2012年10月11日星期四

How to Celebrate Your 10th Anniversary? Router-Siwtch.com


Router-switch.com is ten years old, happy 10th Anniversary! It is a vital phase for all router-switch.com staff in 2012. How to celebrate its 10th anniversary? What Router-switch.com Prepared for Its tenth birthday to thank its regulars and new clients? Let’s have a look!

Router-switch.com, ten years old, happy birthday! 2012 marks the tenth anniversary of router-switch.com, which is an exciting moment for all router-switch’s staff and clients.

What Router-switch.com Prepared for Its 10th Anniversary?

In 2012, router-switch.com welcomes its 10th anniversary. For router-switch.com, it has been a worldwide leading Cisco supplier during the past 10 years. To celebrate 10 years, it prepares big gifts for its regulars and new clients, such as Cisco AIR-AP1131AG-A-K9, limited edition T-shirts and 20PC U disk. Some popular Cisco products(including Cisco routers: Cisco 2900&3900 Routers, Cisco switches: Catalyst 3560x Series, Cisco Catalyst 3750x Series, Catalyst 3560V2/3750V2Cisco firewall, Cisco Access Points and network cards) will have big discounts (up to 75% off).The activity date is from September to October. Wow, if you wanna buy Cisco equipment, don’t miss it.

Router-switch.com has become a world’s leading Cisco supplier over the past ten years with the help of its staff and customers. To celebrate its 10 years, router-switch.com offers some activities for all the old and new clients, for example, big discount (save up to 75% off) for the popular Cisco items (including Catalyst 3560x Series, Cisco Catalyst 3750x Series, Catalyst 3560V2/3750V2, Cisco 2900&3900 Routers, Network Cards, etc.), fill out a simple survey to win a big gift (Cisco AIR-AP1131AG-A-K9, limited edition T-shirts and 20PC U disk). The activity date is from September. 01. 2012 to October. 31. 2012. Wow, if you are a Cisco buyer, don’t miss this chance. Let’s join the party to celebrate the 10th birthday together. 

2012年7月31日星期二

How to Configure VLAN Sub-Interfaces on Cisco ASA 5500 Firewall


One of the advantages of the CiscoASA firewall is that you can configure multiple virtual interfaces (subinterfaces) on the same physical interface, thus extending the number of security zones (firewall “legs”) on your network. Each subinterface must belong to a different Layer2 VLAN, with a separate Layer3 subnet.

There are limits on the number of VLANs supported on each ASA model, according to the following list:
  • ASA 5505: Max 20 VLANs (with the Security Plus Software)
  • ASA 5510: Max 100 VLANs (with the Security Plus Software)
  • ASA 5520: Max 150 VLANs
  • ASA 5540: Max 200 VLANs
  • ASA 5550: Max 250 VLANs
  • ASA 5580: Max 100 VLANs

Below is a snapshot of a configuration example of VLAN subinterfaces:

interface GigabitEthernet0/0
speed 100
duplex full
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/0.10
description OUTSIDE1
vlan 10
nameif OUT1
security-level 0
ip address 10.10.10.1 255.255.255.0
!
interface GigabitEthernet0/0.20
description OUTSIDE2
vlan 20
nameif OUT2
security-level 10
ip address 10.20.20.1 255.255.255.0
!
interface GigabitEthernet0/1
speed 100
duplex full
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/1.30
description INSIDE1
vlan 30
nameif INSIDE1
security-level 90
ip address 10.30.30.1 255.255.255.0
!
interface GigabitEthernet0/1.40
description INSIDE2
vlan 40
nameif INSIDE2
security-level 80
ip address 10.40.40.1 255.255.255.0
!

2012年7月11日星期三

Cisco Catalyst 2960 LAN Base Series & Catalyst 2960 LAN Lite Series


The Cisco Catalyst 2960-S and 2960 Series are fixed-configuration access switches designed for enterprise, midmarket, and branch office networks to provide lower total cost of ownership.The CiscoCatalyst2960 and 2960-S Series Switches are the leading Layer 2 edge, providing improved ease of use, highly secure business operations, improved sustainability, and a borderless network experience. The Catalyst 2960-S Series Switches include new FlexStack switch stacking capability with 1 and 10 Gigabit connectivity, and Power over Ethernet Plus (PoE+) with the Cisco Catalyst 2960 Series Switches offering Fast Ethernet access connectivity and PoE capabilities.


CiscoCatalyst2960-S and 2960 Series Switches with LAN Base Software
The CiscoCatalyst2960-S and 2960 Series Switches with LAN Base Software are fixed-configuration, Layer 2 Ethernet switches that support enhanced switching services, IP communications, and wireless networking for small and medium-sized businesses. These switches provide the performance, availability, and manageability that modern office environments demand, as well as the intelligence to support state-of-the-art business applications security services.



The Cisco Catalyst 2960 Series with LAN Base softwarecan provide:
*         Fast Ethernet and Gigabit Ethernet connectivity to the desktop to deliver superior application performance
*         Power over Ethernet (PoE) to provide 15.4W simultaneously on all PoE ports
*         Advanced security capabilities, including identity services and sophisticated access control to protect your critical assets
*         Quality of service (QoS) intelligence to support delay-sensitive IP voice and video applications and optimize bandwidth in your network
*         Redundancy and resiliency features to protect the availability of your critical applications at all times
*         Simple, scalable management with the option to use a command-line interface (CLI) or the GUI-based Cisco Network Assistant with Cisco Smartports interface
*         Scalability to continually accommodate new applications and services as your business evolves
*         Limited lifetime warranty and free Cisco IOS Software updates
NOTE: PDF File:Cisco Catalyst 2960-S and 2960 Series Switches with LAN Base Software
http://www.cisco.com/cisco/web/solutions/small_business/products/routers_switches/catalyst_2960_series_switches/docs/C78-481303-02_2960-LAN_DS_FINAL.pdf

CiscoCatalyst2960-S and 2960 Series Switches with LAN Lite software
The CiscoCatalyst2960-S and 2960 Series Switches with LAN Lite software provide the security and performance that your business applications demand and are scalable to support your continually evolving network environment. By providing these capabilities in your network foundation, you can improve the availability of your critical applications, protect your business information, more easily accommodate expanding services, and optimize your network bandwidth to more effectively deliver information and applications.


The Cisco Catalyst 2960-S and 2960 Series with LAN Lite software are fixed-configuration, Layer 2 edge switches that provide Fast Ethernet or Gigabit Ethernet connectivity and support essential security, quality of service (QoS), and high availability for growing businesses. These switches deliver the reliability and performance you need to provide a fully scalable managed network environment for your business.
NOTE:PDF File:Cisco Catalyst 2960-S and 2960 Series Switches with LAN Lite Software
http://www.cisco.com/cisco/web/solutions/small_business/products/routers_switches/catalyst_2960_series_switches/docs/Catalyst_2960_Series_Switches_LAN_Lite_DS_FINAL.pdf

Also Compare Models of CiscoCatalyst 2960 Series Switches you can visit:
http://www.cisco.com/en/US/products/ps6406/prod_models_comparison.html

More Tutorial: How to Configure a Cisco 2960 Switch/Layer 2 Switch?
Upgrade a Cisco 2960 IOS with a Console Cable
http://blog.router-switch.com/2011/11/tutorial-upgrade-a-cisco-2960-ios-with-a-console-cable/

2012年4月10日星期二

Network Protocols, Govern the Communications between Computers on a Network

A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer.

Types of Network Protocols
The most common network protocols are:
•    Ethernet
•    Local Talk
•    Token Ring
•    FDDI
•    ATM
The follow is some common-used network symbols to draw different kinds of network protocols.


Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally affect the speed of transmission on the network.

The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.

Fast Ethernet
To allow for an increased speed of transmission, the Ethernet protocol has developed a new standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet requires the use of different, more expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet is becoming common in schools that have been recently wired.

Local Talk
Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect a series of computers through the serial port. The Macintosh operating system allows the establishment of a peer-to-peer network without the need for additional software. With the addition of the server version of AppleShare software, a client/server network can be established.
The Local Talk protocol allows for linear bus, star, or tree topologies using twisted pair cable. A primary disadvantage of Local Talk is speed. Its speed of transmission is only 230 Kbps.

Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased.

FDDI
Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology. Transmission normally occurs on one of the rings; however, if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps.

ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable.

ATM is most often used to interconnect two or more local area networks. It is also frequently used by Internet Service Providers to utilize high-speed access to the Internet for their clients. As ATM technology becomes more cost-effective, it will provide another solution for constructing faster local area networks.

Gigabit Ethernet
The most recent development in the Ethernet standard is a protocol that has a transmission speed of 1 Gbps. Gigabit Ethernet is primarily used for backbones on a network at this time. In the future, it will probably be used for workstation and server connections also. It can be used with both fiber optic cabling and copper. The 1000BaseTX, the copper cable used for Gigabit Ethernet, is expected to become the formal standard in 1999.

Compare the Network Protocols
Protocol    Cable    Speed    Topology
Ethernet    Twisted Pair, Coaxial, Fiber    10 Mbps    Linear Bus, Star, Tree
Fast Ethernet    Twisted Pair, Fiber    100 Mbps    Star
Local Talk    Twisted Pair    .23 Mbps    Linear Bus or Star
Token Ring    Twisted Pair    4 Mbps - 16 Mbps    Star-Wired Ring
FDDI    Fiber    100 Mbps    Dual ring
ATM    Twisted Pair, Fiber    155-2488 Mbps    Linear Bus, Star, Tree

Network Diagramming Software
Edraw Network Diagrammer is a new, rapid and powerful network design software for network drawings with rich examples and templates. Easy to draw network topology, Cisco network design diagram, LAN/WAN diagram, network cabling diagrams, active directory, network planform and physical network diagram.

Network Protocol Overview
The OSI model, and any other network communication model, provides only a conceptual framework for communication between computers, but the model itself does not provide specific methods of communication. Actual communication is defined by various communication protocols. In the context of data communication, a protocol is a formal set of rules, conventions and data structure that governs how computers and other network devices exchange information over a network. In other words, a protocol is a standard procedure and format that two data communication devices must understand, accept and use to be able to talk to each other.

In modern protocol design, protocols are "layered" according to the OSI 7 layer model or a similar layered model. Layering is a design principle which divides the protocol design into a number of smaller parts, each part accomplishing a particular sub-task and interacting with the other parts of the protocol only in a small number of well-defined ways. Layering allows the parts of a protocol to be designed and tested without a combinatorial explosion of cases, keeping each design relatively simple. Layering also permits familiar protocols to be adapted to unusual circumstances.
The header and/or trailer at each layer reflect the structure of the protocol. Detailed rules and procedures of a protocol or protocol group are often defined by a lengthy document. For example, IETF uses RFCs (Request for Comments) to define protocols and updates to the protocols.

A wide variety of communication protocols exists. These protocols were defined by many different standard organizations throughout the world and by technology vendors over years of technology evolution and development. One of the most popular protocol suites is TCP/IP, which is the heart of Internetworking communications. The IP, the Internet Protocol, is responsible for exchanging information between routers so that the routers can select the proper path for network traffic, while TCP is responsible for ensuring the data packets are transmitted across the network reliably and error free. LAN and WAN protocols are also critical protocols in network communications. The LAN protocols suite is for the physical and data link layers of communications over various LAN media such as Ethernet wires and wireless radio waves. The WAN protocol suite is for the lowest three layers and defines communication over various wide-area media, such as fiber optic and copper cables.

Network communication has slowly evolved. Today's new technologies are based on the accumulation over years of technologies, which may be either still existing or obsolete. Because of this, the protocols which define the network communication are highly inter-related. Many protocols rely on others for operation. For example, many routing protocols use other network protocols to exchange information between routers.

In addition to standards for individual protocols in transmission, there are now also interface standards for different layers to talk to the ones above or below (usually operating system specific). For example: Winsock and Berkeley sockets between layers 4 and 5; NDIS and ODI between layers 2 and 3.

The protocols for data communication cover all areas as defined in the OSI model. However, the OSI model is only loosely defined. A protocol may perform the functions of one or more of the OSI layers, which introduces complexity to understanding protocols relevant to the OSI 7 layer model. In real-world protocols, there is some argument as to where the distinctions between layers are drawn; there is no one black and white answer.

To develop a complete technology that is useful for the industry, very often a group of protocols is required in the same layer or across many different layers. Different protocols often describe different aspects of a single communication; taken together, these form a protocol suite. For example, Voice over IP (VOIP), a group of protocols developed by many vendors and standard organizations, has many protocols across the 4 top layers in the OSI model.

Protocols can be implemented either in hardware or software or a mixture of both. Typically, the lower layers are implemented in hardware, with the higher layers being implemented in software.
Protocols could be grouped into suites (or families, or stacks) by their technical functions, or origin of the protocol introduction, or both. A protocol may belong to one or multiple protocol suites, depending on how you categorize it. For example, the Gigabit Ethernet protocol IEEE 802.3z is a LAN (Local Area Network) protocol and it can also be used in MAN (Metropolitan Area Network) communications.  

Most recent protocols are designed by the IETF for Internetworking communications and by the IEEE for local area networking (LAN) and metropolitan area networking (MAN). The ITU-T contributes mostly to wide area networking (WAN) and telecommunications protocols. Cisco ISO has its own suite of protocols for internetworking communications, which is mainly deployed in European countries.
read more:


2012年3月21日星期三

Tips for You to Select Used or Refurbished Network Equipment

Environmentalist prefers the secondary cisco network equipment to new ones, for it is not only good for protecting environment, but also is a better way to save money. Indeed, nowadays, any network equipment such as Cisco routers, Cisco switches you required is available on the secondary market and online stores.

With the fast development of internet, online stores have been an established industry for several years. More and more people are willing to buy what they want through internet. The popular shopping platforms in western are Amazon, eBay, Newegg, etc. For people who need to buy network hardware, some professional online stores like router-switch.com, Hardware, Used cisco, super warehouse, may be a best choice. Because they supply all kinds of network equipment as well as free related products document, guide, and software upgrading. What’s important, user reviews on quality displayed though online can help you detect and select a better network item.

Selecting used/refurbished network equipment, what you need to attention here:
1.    Choose a reliable trustworthymanufacturer such as Cisco reseller, Juniper. The features of network equipment such as the types of Wi-Fi protocols supported, number of ports on a switch, and security features, all these you need to check.

2.    Besides the quality, you need to compare the price among the stores which are chosen, which one is the best cost-effective. Remember that you are dealing with secondary networking equipment so be sure to haggle to purchase it at the lowest price.

3.    Make sure you get a warranty. Ask questions like: What is the process and turnaround time if I do have a warranty issue? Advance replacement, return and repair, etc.What are their quality process and the standards they follow? Is the company certified in TL9000/ISO standards? Do they have a complete test lab, do they provide standard test documents with the equipment to verify it has in fact been tested. Do they have certified Engineers on staff?

If you check out all the tips above, selecting a right used cisco network hardware is as easy as ABC. What’s more, you can benefit from buying a used and refurbished network product, including saving the cost, reducing the e-waste, protecting environment. No matter you area small enterprise, or a big one, choosing used or refurbished network equipment is not too bad.

Related: router-switch.comis the World's Leading Cisco Supplier, founded in 2002. It provides network equipment that reduces the cost of network infrastructure, and is renowned for their customer service and huge supply of robust, cost-effective products. Its customers are including network equipment resellers, system integrators, service providers, governments entities, banks, the global 1000,medium and small enterprises. Its Network Liquidators Provides Hong Kong used Cisco Network products Liquidation Services.

2012年2月10日星期五

Cisco ASA5505-SEC-BUN-K9, Cisco ASA 5505 Firewall Edition Bundle


Cisco asa5520 bun k9, one of hot Cisco ASA 5500 series, is a type of securityappliances, and aim to combine best-of-breed security and VPN services with the innovative Cisco Adaptive Identification and Mitigation (AIM) architecture.

Designed as a core component of the Cisco Self-Defending Network,cisco firewall asa 5520 provides proactive threat defense that stops attacks before they spread through the network, controls network activity and application traffic, and delivers flexible VPN connectivity. The result is a powerful multifunction network security appliance family that provides the security breadth and depth for protecting home office, branch office, small and medium-sized business, and enterprise networks while reducing the overall deployment and operations costs and complexities associated with providing this new level of security.

After getting the general knowledge of cisco firewall asa5505 series (allCisco ASA 5500 series included), let’s check its specs and features
Processor / Memory / Storage
RAM Installed ( Max )  512 MB
Flash Memory Installed (Max)  128 MB Flash

Networking
Form Factor  External
Ports Qty  8
Connectivity Technology  Wired
Data Link Protocol  Ethernet, Fast Ethernet
Network / Transport Protocol  IPSec
Performance  Firewall throughput : 150 Mbps ¦ VPN throughput : 100 Mbps
Capacity  IPSec VPN peers : 25 ¦ SSL VPN peers : 2 ¦ Concurrent sessions : 25000 ¦ Virtual interfaces (VLANs) : 20
Features  Firewall protection, DMZ port, power over Ethernet (PoE), VPN support, trunking, VLAN support, wall mountable
Encryption Algorithm  DES, Triple DES, AES, SSL

Expansion / Connectivity
Expansion Slots Total (Free)  1 ( 1 ) x Expansion Slot
Interfaces  6 x network - Ethernet 10Base-T/100Base-TX - RJ-45 ¦ 2 x network / power - Ethernet 10Base-T/100Base-TX - RJ-45 ¦ 3 x Hi-Speed USB - 4 PIN USB Type A ¦ 1 x management - console - RJ-45

Miscellaneous
Rack Mounting Kit  Optional
Compliant Standards  FCC Class B certified, CE, VCCI Class B ITE, CISPR 22 Class B, EN 60950, EN 61000-3-2, IEC 60950, EN 61000-3-3, UL 60950, CSA 22.2 No. 60950, EN55022 Class B, AS/NZ 3548 Class B, FCC Part 15

Power
Power Over Ethernet (PoE) Supported  Yes
Power Device  Power adapter - external
Voltage Required  AC 120/230 V ( 50/60 Hz )

Related: More info about Cisco ASA 5500 series, you can visit router-switch.com, a leading Cisco supplier, to check in detail…

2012年1月16日星期一

How to Upgrade Cisco IOS Software in a Router or a Switch


Upgrading IOS on cisco 881 routers and switches is highly recommendable because of the following reasons

Patch critical vulnerabilities: Just like any other network device or application, Cisco routers and switches are also prone to security holes. And because routers and switches are critical to network infrastructure, you should plug these security holes as soon as possible.

Incorporate new features: Unless an update is simply a bug fix, every new release of the Cisco IOS includes new features. Upgrading your routers and switches in a timely manner means you’ll have more features to potentially make your job easier.

Stay current: “Staying current” with the latest IOS may sound like a flimsy justification to upgrade, especially when you consider your daily task list. However, when you consider the many different tools that communicate with the router’s IOS, staying current can take on a new importance. For example, if you’re using a SNMP network management tool, it may require your router to run a certain version of the IOS.

Procedure to upgrade cisco IOS
NOTE: Before doing any upgrades plesae take a complete backup of your cisco 881 router device configuration for safer side

Download the Correct version of Cisco IOS for you from here
http://www.cisco.com/tacpage/sw-center/index.shtml

Write Unsaved configurations
ciscorouter# write memory
Building configuration…
[OK]

Check space on Flash Memory
ciscorouter# show flash
Make sure you have the space left on your cisco device.

Backup Startup Configuration
Setup a TFTP server in the same IP range as the C881SRST-K9 device to backup the configs, IOS image and also for later to upload the new IOS image.
testrouter# copy startup-configtftp
Address or name of remote host []? 10.10.10.2
Destination filename [startup-config]?
!!
1278 bytes c opied in 0.100 secs

Backup Current IOS Image
testrouter# copy flash: tftp:
Source filename []?xxxxx-xx-xx.121-x.XB
Address or name of remote host []? 10.10.10.2
Destination filename [xxxxx-xx-xx.121-x.XB]?

Now, Load the new IOS image from the TFTP onto the flash
ciscorouter#copytftp: flash:
Address or name of remote host []? 10.10.10.2
Source filename []?c3560-ipbasek9-mz.122-40.SE.bin
Destination filename [c3560-ipbasek9-mz.122-40.SE.bin]?
Accessing tftp://10.10.10.2/c3560-ipbasek9-mz.122-40.SE.bin…
Loading c3560-ipbasek9-mz.122-40.SE.bin from 10.10.10.2 (via
Vlan1): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!
[OK - 8295106 bytes]
8295106 bytes copied in 124.571 secs (66589 bytes/sec)

Now you need to make sure you are booting with the correct version of IOS image for this you need to use the following command to set.
testrouter(config)#boot system flash:/c3560-ipbasek9-mz.122-40.SE.bin

Now you need to reload the Cisco Router
testrouter# reload

After rebooting cisco device with the new Cisco router software IOS image you need to make sure this use the following command
testrouter# shver

That’s it now we are using the latest IOS on your cisco device

How to Upgrade IOS on Cisco Routers

Cisco routers have a reputation for good performance, reliability and a long list of features. However, cisco router software still require updates for security, defects and feature enhancements. Changing the Cisco router operating system image (the IOS) is a straightforward procedure that can be performed in about 30 minutes.

Things You'll Need
Microsoft Windows 7 computer with telnet client and TFTP service installed
IP address of the Microsoft Windows 7 computer
Cisco router with telnet service enabled
IP address of the Cisco router
Cisco IOS image located in the TFTP service root directory
Password for the Cisco router telnet connection
Privilege Exec mode password for the Cisco router

Steps to upgrade IOS on cisco 871 router
1. Click the "Globe" button, then select the "Search" box, and then type "cmd." Right-click on the command line icon that appears and click "Run as Administrator." The command line window will appear.

2. Enter "telnet x.x.x.x," on the command prompt, replacing the "x.x.x.x" with the IP address of a Cisco router, and then press the "Enter" key. Telnet will then connect to the Cisco router.

3. Enter the telnet password when requested on the command prompt, and then tap the "Enter" key.

4. Enter "enable" on the command prompt, and tap the "Enter" key. Type the Privilege Exec password for the Cisco router when requested, and press the "Enter" key.

5. Enter the "copy tftp flash" command on the command prompt, and then tap the "Enter" key.

6. Enter the IP address of the Windows 7 computer on the command line as the IP address of the TFTP server from which to copy the new IOS image, and then tap the "Enter" key.

7. Enter the exact name of the IOS file on the command prompt when requested, and then tap the "Enter" key.

8. Enter the name of the IOS file as the destination file name and tap the "Enter" key.

9. Type "Y" when the "Erase flash: before copying? [confirm]" message appears, and press the "Enter" key. The new IOS file will then be copied to the cisco 877 router flash drive.

10. Enter "configure terminal" on the command line, and then tap the "Enter" key.

11. Type "no boot system" and press the "Enter" key. Then type "boot system flash:ios_filename," except replace the "ios_filename" with the exact name of the IOS file that was just transferred to the Cisco router, and then tap the "Enter" key.

12. Type the "exit" command at the command prompt and tap the "Enter" key, and then type "write memory" and tap the "Enter" key.

13. Enter the "reload" command on the command prompt, and then press the "Enter" key. The Cisco router will restart and boot into the new cisco router IOS.