt;br /&gt;
&lt;br /&gt;
police rate 1000 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-multicast&lt;br /&gt;
&lt;br /&gt;
police rate 500 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-multicast-end-station&lt;br /&gt;
&lt;br /&gt;
police rate 2000 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-punt-webauth&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-l2-control&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-routing-control&lt;br /&gt;
&lt;br /&gt;
police rate 1800 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-control-low-priority&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-wireless-priority1&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-wireless-priority2&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-wireless-priority3-4-5&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-topology-control&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-dot1x-auth&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-protocol-snooping&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-forus&lt;br /&gt;
&lt;br /&gt;
class system-cpp-default&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel1&lt;br /&gt;
&lt;br /&gt;
description Ports: 21, 22, 23, 24 to Freyr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel2&lt;br /&gt;
&lt;br /&gt;
description Ports: 3, 4, 5, 6 to Loki&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel3&lt;br /&gt;
&lt;br /&gt;
description Ports: 1, 2 to School Network&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode trunk&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel4&lt;br /&gt;
&lt;br /&gt;
description Ports: 7, 8, 17, 18 to Hela&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel5&lt;br /&gt;
&lt;br /&gt;
description Ports: 13, 14, 15, 16 to Logan&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel6&lt;br /&gt;
&lt;br /&gt;
description Ports: 19, 20 to Surtr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
&lt;br /&gt;
vrf forwarding Mgmt-vrf&lt;br /&gt;
&lt;br /&gt;
no ip address&lt;br /&gt;
&lt;br /&gt;
negotiation auto&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/1&lt;br /&gt;
&lt;br /&gt;
description Ports: 1, 2 to School Network&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode trunk&lt;br /&gt;
&lt;br /&gt;
channel-group 3 mode active&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/2&lt;br /&gt;
&lt;br /&gt;
description Ports: 1, 2 to School Network&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode trunk&lt;br /&gt;
&lt;br /&gt;
channel-group 3 mode active&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/3&lt;br /&gt;
&lt;br /&gt;
description Ports: 3, 4, 5, 6 to Loki&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 2 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/4&lt;br /&gt;
&lt;br /&gt;
description Ports: 3, 4, 5, 6 to Loki&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 2 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/5&lt;br /&gt;
&lt;br /&gt;
description Ports: 3, 4, 5, 6 to Loki&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 2 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/6&lt;br /&gt;
&lt;br /&gt;
description Ports: 3, 4, 5, 6 to Loki&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 2 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/7&lt;br /&gt;
&lt;br /&gt;
description Ports: 7, 8, 17, 18 to Hela&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 4 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/8&lt;br /&gt;
&lt;br /&gt;
description Ports: 7, 8, 17, 18 to Hela&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 4 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/9&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/10&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/11&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/12&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/13&lt;br /&gt;
&lt;br /&gt;
description Ports: 13, 14, 15, 16 to Logan&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/14&lt;br /&gt;
&lt;br /&gt;
description Ports: 13, 14, 15, 16 to Logan&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/15&lt;br /&gt;
&lt;br /&gt;
description Ports: 13, 14, 15, 16 to Logan&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/16&lt;br /&gt;
&lt;br /&gt;
description Ports: 13, 14, 15, 16 to Logan&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/17&lt;br /&gt;
&lt;br /&gt;
description Ports: 7, 8, 17, 18 to Hela&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 4 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/18&lt;br /&gt;
&lt;br /&gt;
description Ports: 7, 8, 17, 18 to Hela&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 4 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/19&lt;br /&gt;
&lt;br /&gt;
description Ports: 19, 20 to Surtr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 6 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/20&lt;br /&gt;
&lt;br /&gt;
description Ports: 19, 20 to Surtr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 6 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/21&lt;br /&gt;
&lt;br /&gt;
description Ports: 21, 22, 23, 24 to Freyr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/22&lt;br /&gt;
&lt;br /&gt;
description Ports: 21, 22, 23, 24 to Freyr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/23&lt;br /&gt;
&lt;br /&gt;
description Ports: 21, 22, 23, 24 to Freyr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/24&lt;br /&gt;
&lt;br /&gt;
description Ports: 21, 22, 23, 24 to Freyr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/1&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/2&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/3&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/4&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Vlan1&lt;br /&gt;
&lt;br /&gt;
no ip address&lt;br /&gt;
&lt;br /&gt;
shutdown&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Vlan99&lt;br /&gt;
&lt;br /&gt;
description Management VLAN for CISCOACA.local domain&lt;br /&gt;
&lt;br /&gt;
ip address 10.21.25.12 255.255.255.0&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ip forward-protocol nd&lt;br /&gt;
&lt;br /&gt;
ip http server&lt;br /&gt;
&lt;br /&gt;
ip http authentication local&lt;br /&gt;
&lt;br /&gt;
ip http secure-server&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Bulk-Data&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 22&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 465&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 143&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 993&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 995&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1914&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq ftp&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq ftp-data&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq smtp&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq pop3&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-MultiEnhanced-Conf&lt;br /&gt;
&lt;br /&gt;
permit udp any any range 16384 32767&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 50000 59999&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Scavanger&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 2300 2400&lt;br /&gt;
&lt;br /&gt;
permit udp any any range 2300 2400&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 6881 6999&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 28800 29100&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1214&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1214&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 3689&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 3689&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 11999&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Signaling&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 2000 2002&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 5060 5061&lt;br /&gt;
&lt;br /&gt;
permit udp any any range 5060 5061&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Transactional-Data&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 443&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1521&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1521&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1526&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1526&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1575&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1575&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1630&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1630&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1527&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 6200&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 3389&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 5985&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 8080&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
control-plane&lt;br /&gt;
&lt;br /&gt;
service-policy input system-cpp-policy&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
banner motd ^CAuthorized personnel only! Violators will be subject to the wrath of Chambie!^C&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
line con 0&lt;br /&gt;
&lt;br /&gt;
password 7 080078764D4B554742&lt;br /&gt;
&lt;br /&gt;
logging synchronous&lt;br /&gt;
&lt;br /&gt;
login&lt;br /&gt;
&lt;br /&gt;
stopbits 1&lt;br /&gt;
&lt;br /&gt;
line aux 0&lt;br /&gt;
&lt;br /&gt;
stopbits 1&lt;br /&gt;
&lt;br /&gt;
line vty 0 4&lt;br /&gt;
&lt;br /&gt;
password 7 080878764A4A554742&lt;br /&gt;
&lt;br /&gt;
logging synchronous&lt;br /&gt;
&lt;br /&gt;
login&lt;br /&gt;
&lt;br /&gt;
line vty 5 15&lt;br /&gt;
&lt;br /&gt;
password 7 080878764A4A554742&lt;br /&gt;
&lt;br /&gt;
logging synchronous&lt;br /&gt;
&lt;br /&gt;
login&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent exec&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent config&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent filesys&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent notify&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ap dot11 airtime-fairness policy-name Default 0&lt;br /&gt;
&lt;br /&gt;
ap group default-group&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 0&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 1&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 2&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 3&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 4&lt;br /&gt;
&lt;br /&gt;
end&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=24PinTechSwitch_Config&amp;diff=1032</id>
		<title>24PinTechSwitch Config</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=24PinTechSwitch_Config&amp;diff=1032"/>
		<updated>2019-12-16T20:24:52Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Newest config of back switch&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Running Configuration==&lt;br /&gt;
24PinTech_Switch#show run&lt;br /&gt;
&lt;br /&gt;
Building configuration...&lt;br /&gt;
&lt;br /&gt;
Current configuration : 11232 bytes&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
! Last configuration change at 20:21:32 UTC Mon Dec 16 2019&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
version 16.3&lt;br /&gt;
&lt;br /&gt;
no service pad&lt;br /&gt;
&lt;br /&gt;
service timestamps debug datetime msec&lt;br /&gt;
&lt;br /&gt;
service timestamps log datetime msec&lt;br /&gt;
&lt;br /&gt;
service password-encryption&lt;br /&gt;
&lt;br /&gt;
no platform punt-keepalive disable-kernel-core&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
hostname 24PinTech_Switch&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
vrf definition Mgmt-vrf&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
address-family ipv4&lt;br /&gt;
&lt;br /&gt;
exit-address-family&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
address-family ipv6&lt;br /&gt;
&lt;br /&gt;
exit-address-family&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
enable secret 5 $1$W8fz$yoZKAzoRMefe/h6hlXo741&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
no aaa new-model&lt;br /&gt;
&lt;br /&gt;
switch 1 provision ws-c3650-24ps&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
crypto pki trustpoint TP-self-signed-833429682&lt;br /&gt;
&lt;br /&gt;
enrollment selfsigned&lt;br /&gt;
&lt;br /&gt;
subject-name cn=IOS-Self-Signed-Certificate-833429682&lt;br /&gt;
&lt;br /&gt;
revocation-check none&lt;br /&gt;
&lt;br /&gt;
rsakeypair TP-self-signed-833429682&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
crypto pki certificate chain TP-self-signed-833429682&lt;br /&gt;
&lt;br /&gt;
certificate self-signed 01&lt;br /&gt;
&lt;br /&gt;
3082032E 30820216 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;br /&gt;
&lt;br /&gt;
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274&lt;br /&gt;
&lt;br /&gt;
69666963 6174652D 38333334 32393638 32301E17 0D313831 32313331 34323034&lt;br /&gt;
&lt;br /&gt;
315A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F&lt;br /&gt;
&lt;br /&gt;
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3833 33343239&lt;br /&gt;
&lt;br /&gt;
36383230 82012230 0D06092A 864886F7 0D010101 05000382 010F0030 82010A02&lt;br /&gt;
&lt;br /&gt;
82010100 B0D39D58 2D4C7FDC 841C4218 351FC504 04982D66 D288F9D9 2287404A&lt;br /&gt;
&lt;br /&gt;
426EF5F2 BCCBD1EE 68213925 2B0551D2 A2C86084 E8043697 B26007BF 64A60A27&lt;br /&gt;
&lt;br /&gt;
2EB662BD 8D4C199B D5A07C54 D4A41271 41F05D79 B48D0EB5 E1A032DC E8FF89E1&lt;br /&gt;
&lt;br /&gt;
AD67D152 E900359C F27E2327 1D911B5C 6FB1DFFF 48B0F08D 66BD092A 98D5E202&lt;br /&gt;
&lt;br /&gt;
5A0522FC 31841F0F C6487E92 3C58F9E4 D99C6E45 9DFD7B68 6223AB65 A9654FB2&lt;br /&gt;
&lt;br /&gt;
5FE2AD3B A352B11E D1DBC8E5 F210E03E 3CCA4DFB 80B841B0 7B2A8238 C77DBEFD&lt;br /&gt;
&lt;br /&gt;
3784B083 2BAEB87C D9183E27 C8F60CB8 A3AD1BE0 DED3CD52 3C82AF6B 4FC14D76&lt;br /&gt;
&lt;br /&gt;
F8BA171E 3AA82EDE B8596838 24292619 1CCE85FD FC3E9ED3 12EED95A DEE225CB&lt;br /&gt;
&lt;br /&gt;
F3CFD15B 02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F&lt;br /&gt;
&lt;br /&gt;
0603551D 23041830 1680142E 5138154C 63A9B7C5 338C1741 26388AD6 728D4F30&lt;br /&gt;
&lt;br /&gt;
1D060355 1D0E0416 04142E51 38154C63 A9B7C533 8C174126 388AD672 8D4F300D&lt;br /&gt;
&lt;br /&gt;
06092A86 4886F70D 01010505 00038201 01000634 C6E71494 3E25D7CB C11C089E&lt;br /&gt;
&lt;br /&gt;
76F5F7C5 48696B0F 2BE03824 E470023A 3407097A F4713D1B E0988AA2 00C90BA1&lt;br /&gt;
&lt;br /&gt;
369F4428 E122C209 43DBDBE2 8D43FB09 DB3210DE 3873C291 723F2B99 99CD1DFE&lt;br /&gt;
&lt;br /&gt;
76DE7D32 48AF3C12 14135336 485594BB B3507EED 0D710F9B 2365C689 D9A26282&lt;br /&gt;
&lt;br /&gt;
ED7BEBB7 37552D79 62B21B47 65B09A08 BE71F5E0 F8F4986E 04309DA1 03B98E2D&lt;br /&gt;
&lt;br /&gt;
8CD86595 0D068E47 AAE5C52A 62291A8F B84AC6DF 2D43F067 A9CEB8F1 A1347850&lt;br /&gt;
&lt;br /&gt;
0167914E 1FC2BA95 173E2634 108C32E4 0C787DD9 5FD096BB 178CB93C CEB90BD7&lt;br /&gt;
&lt;br /&gt;
723A0372 94E83318 BF2CD70E 40DFDD2D 8190B0A4 297A0168 0A629F12 DC659693&lt;br /&gt;
&lt;br /&gt;
ACE9F8BA 1B270E40 207F25CB E3F9ABCE BE48&lt;br /&gt;
&lt;br /&gt;
quit&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
license boot level ipbasek9&lt;br /&gt;
&lt;br /&gt;
diagnostic bootup level minimal&lt;br /&gt;
&lt;br /&gt;
spanning-tree mode rapid-pvst&lt;br /&gt;
&lt;br /&gt;
spanning-tree extend system-id&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
redundancy&lt;br /&gt;
&lt;br /&gt;
mode sso&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-topology-control&lt;br /&gt;
&lt;br /&gt;
description Topology control&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-sw-forward&lt;br /&gt;
&lt;br /&gt;
description Sw forwarding, SGT Cache Full, LOGGING&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-default&lt;br /&gt;
&lt;br /&gt;
description DHCP snooping, show forward and rest of traffic&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-sys-data&lt;br /&gt;
&lt;br /&gt;
description Learning cache ovfl, Crypto Control, Exception, EGR Exception, NFL SAMPLED DATA, Gold Pkt, RPF Failed&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-punt-webauth&lt;br /&gt;
&lt;br /&gt;
description Punt Webauth&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-forus&lt;br /&gt;
&lt;br /&gt;
description Forus Address resolution and Forus traffic&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-multicast-end-station&lt;br /&gt;
&lt;br /&gt;
description MCAST END STATION&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-multicast&lt;br /&gt;
&lt;br /&gt;
description Transit Traffic and MCAST Data&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-l2-control&lt;br /&gt;
&lt;br /&gt;
description L2 control&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-dot1x-auth&lt;br /&gt;
&lt;br /&gt;
description DOT1X Auth&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-data&lt;br /&gt;
&lt;br /&gt;
description ICMP_GEN and BROADCAST&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-control-low-priority&lt;br /&gt;
&lt;br /&gt;
description ICMP redirect and general punt&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-wireless-priority1&lt;br /&gt;
&lt;br /&gt;
description Wireless priority 1&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-wireless-priority2&lt;br /&gt;
&lt;br /&gt;
description Wireless priority 2&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-wireless-priority3-4-5&lt;br /&gt;
&lt;br /&gt;
description Wireless priority 3,4 and 5&lt;br /&gt;
&lt;br /&gt;
class-map match-any non-client-nrt-class&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-routing-control&lt;br /&gt;
&lt;br /&gt;
description Routing control&lt;br /&gt;
&lt;br /&gt;
class-map match-any system-cpp-police-protocol-snooping&lt;br /&gt;
&lt;br /&gt;
description Protocol snooping&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
policy-map port_child_policy&lt;br /&gt;
&lt;br /&gt;
class non-client-nrt-class&lt;br /&gt;
&lt;br /&gt;
bandwidth remaining ratio 10&lt;br /&gt;
&lt;br /&gt;
policy-map system-cpp-policy&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-data&lt;br /&gt;
&lt;br /&gt;
police rate 200 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-sys-data&lt;br /&gt;
&lt;br /&gt;
police rate 100 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-sw-forward&lt;br /&gt;
&lt;br /&gt;
police rate 1000 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-multicast&lt;br /&gt;
&lt;br /&gt;
police rate 500 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-multicast-end-station&lt;br /&gt;
&lt;br /&gt;
police rate 2000 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-punt-webauth&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-l2-control&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-routing-control&lt;br /&gt;
&lt;br /&gt;
police rate 1800 pps&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-control-low-priority&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-wireless-priority1&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-wireless-priority2&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-wireless-priority3-4-5&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-topology-control&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-dot1x-auth&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-protocol-snooping&lt;br /&gt;
&lt;br /&gt;
class system-cpp-police-forus&lt;br /&gt;
&lt;br /&gt;
class system-cpp-default&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel1&lt;br /&gt;
&lt;br /&gt;
description Ports 3,4,5,6,Loki&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel2&lt;br /&gt;
&lt;br /&gt;
description 19,20,Surtur&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel3&lt;br /&gt;
&lt;br /&gt;
description Ports1,2,Network&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode trunk&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel4&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel5&lt;br /&gt;
&lt;br /&gt;
description Ports 13,14,15,16,Logan&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Port-channel6&lt;br /&gt;
&lt;br /&gt;
description 21,22,23,24,Freyr&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
&lt;br /&gt;
vrf forwarding Mgmt-vrf&lt;br /&gt;
&lt;br /&gt;
no ip address&lt;br /&gt;
&lt;br /&gt;
negotiation auto&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/1&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode trunk&lt;br /&gt;
&lt;br /&gt;
channel-group 3 mode active&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/2&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode trunk&lt;br /&gt;
&lt;br /&gt;
channel-group 3 mode active&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/3&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/4&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/5&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/6&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport trunk allowed vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 1 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/7&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/8&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/9&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/10&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/11&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/12&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/13&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/14&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/15&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/16&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 5 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/17&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/18&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/19&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 2 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/20&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 2 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/21&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 6 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/22&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 6 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/23&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 6 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/0/24&lt;br /&gt;
&lt;br /&gt;
switchport access vlan 25&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
&lt;br /&gt;
channel-group 6 mode passive&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/1&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/2&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/3&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface GigabitEthernet1/1/4&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Vlan1&lt;br /&gt;
&lt;br /&gt;
no ip address&lt;br /&gt;
&lt;br /&gt;
shutdown&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
interface Vlan99&lt;br /&gt;
&lt;br /&gt;
ip address 10.21.25.2 255.255.255.0&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ip default-gateway 10.21.25.1&lt;br /&gt;
&lt;br /&gt;
ip forward-protocol nd&lt;br /&gt;
&lt;br /&gt;
ip http server&lt;br /&gt;
&lt;br /&gt;
ip http authentication local&lt;br /&gt;
&lt;br /&gt;
ip http secure-server&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Bulk-Data&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 22&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 465&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 143&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 993&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 995&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1914&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq ftp&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq ftp-data&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq smtp&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq pop3&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-MultiEnhanced-Conf&lt;br /&gt;
&lt;br /&gt;
permit udp any any range 16384 32767&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 50000 59999&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Scavanger&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 2300 2400&lt;br /&gt;
&lt;br /&gt;
permit udp any any range 2300 2400&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 6881 6999&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 28800 29100&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1214&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1214&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 3689&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 3689&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 11999&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Signaling&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 2000 2002&lt;br /&gt;
&lt;br /&gt;
permit tcp any any range 5060 5061&lt;br /&gt;
&lt;br /&gt;
permit udp any any range 5060 5061&lt;br /&gt;
&lt;br /&gt;
ip access-list extended AutoQos-4.0-wlan-Acl-Transactional-Data&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 443&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1521&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1521&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1526&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1526&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1575&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1575&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1630&lt;br /&gt;
&lt;br /&gt;
permit udp any any eq 1630&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 1527&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 6200&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 3389&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 5985&lt;br /&gt;
&lt;br /&gt;
permit tcp any any eq 8080&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
control-plane&lt;br /&gt;
&lt;br /&gt;
service-policy input system-cpp-policy&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
line con 0&lt;br /&gt;
&lt;br /&gt;
password 7 106F3D214145425B5C&lt;br /&gt;
&lt;br /&gt;
logging synchronous&lt;br /&gt;
&lt;br /&gt;
login&lt;br /&gt;
&lt;br /&gt;
stopbits 1&lt;br /&gt;
&lt;br /&gt;
line aux 0&lt;br /&gt;
&lt;br /&gt;
stopbits 1&lt;br /&gt;
&lt;br /&gt;
line vty 0 4&lt;br /&gt;
&lt;br /&gt;
password 7 080078764D4B554742&lt;br /&gt;
&lt;br /&gt;
login&lt;br /&gt;
&lt;br /&gt;
line vty 5 15&lt;br /&gt;
&lt;br /&gt;
password 7 080078764D4B554742&lt;br /&gt;
&lt;br /&gt;
login&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent exec&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent config&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent filesys&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
wsma agent notify&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ap dot11 airtime-fairness policy-name Default 0&lt;br /&gt;
&lt;br /&gt;
ap group default-group&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 0&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 1&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 2&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 3&lt;br /&gt;
&lt;br /&gt;
ap hyperlocation ble-beacon 4&lt;br /&gt;
&lt;br /&gt;
end&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=945</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=945"/>
		<updated>2019-07-17T20:52:24Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Now I'm done&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OpenGear Console Server==&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;br /&gt;
&lt;br /&gt;
==OpenGear and Back Room Setup==&lt;br /&gt;
The console server is mounted on the rack with a Cisco 2960 Switch and 2 patch panels. The upper patch panel for cables running from the console server to the upper junction boxes. Currently 42 ports are in use; the ports of the upper junction boxes are labeled to correspond to the ports of the console server. The pods that connect to the OpenGear console server are all pods that are not wired into the IOLan console server. The lower set of junction boxes are for the 24 VMs that are hosted on [[Heimdall]] (10.21.25.8) and are connected to the lower patch panel that wires into the 2960 Switch. The switch is connected to 2 wall jacks in the ROTC room that run to the patch panel in the IDF, this is an EtherChannel trunk link that allows the 24 VMs hosted on [[Heimdall]] to be trunked to the lower junction boxes. This allows for 3 VMs per pod for testing connectivity in a lab setting.&lt;br /&gt;
&lt;br /&gt;
==Accessing the OpenGear==&lt;br /&gt;
There are 2 methods to access the console server to configure devices: web terminal sessions or PuTTY sessions.&lt;br /&gt;
&lt;br /&gt;
=== Web Terminal ===&lt;br /&gt;
&lt;br /&gt;
*The console server can be reached at 10.21.25.18. When you type this into your search bar, be sure to type it in as follows: https://10.21.25.18&lt;br /&gt;
*You will be brought to this page, click advanced and click &amp;quot;Proceed to 10.21.25.18 (unsafe)&amp;quot;.[[File:Getting to OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*You will be brought to the OpenGear login screen, where you will be prompted to enter credentials to access the ports of the console server. Username: root Password: superuser[[File:OpenGear login.png|none|thumb|600x600px]]&lt;br /&gt;
*When you access the console server you will be brought to this page. Click the Devices link in the Manage sub-section.[[File:OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*Click the Serial link on the right side to access the serial ports.[[File:Serial.png|none|thumb|600x600px]]&lt;br /&gt;
*On the port you desire to access, click the Web Terminal link to access the web terminal.&lt;br /&gt;
*You will be prompted to enter the credentials again, so do so.&lt;br /&gt;
*You will be brought to a page with a white box within it, click the white box and press enter to enter the configuration dialog.[[File:Web Terminal OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
&lt;br /&gt;
===PuTTY===&lt;br /&gt;
&lt;br /&gt;
*Open the PuTTY utility.[[File:PuTTY login.png|none|thumb|453x453px]]&lt;br /&gt;
*In the Host field, enter 10.21.25.18 and for the Port field enter 3000 plus the number of the port you desire to connect to. (i.e. port 45 will be 3045) Click open when you have entered this information.&lt;br /&gt;
*There will be an error message that you must click &amp;quot;yes&amp;quot; on to access the port.&lt;br /&gt;
*You will be prompted to enter the credentials again on the black screen, so enter your credentials again.&lt;br /&gt;
*Once the login is successful, press enter again until the configuration text appears to begin configuration.[[File:Good PuTTY.png|none|thumb|666x666px]]&lt;br /&gt;
&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=944</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=944"/>
		<updated>2019-07-17T20:50:53Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Done&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OpenGear Console Server==&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;br /&gt;
&lt;br /&gt;
==OpenGear and Back Room Setup==&lt;br /&gt;
The console server is mounted on the rack with a Cisco 2960 Switch and 2 patch panels. The upper patch panel for cables running from the console server to the upper junction boxes. Currently 42 ports are in use; the ports of the upper junction boxes are labeled to correspond to the ports of the console server. The pods that connect to the OpenGear console server are all pods that are not wired into the IOLan console server. The lower set of junction boxes are for the 24 VMs that are hosted on [[Heimdall]] (10.21.25.8) and are connected to the lower patch panel that wires into the 2960 Switch. The switch is connected to 2 wall jacks in the ROTC room that run to the patch panel in the IDF, this is an EtherChannel trunk link that allows the 24 VMs hosted on [[Heimdall]] to be trunked to the lower junction boxes. This allows for 3 VMs per pod for testing connectivity in a lab setting.&lt;br /&gt;
&lt;br /&gt;
==Accessing the OpenGear==&lt;br /&gt;
There are 2 methods to access the console server to configure devices: web terminal sessions or PuTTY sessions.&lt;br /&gt;
&lt;br /&gt;
*The console server can be reached at 10.21.25.18. When you type this into your search bar, be sure to type it in as follows: https://10.21.25.18&lt;br /&gt;
*You will be brought to this page, click advanced and click &amp;quot;Proceed to 10.21.25.18 (unsafe)&amp;quot;.[[File:Getting to OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*You will be brought to the OpenGear login screen, where you will be prompted to enter credentials to access the ports of the console server. Username: root Password: superuser[[File:OpenGear login.png|none|thumb|600x600px]]&lt;br /&gt;
*When you access the console server you will be brought to this page. Click the Devices link in the Manage sub-section.[[File:OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*Click the Serial link on the right side to access the serial ports.[[File:Serial.png|none|thumb|600x600px]]&lt;br /&gt;
*On the port you desire to access, click the Web Terminal link to access the web terminal.&lt;br /&gt;
*You will be prompted to enter the credentials again, so do so.&lt;br /&gt;
*You will be brought to a page with a white box within it, click the white box and press enter to enter the configuration dialog.[[File:Web Terminal OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
&lt;br /&gt;
===PuTTY===&lt;br /&gt;
&lt;br /&gt;
*Open the PuTTY utility.[[File:PuTTY login.png|none|thumb|453x453px]]&lt;br /&gt;
*In the Host field, enter 10.21.25.18 and for the Port field enter 3000 plus the number of the port you desire to connect to. (i.e. port 45 will be 3045) Click open when you have entered this information.&lt;br /&gt;
*There will be an error message that you must click &amp;quot;yes&amp;quot; on to access the port.&lt;br /&gt;
*You will be prompted to enter the credentials again on the black screen, so enter your credentials again.&lt;br /&gt;
*Once the login is successful, press enter again until the configuration text appears to begin configuration.[[File:Good PuTTY.png|none|thumb|666x666px]]&lt;br /&gt;
&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=943</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=943"/>
		<updated>2019-07-17T20:50:04Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Finished&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OpenGear Console Server==&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;br /&gt;
&lt;br /&gt;
==OpenGear and Back Room Setup==&lt;br /&gt;
The console server is mounted on the rack with a Cisco 2960 Switch and 2 patch panels. The upper patch panel for cables running from the console server to the upper junction boxes. Currently 42 ports are in use; the ports of the upper junction boxes are labeled to correspond to the ports of the console server. The pods that connect to the OpenGear console server are all pods that are not wired into the IOLan console server. The lower set of junction boxes are for the 24 VMs that are hosted on [[Heimdall]] (10.21.25.8) and are connected to the lower patch panel that wires into the 2960 Switch. The switch is connected to 2 wall jacks in the ROTC room that run to the patch panel in the IDF, this is an EtherChannel trunk link that allows the 24 VMs hosted on [[Heimdall]] to be trunked to the lower junction boxes. This allows for 3 VMs per pod for testing connectivity in a lab setting.&lt;br /&gt;
&lt;br /&gt;
==Accessing the OpenGear==&lt;br /&gt;
There are 2 methods to access the console server to configure devices: web terminal sessions or PuTTY sessions.&lt;br /&gt;
&lt;br /&gt;
*The console server can be reached at 10.21.25.18. When you type this into your search bar, be sure to type it in as follows: https://10.21.25.18&lt;br /&gt;
*You will be brought to this page, click advanced and click &amp;quot;Proceed to 10.21.25.18 (unsafe)&amp;quot;.[[File:Getting to OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*You will be brought to the OpenGear login screen, where you will be prompted to enter credentials to access the ports of the console server. Username: root Password: superuser[[File:OpenGear login.png|none|thumb|600x600px]]&lt;br /&gt;
*When you access the console server you will be brought to this page. Click the Devices link in the Manage sub-section.[[File:OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*Click the Serial link on the right side to access the serial ports.[[File:Serial.png|none|thumb|600x600px]]&lt;br /&gt;
*On the port you desire to access, click the Web Terminal link to access the web terminal.&lt;br /&gt;
*You will be prompted to enter the credentials again, so do so.&lt;br /&gt;
*You will be brought to a page with a white box within it, click the white box and press enter to enter the configuration dialog.[[File:Web Terminal OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
&lt;br /&gt;
=== PuTTY ===&lt;br /&gt;
&lt;br /&gt;
* Open the PuTTY utility.[[File:PuTTY login.png|none|thumb|453x453px]]&lt;br /&gt;
* In the Host field, enter 10.21.25.18 and for the Port field enter 3000 plus the number of the port you desire to connect to. (i.e. port 45 will be 3045) Click open when you have entered this information.&lt;br /&gt;
* There will be an error message that you must click &amp;quot;yes&amp;quot; on to access the port.&lt;br /&gt;
* You will be prompted to enter the credentials again to access the port, so enter your credentials again.&lt;br /&gt;
* Once the login is successful, press enter again until the configuration text appears to begin configuration.[[File:Good PuTTY.png|none|thumb|666x666px]]&lt;br /&gt;
&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Good_PuTTY.png&amp;diff=942</id>
		<title>File:Good PuTTY.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Good_PuTTY.png&amp;diff=942"/>
		<updated>2019-07-17T20:49:45Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Good PuTTY&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=941</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=941"/>
		<updated>2019-07-17T20:39:14Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OpenGear Console Server==&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;br /&gt;
&lt;br /&gt;
==OpenGear and Back Room Setup==&lt;br /&gt;
The console server is mounted on the rack with a Cisco 2960 Switch and 2 patch panels. The upper patch panel for cables running from the console server to the upper junction boxes. Currently 42 ports are in use; the ports of the upper junction boxes are labeled to correspond to the ports of the console server. The pods that connect to the OpenGear console server are all pods that are not wired into the IOLan console server. The lower set of junction boxes are for the 24 VMs that are hosted on [[Heimdall]] (10.21.25.8) and are connected to the lower patch panel that wires into the 2960 Switch. The switch is connected to 2 wall jacks in the ROTC room that run to the patch panel in the IDF, this is an EtherChannel trunk link that allows the 24 VMs hosted on [[Heimdall]] to be trunked to the lower junction boxes. This allows for 3 VMs per pod for testing connectivity in a lab setting.&lt;br /&gt;
&lt;br /&gt;
==Accessing the OpenGear==&lt;br /&gt;
There are 2 methods to access the console server to configure devices: web terminal sessions or PuTTY sessions.&lt;br /&gt;
&lt;br /&gt;
*The console server can be reached at 10.21.25.18. When you type this into your search bar, be sure to type it in as follows: https://10.21.25.18&lt;br /&gt;
*You will be brought to this page, click advanced and click &amp;quot;Proceed to 10.21.25.18 (unsafe)&amp;quot;.[[File:Getting to OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*You will be brought to the OpenGear login screen, where you will be prompted to enter credentials to access the ports of the console server. Username: root Password: superuser[[File:OpenGear login.png|none|thumb|600x600px]]&lt;br /&gt;
*When you access the console server you will be brought to this page. Click the Devices link in the Manage sub-section.[[File:OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*Click the Serial link on the right side to access the serial ports.[[File:Serial.png|none|thumb|600x600px]]&lt;br /&gt;
*On the port you desire to access, click the Web Terminal link to access the web terminal.&lt;br /&gt;
*You will be prompted to enter the credentials again, so do so.&lt;br /&gt;
*You will be brought to a page with a white box within it, click the white box and press enter to enter the configuration dialog.[[File:Web Terminal OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=940</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=940"/>
		<updated>2019-07-17T20:38:25Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Done did it&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OpenGear Console Server==&lt;br /&gt;
======&amp;lt;nowiki&amp;gt;================================================================== praise allah ==================================================================&amp;lt;/nowiki&amp;gt;======&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;br /&gt;
&lt;br /&gt;
==OpenGear and Back Room Setup==&lt;br /&gt;
The console server is mounted on the rack with a Cisco 2960 Switch and 2 patch panels. The upper patch panel for cables running from the console server to the upper junction boxes. Currently 42 ports are in use; the ports of the upper junction boxes are labeled to correspond to the ports of the console server. The pods that connect to the OpenGear console server are all pods that are not wired into the IOLan console server. The lower set of junction boxes are for the 24 VMs that are hosted on [[Heimdall]] (10.21.25.8) and are connected to the lower patch panel that wires into the 2960 Switch. The switch is connected to 2 wall jacks in the ROTC room that run to the patch panel in the IDF, this is an EtherChannel trunk link that allows the 24 VMs hosted on [[Heimdall]] to be trunked to the lower junction boxes. This allows for 3 VMs per pod for testing connectivity in a lab setting.&lt;br /&gt;
&lt;br /&gt;
==Accessing the OpenGear==&lt;br /&gt;
There are 2 methods to access the console server to configure devices: web terminal sessions or PuTTY sessions.&lt;br /&gt;
&lt;br /&gt;
*The console server can be reached at 10.21.25.18. When you type this into your search bar, be sure to type it in as follows: https://10.21.25.18&lt;br /&gt;
*You will be brought to this page, click advanced and click &amp;quot;Proceed to 10.21.25.18 (unsafe)&amp;quot;.[[File:Getting to OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*You will be brought to the OpenGear login screen, where you will be prompted to enter credentials to access the ports of the console server. Username: root Password: superuser[[File:OpenGear login.png|none|thumb|600x600px]]&lt;br /&gt;
*When you access the console server you will be brought to this page. Click the Devices link in the Manage sub-section.[[File:OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*Click the Serial link on the right side to access the serial ports.[[File:Serial.png|none|thumb|600x600px]]&lt;br /&gt;
*On the port you desire to access, click the Web Terminal link to access the web terminal.&lt;br /&gt;
*You will be prompted to enter the credentials again, so do so.&lt;br /&gt;
*You will be brought to a page with a white box within it, click the white box and press enter to enter the configuration dialog.[[File:Web Terminal OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=938</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=938"/>
		<updated>2019-07-17T20:28:56Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: New stuff&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OpenGear Console Server==&lt;br /&gt;
======&amp;lt;nowiki&amp;gt;================================================================== praise allah ==================================================================&amp;lt;/nowiki&amp;gt;======&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;br /&gt;
&lt;br /&gt;
==OpenGear and Back Room Setup==&lt;br /&gt;
The console server is mounted on the rack with a Cisco 2960 Switch and 2 patch panels. The upper patch panel for cables running from the console server to the upper junction boxes. Currently 42 ports are in use; the ports of the upper junction boxes are labeled to correspond to the ports of the console server. The pods that connect to the OpenGear console server are all pods that are not wired into the IOLan console server. The lower set of junction boxes are for the 24 VMs that are hosted on [[Heimdall]] (10.21.25.8) and are connected to the lower patch panel that wires into the 2960 Switch. The switch is connected to 2 wall jacks in the ROTC room that run to the patch panel in the IDF, this is an EtherChannel trunk link that allows the 24 VMs hosted on [[Heimdall]] to be trunked to the lower junction boxes. This allows for 3 VMs per pod for testing connectivity in a lab setting.&lt;br /&gt;
&lt;br /&gt;
==Accessing the OpenGear==&lt;br /&gt;
There are 2 methods to access the console server to configure devices: web terminal sessions or PuTTY sessions.&lt;br /&gt;
&lt;br /&gt;
*The console server can be reached at 10.21.25.18. When you type this into your search bar, be sure to type it in as follows: https://10.21.25.18&lt;br /&gt;
*You will be brought to this page, click advanced and click &amp;quot;Proceed to 10.21.25.18 (unsafe)&amp;quot;.[[File:Getting to OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
*You will be brought to the OpenGear login screen, where you will be prompted to enter credentials to access the ports of the console server. Username: root Password: superuser[[File:OpenGear login.png|none|thumb|600x600px]]&lt;br /&gt;
*When you access the console server you will be brought to this page. Click the Devices link in the Manage sub-section.&lt;br /&gt;
*Click the Serial link on the right side to access the serial ports.&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Web_Terminal_OpenGear.png&amp;diff=937</id>
		<title>File:Web Terminal OpenGear.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Web_Terminal_OpenGear.png&amp;diff=937"/>
		<updated>2019-07-17T20:06:51Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Web Terminal&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Serial.png&amp;diff=936</id>
		<title>File:Serial.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Serial.png&amp;diff=936"/>
		<updated>2019-07-17T19:59:04Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Serial ports&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:OpenGear.png&amp;diff=935</id>
		<title>File:OpenGear.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:OpenGear.png&amp;diff=935"/>
		<updated>2019-07-17T19:45:41Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OpenGear overhead&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=933</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=933"/>
		<updated>2019-07-17T19:35:51Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Linked to Heimdall&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OpenGear Console Server==&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;br /&gt;
&lt;br /&gt;
== OpenGear and Back Room Setup ==&lt;br /&gt;
The console server is mounted on the rack with a Cisco 2960 Switch and 2 patch panels. The upper patch panel for cables running from the console server to the upper junction boxes. Currently 42 ports are in use; the ports of the upper junction boxes are labeled to correspond to the ports of the console server. The pods that connect to the OpenGear console server are all pods that are not wired into the IOLan console server. The lower set of junction boxes are for the 24 VMs that are hosted on [[Heimdall]] (10.21.25.8) and are connected to the lower patch panel that wires into the 2960 Switch. The switch is connected to 2 wall jacks in the ROTC room that run to the patch panel in the IDF, this is an EtherChannel trunk link that allows the 24 VMs hosted on [[Heimdall]] to be trunked to the lower junction boxes. This allows for 3 VMs per pod for testing connectivity in a lab setting.&lt;br /&gt;
&lt;br /&gt;
== Accessing the OpenGear ==&lt;br /&gt;
There are 2 methods to access the console server to configure devices: web terminal sessions or PuTTY sessions.&lt;br /&gt;
&lt;br /&gt;
* The console server can be reached at 10.21.25.18. When you type this into your search bar, be sure to type it in as follows: https://10.21.25.18&lt;br /&gt;
* You will be brought to this page, click advanced and click &amp;quot;Proceed to 10.21.25.18 (unsafe)&amp;quot;.[[File:Getting to OpenGear.png|none|thumb|600x600px]]&lt;br /&gt;
* You will be brought to the OpenGear login screen, where you will be prompted to enter credentials to access the ports of the console server. Username: root Password: superuser[[File:OpenGear login.png|none|thumb|600x600px]]&lt;br /&gt;
* When you access the console server&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:OpenGear_login.png&amp;diff=930</id>
		<title>File:OpenGear login.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:OpenGear_login.png&amp;diff=930"/>
		<updated>2019-07-17T19:29:28Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Login&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Getting_to_OpenGear.png&amp;diff=929</id>
		<title>File:Getting to OpenGear.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Getting_to_OpenGear.png&amp;diff=929"/>
		<updated>2019-07-17T19:15:24Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OpenGear web error&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=928</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=928"/>
		<updated>2019-07-17T18:36:04Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Created description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OpenGear Console Server ==&lt;br /&gt;
The OpenGear console server is a device that allows 48 connections to network devices through one point on the network, allowing access to multiple devices over the network. This allows technicians to make configuration changes to devices on the console server for lab purposes.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=927</id>
		<title>OpenGear Console Server Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=OpenGear_Console_Server_Documentation&amp;diff=927"/>
		<updated>2019-07-17T18:29:38Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Created OpenGear Console Server Documentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=User:Vlatona&amp;diff=926</id>
		<title>User:Vlatona</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=User:Vlatona&amp;diff=926"/>
		<updated>2019-07-17T18:28:39Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: /* OpenGear Console Server Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=User:Vlatona&amp;diff=925</id>
		<title>User:Vlatona</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=User:Vlatona&amp;diff=925"/>
		<updated>2019-07-17T18:27:35Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Created OpenGear Documentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OpenGear Console Server Documentation =&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=IOLan_Documentation&amp;diff=924</id>
		<title>IOLan Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=IOLan_Documentation&amp;diff=924"/>
		<updated>2019-07-17T18:22:56Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Added PuTTY entry for IOLan&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IOLan Console Server==&lt;br /&gt;
(https://www.perle.com/products/iolan-scs-terminal-server.shtml) The IOLan Console Server allows for connections from Computers to Network devices while utilizing the device's console port. This means that instead of protecting a device from multiple attack vectors you can protect and connect to one device that will allow connections to its connected devices through an easy to use web interface. The specific Console Server being used by 24PinTech is an IOLAN model (one of the industry leaders). &lt;br /&gt;
&lt;br /&gt;
==Connecting and Using the Server== &lt;br /&gt;
===Initial Connection===&lt;br /&gt;
&lt;br /&gt;
#Download the 'iolan_easyconfig_v4.9.4.7.exe' file from the 'IOLAN' folder on \\logan&lt;br /&gt;
#Run the IOLAN easyconfig program&lt;br /&gt;
#Plug the IOLAN Device into both Power and the Network your system is on through either of the Ethernet ports&lt;br /&gt;
#Hit next and allow for the program to go over the firewall if prompted&lt;br /&gt;
#It will then list out any available IOLAN devices&lt;br /&gt;
#Select the device that you wish to configure and hit next. (as pictured)&lt;br /&gt;
#*[[File:IOLAN_1.PNG|600px|text]]&lt;br /&gt;
#Allow the 'Device Manager TFTP server' to run through the Firewall if prompted&lt;br /&gt;
#Here you can Change the system name and IP settings (as pictured)&lt;br /&gt;
#*[[File:IOLAN_2.PNG|600px|text]]&lt;br /&gt;
#Leave all of the settings ALONE and hit the download button&lt;br /&gt;
#Click Finish on the last page&lt;br /&gt;
#Reopen the Program&lt;br /&gt;
#Hit next on the first page, The next page will have the IP Address of the Device Listed (as pictured)&lt;br /&gt;
#*[[File:IOLAN_3.PNG|600px|text]]&lt;br /&gt;
#Connect to that IP address in your browser&lt;br /&gt;
#This will verify that the connection and initial configuration was successful.&lt;br /&gt;
&lt;br /&gt;
===Configuration===&lt;br /&gt;
&lt;br /&gt;
#Connect to the Device (you can look to find out how to do this in the above section 'Initial Connection)&lt;br /&gt;
#After signing in, the Page pictured will pop up. &lt;br /&gt;
#*[[File:IOLAN_4.PNG|600px|text]]&lt;br /&gt;
#From here you can select 'Serial' and change the protocols that each serial connection use, or go to 'Security' and change what protocols are running on the system to better protect it.&lt;br /&gt;
#By selecting Serial Ports from the Serial page you can change those protocols used for connecting to the devices connected to the IOLAN server.&lt;br /&gt;
#After you click 'Serial Ports' you can then choose the different protocols used by selecting one port and and hitting the Edit button. &lt;br /&gt;
#*[[File:IOLANSERIAL.PNG|600px|text]]&lt;br /&gt;
#After hitting the Edit button you will be guided to the next section. In this the only thing that we will be changing for this tutorial is going from Telnet to SSH.&lt;br /&gt;
#You can do so by Pressing the SSH button Next to 'Protocols:', and hitting apply.&lt;br /&gt;
#In order for all of these ports to use ssh you must go back to the last page in which all ports are listed and select the one that you have just edited.&lt;br /&gt;
#Once selected hit the Copy button (it is next to the edit button) then select all then Ok.&lt;br /&gt;
#Once you have completed all configuration tasks you must hit the 'Reboot IOLAN' button in the bottom right in order to restart the Server and have those configurations take place.&lt;br /&gt;
&lt;br /&gt;
===Connecting for standard Use===&lt;br /&gt;
     In order to properly connect to the Server and the devices connected to it you have to use SSH (as it is currently configured 4/24/18)&lt;br /&gt;
&lt;br /&gt;
====Windows====&lt;br /&gt;
&lt;br /&gt;
*First, open PuTTy&lt;br /&gt;
*Make sure that SSH is the selected option and type in the address of the Server you are trying to connect to. (For us it is 10.21.25.17)&lt;br /&gt;
*Then, in the 'Port' Section, you want to type in the number 1000 and then the port number you are trying to connect to. &lt;br /&gt;
**For example if you are trying to connect to port 1 on the Server then putty would look as it does in the following picture. &lt;br /&gt;
***[[File:IOLAN_4.PNG|600px|text]]&lt;br /&gt;
*After entering the proper information hit connect. This will then prompt you to enter a password. This is the password for the IOLAN server and will be the standard password used for equipment on our network.&lt;br /&gt;
&lt;br /&gt;
Then hit enter and you should be prompted as if you had a serial connection to the device. &lt;br /&gt;
====Linux/Unix====&lt;br /&gt;
&lt;br /&gt;
*Open a terminal&lt;br /&gt;
*Make sure that ssh is installed on your machine by typing 'sudo ssh --version'&lt;br /&gt;
*If there are no errors then use the ssh command in the same context as the Windows Explanation&lt;br /&gt;
**Which is that you type 'sudo ssh admin@IP_OF_IOLAN_SERVER -p PORT_#_OF_DEVICE&lt;br /&gt;
**For example if you were connecting to port 1 of an IOLAN Server on IP 10.21.25.17 the command would be 'sudo ssh admin@10.21.25.17 -p 10001&lt;br /&gt;
*After a successful connection you will be prompted to use a password. The password is the password for logging into the IOLAN Server so it will be the standard password use for equipment on our network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connecting to Network Devices== &lt;br /&gt;
In order to successfully connect to the Network Devices you need to use a rollover type Ethernet cable. &lt;br /&gt;
[[File:IOLAN_5.jpg|600px|text]]&lt;br /&gt;
&lt;br /&gt;
However, In order to get a connection from the computer to server then you need to use a standard Ethernet cable connected to the network that the target system is on. The server can however be connected to more than one network as it has two Ethernet connections. Which allows for more than one network to connect to the server.&lt;br /&gt;
&lt;br /&gt;
==Accessing the Network Devices through the IOLan==&lt;br /&gt;
There are 2 methods to access the network devices connected to the IOLan Console Server.&lt;br /&gt;
&lt;br /&gt;
'''Web Browser'''&lt;br /&gt;
&lt;br /&gt;
*In a web browser, type the IP address of the console server (10.21.25.17).&lt;br /&gt;
*You will arrive to the IOLan Web Manager Login page.&lt;br /&gt;
*[[File:IOLan Login Screen.png|none|thumb|600x600px]]&lt;br /&gt;
*Enter the following credentials:&lt;br /&gt;
&lt;br /&gt;
Username: admin&lt;br /&gt;
&lt;br /&gt;
Password: superuser&lt;br /&gt;
&lt;br /&gt;
*You will then see the Web Manager Configuration window. To access the ports on the console server, you must click the &amp;quot;Easy Port Web&amp;quot; button displayed in the right pane.[[File:How to get to Ports.png|none|thumb|600x600px]]&lt;br /&gt;
*In the EasyPort Web, Serial Port numbers, Device names, and Port Access methods are displayed. All ports should have SSH as the access method.[[File:Easy Port Web.png|none|thumb|600x600px]]&lt;br /&gt;
*To access a device, click the &amp;quot;SSH&amp;quot; button next to the device you wish to access.&lt;br /&gt;
*A white window will appear prompting you to enter your credentials. Use the username and password listed under the Web Manager Login page.[[File:Login Screen.png|none|thumb|600x600px]]&lt;br /&gt;
*After you have entered your credentials, you may begin configuring the selected network device.&lt;br /&gt;
&lt;br /&gt;
'''PuTTY'''&lt;br /&gt;
&lt;br /&gt;
* Open the PuTTY utility to begin.&lt;br /&gt;
* [[File:PuTTY login.png|none|thumb|453x453px]]&lt;br /&gt;
* Type in the IP address of the IOLan console server (10.21.25.17) in the host field and insert the destination port number after 10000 (i.e. port 1 will be 10001).[[File:PuTTY IP.png|none|thumb|453x453px]]&lt;br /&gt;
* A warning message will appear and click &amp;quot;yes&amp;quot; in order to allow the connection.&lt;br /&gt;
* You will then enter the same credentials to access the Web Terminal of the IOLan. '''Username:''' admin '''Password:''' superuser[[File:IOLan Login PuTTY.png|none|thumb|660x660px]]&lt;br /&gt;
* After the password has been entered, click Enter once or twice to get to the Switch&amp;gt; or Router&amp;gt; text to begin configuration.[[File:PuTTY config.png|none|thumb|664x664px]]&lt;br /&gt;
&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:PuTTY_config.png&amp;diff=923</id>
		<title>File:PuTTY config.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:PuTTY_config.png&amp;diff=923"/>
		<updated>2019-07-17T18:22:30Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PuTTY config on IOLan&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:IOLan_Login_PuTTY.png&amp;diff=922</id>
		<title>File:IOLan Login PuTTY.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:IOLan_Login_PuTTY.png&amp;diff=922"/>
		<updated>2019-07-17T18:20:41Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Logging into IOLan PuTTY&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:PuTTY_IP.png&amp;diff=921</id>
		<title>File:PuTTY IP.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:PuTTY_IP.png&amp;diff=921"/>
		<updated>2019-07-17T18:19:09Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PuTTY session with IP and port&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:PuTTY_login.png&amp;diff=920</id>
		<title>File:PuTTY login.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:PuTTY_login.png&amp;diff=920"/>
		<updated>2019-07-17T18:04:14Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PuTTY utiltiy screen&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=IOLan_Documentation&amp;diff=919</id>
		<title>IOLan Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=IOLan_Documentation&amp;diff=919"/>
		<updated>2019-07-17T17:56:01Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Deleted PuTTY login information&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IOLan Console Server==&lt;br /&gt;
(https://www.perle.com/products/iolan-scs-terminal-server.shtml) The IOLan Console Server allows for connections from Computers to Network devices while utilizing the device's console port. This means that instead of protecting a device from multiple attack vectors you can protect and connect to one device that will allow connections to its connected devices through an easy to use web interface. The specific Console Server being used by 24PinTech is an IOLAN model (one of the industry leaders). &lt;br /&gt;
&lt;br /&gt;
==Connecting and Using the Server== &lt;br /&gt;
===Initial Connection===&lt;br /&gt;
&lt;br /&gt;
#Download the 'iolan_easyconfig_v4.9.4.7.exe' file from the 'IOLAN' folder on \\logan&lt;br /&gt;
#Run the IOLAN easyconfig program&lt;br /&gt;
#Plug the IOLAN Device into both Power and the Network your system is on through either of the Ethernet ports&lt;br /&gt;
#Hit next and allow for the program to go over the firewall if prompted&lt;br /&gt;
#It will then list out any available IOLAN devices&lt;br /&gt;
#Select the device that you wish to configure and hit next. (as pictured)&lt;br /&gt;
#*[[File:IOLAN_1.PNG|600px|text]]&lt;br /&gt;
#Allow the 'Device Manager TFTP server' to run through the Firewall if prompted&lt;br /&gt;
#Here you can Change the system name and IP settings (as pictured)&lt;br /&gt;
#*[[File:IOLAN_2.PNG|600px|text]]&lt;br /&gt;
#Leave all of the settings ALONE and hit the download button&lt;br /&gt;
#Click Finish on the last page&lt;br /&gt;
#Reopen the Program&lt;br /&gt;
#Hit next on the first page, The next page will have the IP Address of the Device Listed (as pictured)&lt;br /&gt;
#*[[File:IOLAN_3.PNG|600px|text]]&lt;br /&gt;
#Connect to that IP address in your browser&lt;br /&gt;
#This will verify that the connection and initial configuration was successful.&lt;br /&gt;
&lt;br /&gt;
===Configuration===&lt;br /&gt;
&lt;br /&gt;
#Connect to the Device (you can look to find out how to do this in the above section 'Initial Connection)&lt;br /&gt;
#After signing in, the Page pictured will pop up. &lt;br /&gt;
#*[[File:IOLAN_4.PNG|600px|text]]&lt;br /&gt;
#From here you can select 'Serial' and change the protocols that each serial connection use, or go to 'Security' and change what protocols are running on the system to better protect it.&lt;br /&gt;
#By selecting Serial Ports from the Serial page you can change those protocols used for connecting to the devices connected to the IOLAN server.&lt;br /&gt;
#After you click 'Serial Ports' you can then choose the different protocols used by selecting one port and and hitting the Edit button. &lt;br /&gt;
#*[[File:IOLANSERIAL.PNG|600px|text]]&lt;br /&gt;
#After hitting the Edit button you will be guided to the next section. In this the only thing that we will be changing for this tutorial is going from Telnet to SSH.&lt;br /&gt;
#You can do so by Pressing the SSH button Next to 'Protocols:', and hitting apply.&lt;br /&gt;
#In order for all of these ports to use ssh you must go back to the last page in which all ports are listed and select the one that you have just edited.&lt;br /&gt;
#Once selected hit the Copy button (it is next to the edit button) then select all then Ok.&lt;br /&gt;
#Once you have completed all configuration tasks you must hit the 'Reboot IOLAN' button in the bottom right in order to restart the Server and have those configurations take place.&lt;br /&gt;
&lt;br /&gt;
===Connecting for standard Use===&lt;br /&gt;
     In order to properly connect to the Server and the devices connected to it you have to use SSH (as it is currently configured 4/24/18)&lt;br /&gt;
&lt;br /&gt;
====Windows====&lt;br /&gt;
&lt;br /&gt;
*First, open PuTTy&lt;br /&gt;
*Make sure that SSH is the selected option and type in the address of the Server you are trying to connect to. (For us it is 10.21.25.17)&lt;br /&gt;
*Then, in the 'Port' Section, you want to type in the number 1000 and then the port number you are trying to connect to. &lt;br /&gt;
**For example if you are trying to connect to port 1 on the Server then putty would look as it does in the following picture. &lt;br /&gt;
***[[File:IOLAN_4.PNG|600px|text]]&lt;br /&gt;
*After entering the proper information hit connect. This will then prompt you to enter a password. This is the password for the IOLAN server and will be the standard password used for equipment on our network.&lt;br /&gt;
&lt;br /&gt;
Then hit enter and you should be prompted as if you had a serial connection to the device. &lt;br /&gt;
====Linux/Unix====&lt;br /&gt;
&lt;br /&gt;
*Open a terminal&lt;br /&gt;
*Make sure that ssh is installed on your machine by typing 'sudo ssh --version'&lt;br /&gt;
*If there are no errors then use the ssh command in the same context as the Windows Explanation&lt;br /&gt;
**Which is that you type 'sudo ssh admin@IP_OF_IOLAN_SERVER -p PORT_#_OF_DEVICE&lt;br /&gt;
**For example if you were connecting to port 1 of an IOLAN Server on IP 10.21.25.17 the command would be 'sudo ssh admin@10.21.25.17 -p 10001&lt;br /&gt;
*After a successful connection you will be prompted to use a password. The password is the password for logging into the IOLAN Server so it will be the standard password use for equipment on our network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connecting to Network Devices== &lt;br /&gt;
In order to successfully connect to the Network Devices you need to use a rollover type Ethernet cable. &lt;br /&gt;
[[File:IOLAN_5.jpg|600px|text]]&lt;br /&gt;
&lt;br /&gt;
However, In order to get a connection from the computer to server then you need to use a standard Ethernet cable connected to the network that the target system is on. The server can however be connected to more than one network as it has two Ethernet connections. Which allows for more than one network to connect to the server.&lt;br /&gt;
&lt;br /&gt;
==Accessing the Network Devices through the IOLan==&lt;br /&gt;
There are 2 methods to access the network devices connected to the IOLan Console Server.&lt;br /&gt;
&lt;br /&gt;
'''Web Browser'''&lt;br /&gt;
&lt;br /&gt;
*In a web browser, type the IP address of the console server (10.21.25.17).&lt;br /&gt;
*You will arrive to the IOLan Web Manager Login page.&lt;br /&gt;
*[[File:IOLan Login Screen.png|none|thumb|600x600px]]&lt;br /&gt;
*Enter the following credentials:&lt;br /&gt;
&lt;br /&gt;
Username: admin&lt;br /&gt;
&lt;br /&gt;
Password: superuser&lt;br /&gt;
&lt;br /&gt;
*You will then see the Web Manager Configuration window. To access the ports on the console server, you must click the &amp;quot;Easy Port Web&amp;quot; button displayed in the right pane.[[File:How to get to Ports.png|none|thumb|600x600px]]&lt;br /&gt;
*In the EasyPort Web, Serial Port numbers, Device names, and Port Access methods are displayed. All ports should have SSH as the access method.[[File:Easy Port Web.png|none|thumb|600x600px]]&lt;br /&gt;
*To access a device, click the &amp;quot;SSH&amp;quot; button next to the device you wish to access.&lt;br /&gt;
*A white window will appear prompting you to enter your credentials. Use the username and password listed under the Web Manager Login page.[[File:Login Screen.png|none|thumb|600x600px]]&lt;br /&gt;
*After you have entered your credentials, you may begin configuring the selected network device.&lt;br /&gt;
&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=IOLan_Documentation&amp;diff=918</id>
		<title>IOLan Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=IOLan_Documentation&amp;diff=918"/>
		<updated>2019-06-21T19:09:08Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: Added images to accessing the IOLan Console Server&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IOLan Console Server==&lt;br /&gt;
(https://www.perle.com/products/iolan-scs-terminal-server.shtml) The IOLan Console Server allows for connections from Computers to Network devices while utilizing the device's console port. This means that instead of protecting a device from multiple attack vectors you can protect and connect to one device that will allow connections to its connected devices through an easy to use web interface. The specific Console Server being used by 24PinTech is an IOLAN model (one of the industry leaders). &lt;br /&gt;
&lt;br /&gt;
==Connecting and Using the Server== &lt;br /&gt;
===Initial Connection===&lt;br /&gt;
&lt;br /&gt;
#Download the 'iolan_easyconfig_v4.9.4.7.exe' file from the 'IOLAN' folder on \\logan&lt;br /&gt;
#Run the IOLAN easyconfig program&lt;br /&gt;
#Plug the IOLAN Device into both Power and the Network your system is on through either of the Ethernet ports&lt;br /&gt;
#Hit next and allow for the program to go over the firewall if prompted&lt;br /&gt;
#It will then list out any available IOLAN devices&lt;br /&gt;
#Select the device that you wish to configure and hit next. (as pictured)&lt;br /&gt;
#*[[File:IOLAN_1.PNG|600px|text]]&lt;br /&gt;
#Allow the 'Device Manager TFTP server' to run through the Firewall if prompted&lt;br /&gt;
#Here you can Change the system name and IP settings (as pictured)&lt;br /&gt;
#*[[File:IOLAN_2.PNG|600px|text]]&lt;br /&gt;
#Leave all of the settings ALONE and hit the download button&lt;br /&gt;
#Click Finish on the last page&lt;br /&gt;
#Reopen the Program&lt;br /&gt;
#Hit next on the first page, The next page will have the IP Address of the Device Listed (as pictured)&lt;br /&gt;
#*[[File:IOLAN_3.PNG|600px|text]]&lt;br /&gt;
#Connect to that IP address in your browser&lt;br /&gt;
#This will verify that the connection and initial configuration was successful.&lt;br /&gt;
&lt;br /&gt;
===Configuration===&lt;br /&gt;
&lt;br /&gt;
#Connect to the Device (you can look to find out how to do this in the above section 'Initial Connection)&lt;br /&gt;
#After signing in, the Page pictured will pop up. &lt;br /&gt;
#*[[File:IOLAN_4.PNG|600px|text]]&lt;br /&gt;
#From here you can select 'Serial' and change the protocols that each serial connection use, or go to 'Security' and change what protocols are running on the system to better protect it.&lt;br /&gt;
#By selecting Serial Ports from the Serial page you can change those protocols used for connecting to the devices connected to the IOLAN server.&lt;br /&gt;
#After you click 'Serial Ports' you can then choose the different protocols used by selecting one port and and hitting the Edit button. &lt;br /&gt;
#*[[File:IOLANSERIAL.PNG|600px|text]]&lt;br /&gt;
#After hitting the Edit button you will be guided to the next section. In this the only thing that we will be changing for this tutorial is going from Telnet to SSH.&lt;br /&gt;
#You can do so by Pressing the SSH button Next to 'Protocols:', and hitting apply.&lt;br /&gt;
#In order for all of these ports to use ssh you must go back to the last page in which all ports are listed and select the one that you have just edited.&lt;br /&gt;
#Once selected hit the Copy button (it is next to the edit button) then select all then Ok.&lt;br /&gt;
#Once you have completed all configuration tasks you must hit the 'Reboot IOLAN' button in the bottom right in order to restart the Server and have those configurations take place.&lt;br /&gt;
&lt;br /&gt;
===Connecting for standard Use===&lt;br /&gt;
     In order to properly connect to the Server and the devices connected to it you have to use SSH (as it is currently configured 4/24/18)&lt;br /&gt;
&lt;br /&gt;
====Windows====&lt;br /&gt;
&lt;br /&gt;
*First, open PuTTy&lt;br /&gt;
*Make sure that SSH is the selected option and type in the address of the Server you are trying to connect to. (For us it is 10.21.25.17)&lt;br /&gt;
*Then, in the 'Port' Section, you want to type in the number 1000 and then the port number you are trying to connect to. &lt;br /&gt;
**For example if you are trying to connect to port 1 on the Server then putty would look as it does in the following picture. &lt;br /&gt;
***[[File:IOLAN_4.PNG|600px|text]]&lt;br /&gt;
*After entering the proper information hit connect. This will then prompt you to enter a password. This is the password for the IOLAN server and will be the standard password used for equipment on our network.&lt;br /&gt;
&lt;br /&gt;
Then hit enter and you should be prompted as if you had a serial connection to the device. &lt;br /&gt;
====Linux/Unix====&lt;br /&gt;
&lt;br /&gt;
*Open a terminal&lt;br /&gt;
*Make sure that ssh is installed on your machine by typing 'sudo ssh --version'&lt;br /&gt;
*If there are no errors then use the ssh command in the same context as the Windows Explanation&lt;br /&gt;
**Which is that you type 'sudo ssh admin@IP_OF_IOLAN_SERVER -p PORT_#_OF_DEVICE&lt;br /&gt;
**For example if you were connecting to port 1 of an IOLAN Server on IP 10.21.25.17 the command would be 'sudo ssh admin@10.21.25.17 -p 10001&lt;br /&gt;
*After a successful connection you will be prompted to use a password. The password is the password for logging into the IOLAN Server so it will be the standard password use for equipment on our network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connecting to Network Devices== &lt;br /&gt;
In order to successfully connect to the Network Devices you need to use a rollover type Ethernet cable. &lt;br /&gt;
[[File:IOLAN_5.jpg|600px|text]]&lt;br /&gt;
&lt;br /&gt;
However, In order to get a connection from the computer to server then you need to use a standard Ethernet cable connected to the network that the target system is on. The server can however be connected to more than one network as it has two Ethernet connections. Which allows for more than one network to connect to the server.&lt;br /&gt;
&lt;br /&gt;
==Accessing the Network Devices through the IOLan==&lt;br /&gt;
There are 2 methods to access the network devices connected to the IOLan Console Server.&lt;br /&gt;
&lt;br /&gt;
'''Web Browser'''&lt;br /&gt;
&lt;br /&gt;
*In a web browser, type the IP address of the console server (10.21.25.17).&lt;br /&gt;
*You will arrive to the IOLan Web Manager Login page.&lt;br /&gt;
*[[File:IOLan Login Screen.png|none|thumb|600x600px]]&lt;br /&gt;
*Enter the following credentials:&lt;br /&gt;
&lt;br /&gt;
Username: admin&lt;br /&gt;
&lt;br /&gt;
Password: superuser&lt;br /&gt;
&lt;br /&gt;
*You will then see the Web Manager Configuration window. To access the ports on the console server, you must click the &amp;quot;Easy Port Web&amp;quot; button displayed in the right pane.[[File:How to get to Ports.png|none|thumb|600x600px]]&lt;br /&gt;
*In the EasyPort Web, Serial Port numbers, Device names, and Port Access methods are displayed. All ports should have SSH as the access method.[[File:Easy Port Web.png|none|thumb|600x600px]]&lt;br /&gt;
*To access a device, click the &amp;quot;SSH&amp;quot; button next to the device you wish to access.&lt;br /&gt;
*A white window will appear prompting you to enter your credentials. Use the username and password listed under the Web Manager Login page.[[File:Login Screen.png|none|thumb|600x600px]]&lt;br /&gt;
*After you have entered your credentials, you may begin configuring the selected network device.&lt;br /&gt;
&lt;br /&gt;
'''PuTTY'''&lt;br /&gt;
&lt;br /&gt;
*Open the PuTTY utility to begin.&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Login_Screen.png&amp;diff=917</id>
		<title>File:Login Screen.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Login_Screen.png&amp;diff=917"/>
		<updated>2019-06-21T19:08:01Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Login Screen Page.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Easy_Port_Web.png&amp;diff=916</id>
		<title>File:Easy Port Web.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Easy_Port_Web.png&amp;diff=916"/>
		<updated>2019-06-21T19:06:21Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Easy Port Web.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:How_to_get_to_Ports.png&amp;diff=915</id>
		<title>File:How to get to Ports.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:How_to_get_to_Ports.png&amp;diff=915"/>
		<updated>2019-06-21T18:56:41Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is how to get to the Easy Port Web.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:IOLan_Login_Screen.png&amp;diff=914</id>
		<title>File:IOLan Login Screen.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:IOLan_Login_Screen.png&amp;diff=914"/>
		<updated>2019-06-21T18:54:27Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Picture of IOLan Login screen.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=726</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=726"/>
		<updated>2018-11-13T19:20:50Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press &amp;quot;Break&amp;quot; (PuTTY) or &amp;quot;Alt+b&amp;quot; (TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the &amp;quot;reload&amp;quot; command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Open a terminal emulator and ensure your computer is connected to the console port. (Make sure no power is supplied to the switch)&lt;br /&gt;
2. Plug the power cable into the switch; meanwhile, press and hold the mode button until the terminal displays the switch: config text.&lt;br /&gt;
3. Use the following commands to reset the running-config with a password:&lt;br /&gt;
switch: flash_init&lt;br /&gt;
switch: dir flash:&lt;br /&gt;
switch: delete flash:[config.text]&lt;br /&gt;
4. Answer with &amp;quot;y&amp;quot; to delete the file.&lt;br /&gt;
5. Use the reset command to reboot the switch:&lt;br /&gt;
switch: reset&lt;br /&gt;
6. Answer with &amp;quot;y&amp;quot; again to reset the switch.&lt;br /&gt;
7. When the switch boots into the normal startup-config, erase the startup-config and reload the switch again to be safe.&lt;br /&gt;
Switch# erase startup-config&lt;br /&gt;
Switch# reload&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Corrupted IOS Deletion/Replacement - Switches ==&lt;br /&gt;
In rare cases, a switch may have an IOS that is incompatible with the hardware that the switch supports. (ie. An IOS image for a 2960 switch on a 3750 switch) The following steps will detail how to delete an incompatible IOS and how to put a new image on to a switch.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Open a terminal emulator and ensure your computer is connected to the console port. (Make sure no power is supplied to the switch)&lt;br /&gt;
2. Plug the power cable into the switch; meanwhile, press and hold the mode button until the terminal displays the switch: config text.&lt;br /&gt;
3. Use the following commands to initialize the flash and find the image file to delete:&lt;br /&gt;
switch: flash_init&lt;br /&gt;
switch: dir flash:&lt;br /&gt;
switch: delete flash:[IOS file name] (ex: c3560-ipbasek9-mz.122-55.SE4.bin)&lt;br /&gt;
4. Download the proper IOS image for the switch and place the image file onto a flash drive. This can be done from a computer on the network with access to the Cisco Curriculum network drive.&lt;br /&gt;
5. Place the flash drive into the computer running the terminal emulator. Transfer this file from the flash drive to the local drive (C:) on the computer running the terminal emulator.&lt;br /&gt;
6. Use the following command to transfer the file:&lt;br /&gt;
switch: copy xmodem: flash:[IOS file name]&lt;br /&gt;
7. The next thing to do will be to go into the upper left corner of the terminal emulator and click File&amp;gt;Transfer&amp;gt;XMODEM&amp;gt;Send&lt;br /&gt;
8. You will then choose the local disk to look from in the top part of the window and choose the IOS file to send. Select the file and click &amp;quot;Send&amp;quot; or &amp;quot;Open&amp;quot;.&lt;br /&gt;
9. Another window will open showing the progress of the file transfer or the terminal will display multiple C's followed by periods. Allow up to 2 hours for the file transfer.&lt;br /&gt;
10. To ensure the computer will not sleep or timeout during the transfer, go to power options and change the display timeout to never.&lt;br /&gt;
11. When the image transfer is complete, use the &amp;quot;dir flash:&amp;quot; command to make sure the image is on the device.&lt;br /&gt;
12. When the image is transferred, use the following command to boot into the new IOS:&lt;br /&gt;
switch: boot flash:[filename]&lt;br /&gt;
13. When the image loads, use the following commands to set the new image as the bootable image:&lt;br /&gt;
Switch&amp;gt;enable&lt;br /&gt;
Switch#configure terminal&lt;br /&gt;
Switch(config)boot system flash:[filename]&lt;br /&gt;
Switch(config)end&lt;br /&gt;
Switch#show boot (Use this command to ensure the new image is the boot image.)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Cisco Switch IOS Images ==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
c1841-adventerprisek9-mz.151-4.M12a.bin&lt;br /&gt;
c1841-advsecurityk9-mz.151-3.T4.bin&lt;br /&gt;
c1841-adventerprisek9-mz.151-4.M7.bin&lt;br /&gt;
c1900-universalk9-mz.SPA.152-4.M6a.bin&lt;br /&gt;
c2950-i6k2l2q4-mz.121-22.EA14.bin&lt;br /&gt;
c2960-lanbasek9-mz.122-55.SE9.bin&lt;br /&gt;
c3500xl-c3h2s-mz.120-5.WC17.bin&lt;br /&gt;
c3750-ipbasek9-mz.122-25.SEE3.bin&lt;br /&gt;
c3750-ipbase-mz.122-25.SED.bin&lt;br /&gt;
c3825-adventerprisek9-mz.124-24.T7.bin&lt;br /&gt;
c3825-adventerprisek9-mz.151-4.M10.bin&lt;br /&gt;
c3825-spservicesk9-mz.124-15.T14.bin&lt;br /&gt;
c3560-ipbasek9-mz.122-55.SE4.bin&lt;br /&gt;
cat4500-entservicesk9-mz.150-2.SG8.bin&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=725</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=725"/>
		<updated>2018-11-13T19:20:15Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press &amp;quot;Break&amp;quot; (PuTTY) or &amp;quot;Alt+b&amp;quot; (TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the &amp;quot;reload&amp;quot; command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Open a terminal emulator and ensure your computer is connected to the console port. (Make sure no power is supplied to the switch)&lt;br /&gt;
2. Plug the power cable into the switch; meanwhile, press and hold the mode button until the terminal displays the switch: config text.&lt;br /&gt;
3. Use the following commands to reset the running-config with a password:&lt;br /&gt;
switch: flash_init&lt;br /&gt;
switch: dir flash:&lt;br /&gt;
switch: delete flash:[config.text]&lt;br /&gt;
4. Answer with &amp;quot;y&amp;quot; to delete the file.&lt;br /&gt;
5. Use the reset command to reboot the switch:&lt;br /&gt;
switch: reset&lt;br /&gt;
6. Answer with &amp;quot;y&amp;quot; again to reset the switch.&lt;br /&gt;
7. When the switch boots into the normal startup-config, erase the startup-config and reload the switch again to be safe.&lt;br /&gt;
Switch# erase startup-config&lt;br /&gt;
Switch# reload&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Corrupted IOS Deletion/Replacement - Switches ==&lt;br /&gt;
In rare cases, a switch may have an IOS that is incompatible with the hardware that the switch supports. (ie. An IOS image for a 2960 switch on a 3750 switch) The following steps will detail how to delete an incompatible IOS and how to put a new image on to a switch.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Open a terminal emulator and ensure your computer is connected to the console port. (Make sure no power is supplied to the switch)&lt;br /&gt;
2. Plug the power cable into the switch; meanwhile, press and hold the mode button until the terminal displays the switch: config text.&lt;br /&gt;
3. Use the following commands to initialize the flash and find the image file to delete:&lt;br /&gt;
switch: flash_init&lt;br /&gt;
switch: dir flash:&lt;br /&gt;
switch: delete flash:[IOS file name] (ex: c3560-ipbasek9-mz.122-55.SE4.bin)&lt;br /&gt;
4. Download the proper IOS image for the switch and place the image file onto a flash drive. This can be done from a computer on the network with access to the Cisco Curriculum network drive.&lt;br /&gt;
5. Place the flash drive into the computer running the terminal emulator. Transfer this file from the flash drive to the local drive (C:) on the computer running the terminal emulator.&lt;br /&gt;
6. Use the following command to transfer the file:&lt;br /&gt;
switch: copy xmodem: flash:[IOS file name]&lt;br /&gt;
7. The next thing to do will be to go into the upper left corner of the terminal emulator and click File&amp;gt;Transfer&amp;gt;XMODEM&amp;gt;Send&lt;br /&gt;
8. You will then choose the local disk to look from in the top part of the window and choose the IOS file to send. Select the file and click &amp;quot;Send&amp;quot; or &amp;quot;Open&amp;quot;.&lt;br /&gt;
9. Another window will open showing the progress of the file transfer or the terminal will display multiple C's followed by periods. Allow up to 2 hours for the file transfer.&lt;br /&gt;
10. To ensure the computer will not sleep or timeout during the transfer, go to power options and change the display timeout to never.&lt;br /&gt;
11. When the image transfer is complete, use the &amp;quot;dir flash:&amp;quot; command to make sure the image is on the device.&lt;br /&gt;
12. When the image is transferred, use the following command to boot into the new IOS:&lt;br /&gt;
switch: boot flash:[filename]&lt;br /&gt;
13. When the image loads, use the following commands to set the new image as the bootable image:&lt;br /&gt;
Switch&amp;gt;enable&lt;br /&gt;
Switch#configure terminal&lt;br /&gt;
Switch(config)boot system flash:[filename]&lt;br /&gt;
Switch(config)end&lt;br /&gt;
Switch#show boot (Use this command to ensure the new image is the boot image.)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Cisco Switch IOS Images ==&lt;br /&gt;
c1841-adventerprisek9-mz.151-4.M12a.bin&lt;br /&gt;
c1841-advsecurityk9-mz.151-3.T4.bin&lt;br /&gt;
c1841-adventerprisek9-mz.151-4.M7.bin&lt;br /&gt;
c1900-universalk9-mz.SPA.152-4.M6a.bin&lt;br /&gt;
c2950-i6k2l2q4-mz.121-22.EA14.bin&lt;br /&gt;
c2960-lanbasek9-mz.122-55.SE9.bin&lt;br /&gt;
c3500xl-c3h2s-mz.120-5.WC17.bin&lt;br /&gt;
c3750-ipbasek9-mz.122-25.SEE3.bin&lt;br /&gt;
c3750-ipbase-mz.122-25.SED.bin&lt;br /&gt;
c3825-adventerprisek9-mz.124-24.T7.bin&lt;br /&gt;
c3825-adventerprisek9-mz.151-4.M10.bin&lt;br /&gt;
c3825-spservicesk9-mz.124-15.T14.bin&lt;br /&gt;
c3560-ipbasek9-mz.122-55.SE4.bin&lt;br /&gt;
cat4500-entservicesk9-mz.150-2.SG8.bin&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=724</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=724"/>
		<updated>2018-11-13T19:11:59Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press &amp;quot;Break&amp;quot; (PuTTY) or &amp;quot;Alt+b&amp;quot; (TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the &amp;quot;reload&amp;quot; command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Open a terminal emulator and ensure your computer is connected to the console port. (Make sure no power is supplied to the switch)&lt;br /&gt;
2. Plug the power cable into the switch; meanwhile, press and hold the mode button until the terminal displays the switch: config text.&lt;br /&gt;
3. Use the following commands to reset the running-config with a password:&lt;br /&gt;
switch: flash_init&lt;br /&gt;
switch: dir flash:&lt;br /&gt;
switch: delete flash:[config.text]&lt;br /&gt;
4. Answer with &amp;quot;y&amp;quot; to delete the file.&lt;br /&gt;
5. Use the reset command to reboot the switch:&lt;br /&gt;
switch: reset&lt;br /&gt;
6. Answer with &amp;quot;y&amp;quot; again to reset the switch.&lt;br /&gt;
7. When the switch boots into the normal startup-config, erase the startup-config and reload the switch again to be safe.&lt;br /&gt;
Switch# erase startup-config&lt;br /&gt;
Switch# reload&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Corrupted IOS Deletion/Replacement - Switches ==&lt;br /&gt;
In rare cases, a switch may have an IOS that is incompatible with the hardware that the switch supports. (ie. An IOS image for a 2960 switch on a 3750 switch) The following steps will detail how to delete an incompatible IOS and how to put a new image on to a switch.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Open a terminal emulator and ensure your computer is connected to the console port. (Make sure no power is supplied to the switch)&lt;br /&gt;
2. Plug the power cable into the switch; meanwhile, press and hold the mode button until the terminal displays the switch: config text.&lt;br /&gt;
3. Use the following commands to initialize the flash and find the image file to delete:&lt;br /&gt;
switch: flash_init&lt;br /&gt;
switch: dir flash:&lt;br /&gt;
switch: delete flash:[IOS file name] (ex: c3560-ipbasek9-mz.122-55.SE4.bin)&lt;br /&gt;
4. Download the proper IOS image for the switch and place the image file onto a flash drive. This can be done from a computer on the network with access to the Cisco Curriculum network drive.&lt;br /&gt;
5. Place the flash drive into the computer running the terminal emulator. Transfer this file from the flash drive to the local drive (C:) on the computer running the terminal emulator.&lt;br /&gt;
6. Use the following command to transfer the file:&lt;br /&gt;
switch: copy xmodem: flash:[IOS file name]&lt;br /&gt;
7. The next thing to do will be to go into the upper left corner of the terminal emulator and click File&amp;gt;Transfer&amp;gt;XMODEM&amp;gt;Send&lt;br /&gt;
8. You will then choose the local disk to look from in the top part of the window and choose the IOS file to send. Select the file and click &amp;quot;Send&amp;quot; or &amp;quot;Open&amp;quot;.&lt;br /&gt;
9. Another window will open showing the progress of the file transfer or the terminal will display multiple C's followed by periods. Allow up to 2 hours for the file transfer.&lt;br /&gt;
10. To ensure the computer will not sleep or timeout during the transfer, go to power options and change the display timeout to never.&lt;br /&gt;
11. When the image transfer is complete, use the &amp;quot;dir flash:&amp;quot; command to make sure the image is on the device.&lt;br /&gt;
12. When the image is transferred, use the following command to boot into the new IOS:&lt;br /&gt;
switch: boot flash:[filename]&lt;br /&gt;
13. When the image loads, use the following commands to set the new image as the bootable image:&lt;br /&gt;
Switch&amp;gt;enable&lt;br /&gt;
Switch#configure terminal&lt;br /&gt;
Switch(config)boot system flash:[filename]&lt;br /&gt;
Switch(config)end&lt;br /&gt;
Switch#show boot (Use this command to ensure the new image is the boot image.)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=722</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=722"/>
		<updated>2018-11-08T19:23:45Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press &amp;quot;Break&amp;quot; (PuTTY) or &amp;quot;Alt+b&amp;quot; (TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the &amp;quot;reload&amp;quot; command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Open a terminal emulator and ensure your computer is connected to the console port. (Make sure no power is supplied to the switch)&lt;br /&gt;
2. Plug the power cable into the switch; meanwhile, press and hold the mode button until the terminal displays the switch: config text.&lt;br /&gt;
3. Use the following commands to reset the running-config with a password:&lt;br /&gt;
switch: flash_init&lt;br /&gt;
switch: dir flash:&lt;br /&gt;
switch: delete flash:[config.text]&lt;br /&gt;
4. Answer with &amp;quot;y&amp;quot; to delete the file.&lt;br /&gt;
5. Use the reset command to reboot the switch:&lt;br /&gt;
switch: reset&lt;br /&gt;
6. Answer with &amp;quot;y&amp;quot; again to reset the switch.&lt;br /&gt;
7. When the switch boots into the normal startup-config, erase the startup-config and reload the switch again to be safe.&lt;br /&gt;
Switch# erase startup-config&lt;br /&gt;
Switch# reload&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=721</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=721"/>
		<updated>2018-11-08T19:05:17Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press [[Break]] (PuTTY) or [[Alt+b]] (TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the '''reload''' command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=720</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=720"/>
		<updated>2018-11-08T19:03:26Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press [[Break]] (PuTTY) or [[Alt+b]] (TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the '''reload''' command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=719</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=719"/>
		<updated>2018-11-08T19:01:29Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press '''Break''' (PuTTY) or '''Alt+b''' (TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the '''reload''' command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=718</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=718"/>
		<updated>2018-11-08T19:01:01Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press '''Break'''(PuTTY) or '''Alt+b'''(TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the '''reload''' command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=717</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=717"/>
		<updated>2018-11-08T18:59:50Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press '''Break'''(PuTTY) or Alt+b(TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the '''reload''' command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=716</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=716"/>
		<updated>2018-11-08T18:59:16Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Turn the power switch on the router to the off position and unplug the power cable from the router. &lt;br /&gt;
2. Please ensure that a computer is plugged into the console port and that the computer has a terminal emulator opened. (TeraTerm or PuTTY)&lt;br /&gt;
3. Plug in the power cable to the router and quickly press '''Break'''(PuTTY) or Alt+b(TeraTerm) repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
4. When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
5. After entering the previous command, enter the reset command to reload the router while ignoring the startup-config.&lt;br /&gt;
6. After entering the new config, delete the startup-config by typing: delete startup-config &lt;br /&gt;
7. After deleting the startup-config, reload the router using the '''reload''' command.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Forgotten Password Deletion - Switches ==&lt;br /&gt;
The procedure for deletion of line-level passwords outside of the running-config is done differently on switches as compared to routers. Switches require entry through Password Recovery Mode in order to delete passwords as well as corrupted IOS images.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=715</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=715"/>
		<updated>2018-11-08T18:45:02Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
Turn the power switch on the router to the off position and unplug the power cable from the router. Plug in the power cable to the router and quickly press '''Break''' repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
After entering the previous command, enter the reset command to reload the router while ignoring the startup-config. After entering the new config, delete the startup-config by typing: delete startup-config&lt;br /&gt;
After deleting the startup-config, reload the router using the '''reload''' command.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=714</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=714"/>
		<updated>2018-11-08T18:42:40Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
== Forgotten Password Deletion - Routers ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
Turn the power switch on the router to the off position and unplug the power cable from the router. Plug in the power cable to the router and quickly press '''Break''' repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
After entering the previous command, enter the reset command to reload the router while ignoring the startup-config. After entering the new config, delete the startup-config by typing: delete startup-config&lt;br /&gt;
After deleting the startup-config, reload the router using the '''reload''' command.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=713</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=713"/>
		<updated>2018-11-08T18:41:13Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
== Deleting Forgotten Password on Router ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
Turn the power switch on the router to the off position and unplug the power cable from the router. Plug in the power cable to the router and quickly press '''Break''' repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
After entering the previous command, enter the reset command to reload the router while ignoring the startup-config. After entering the new config, delete the startup-config by typing: delete startup-config&lt;br /&gt;
After deleting the startup-config, reload the router using the '''reload''' command.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=712</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=712"/>
		<updated>2018-11-08T18:40:56Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
== Deleting Forgotten Password on Router ==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
Turn the power switch on the router to the off position and unplug the power cable from the router. Plug in the power cable to the router and quickly press '''Break''' repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
After entering the previous command, enter the reset command to reload the router while ignoring the startup-config. After entering the new config, delete the startup-config by typing: delete startup-config&lt;br /&gt;
After deleting the startup-config, reload the router using the '''reload''' command.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=711</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=711"/>
		<updated>2018-11-08T18:40:01Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
==Deleting forgotten password on Routers==&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=710</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=710"/>
		<updated>2018-11-08T18:39:10Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=709</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=709"/>
		<updated>2018-11-08T18:38:41Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
==Deleting Forgotten Passwords on Routers==&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=708</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=708"/>
		<updated>2018-11-08T15:25:11Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
==Deleting Forgotten Passwords on Routers==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
Turn the power switch on the router to the off position and unplug the power cable from the router. Plug in the power cable to the router and quickly press '''Break''' repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
After entering the previous command, enter the reset command to reload the router while ignoring the startup-config. After entering the new config, delete the startup-config by typing: delete startup-config&lt;br /&gt;
After deleting the startup-config, reload the router using the '''reload''' command.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=707</id>
		<title>Common Cisco IOS Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Cisco_IOS_Issues&amp;diff=707"/>
		<updated>2018-11-08T15:25:01Z</updated>

		<summary type="html">&lt;p&gt;Vlatona: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Deletion==&lt;br /&gt;
Sometimes, files just don't want to go. They cling on to dear life. Generally, you would use the following command to delete files:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
erase [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
However, sometimes Cisco IOS will spit back an error if it doesn't want to delete said file, for whatever reason. If you run into an issue, use the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete [filename]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If that doesn't work, usually with the &amp;quot;Is a directory&amp;quot; error, use the following command to force the deletion:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
delete /force /recursive [filename]&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
==Deleting Forgotten Passwords on Routers==&lt;br /&gt;
When working with labs on Routers, sometimes students enter their console passwords incorrectly or they simply forget. The following documentation will describe the procedure to erase any passwords needed to enter the networking device.&lt;br /&gt;
&lt;br /&gt;
Turn the power switch on the router to the off position and unplug the power cable from the router. Plug in the power cable to the router and quickly press '''Break''' repeatedly until the rommon 1&amp;gt; prompt appears.&lt;br /&gt;
When the rommon 1&amp;gt; script appears type and enter the following command: confreg 0x2142&lt;br /&gt;
After entering the previous command, enter the reset command to reload the router while ignoring the startup-config. After entering the new config, delete the startup-config by typing: delete startup-config&lt;br /&gt;
After deleting the startup-config, reload the router using the '''reload''' command.&lt;/div&gt;</summary>
		<author><name>Vlatona</name></author>
	</entry>
</feed>