<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Cisco</title> <atom:link href="https://www.iphere.com/tag/cisco/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>High CPU usage when SNMP is enabled in Cisco Routers</title><link>https://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-4</link> <comments>https://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-4#comments</comments> <pubDate>Wed, 03 Aug 2022 02:12:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[enabled]]></category> <category><![CDATA[High]]></category> <category><![CDATA[Routers]]></category> <category><![CDATA[SNMP]]></category> <category><![CDATA[usage]]></category> <guid
isPermaLink="false">http://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-4</guid> <description><![CDATA[Cisco Routers and Switches with L3 routing functions are seen to have problems with High CPU usage when SNMP is enabled. This can range anything from 15% to 40%. According to Cisco, these are low priority processes and other priority processes requiring CPU cycles are given priority over these processes and this level of CPU [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-4/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>How to create VLAN Interfaces for InterVLAN Routing in Cisco IOS</title><link>https://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-4</link> <comments>https://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-4#comments</comments> <pubDate>Tue, 02 Aug 2022 20:12:55 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[create]]></category> <category><![CDATA[Interfaces]]></category> <category><![CDATA[InterVLAN]]></category> <category><![CDATA[Routing]]></category> <category><![CDATA[VLAN]]></category> <guid
isPermaLink="false">http://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-4</guid> <description><![CDATA[VLAN Interfaces are required in network scenarios where you have different VLANs and need Inter-VLAN switching on Layer3 (Routing capable) switches. Every VLAN that needs to be routed should have a VLAN interface. Let&#8217;s say we have VLAN 10 which hosts the subnet 192.168.10.0 subnet, VLAN hosts 192.168.20.0 subnet and VLAN 30 hosts 192.168.30.0 subnet. [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-4/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Unable to delete Stale/Obsolete statc routes in Cisco IOS</title><link>https://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-4</link> <comments>https://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-4#comments</comments> <pubDate>Tue, 02 Aug 2022 14:13:34 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[delete]]></category> <category><![CDATA[routes]]></category> <category><![CDATA[Stale/Obsolete]]></category> <category><![CDATA[statc]]></category> <category><![CDATA[Unable]]></category> <guid
isPermaLink="false">http://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-4</guid> <description><![CDATA[Today, I had to troubleshoot a very peculiar problem on my Cisco Catalyst 3750 switches in two different sites. To cut a long story short, both the sites originally had IPSec VPNs over ADSL internet andtherefore static routes added to pass through their VPN firewalls. However, with a recent WAN migration with leased lines, all [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-4/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>High CPU usage when SNMP is enabled in Cisco Routers</title><link>https://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-3</link> <comments>https://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-3#comments</comments> <pubDate>Tue, 16 Nov 2021 14:12:47 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[enabled]]></category> <category><![CDATA[High]]></category> <category><![CDATA[Routers]]></category> <category><![CDATA[SNMP]]></category> <category><![CDATA[usage]]></category> <guid
isPermaLink="false">http://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-3</guid> <description><![CDATA[Cisco Routers and Switches with L3 routing functions are seen to have problems with High CPU usage when SNMP is enabled. This can range anything from 15% to 40%. According to Cisco, these are low priority processes and other priority processes requiring CPU cycles are given priority over these processes and this level of CPU [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/high-cpu-usage-when-snmp-is-enabled-in-cisco-routers-3/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>How to create VLAN Interfaces for InterVLAN Routing in Cisco IOS</title><link>https://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-3</link> <comments>https://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-3#comments</comments> <pubDate>Mon, 15 Nov 2021 14:12:52 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[create]]></category> <category><![CDATA[Interfaces]]></category> <category><![CDATA[InterVLAN]]></category> <category><![CDATA[Routing]]></category> <category><![CDATA[VLAN]]></category> <guid
isPermaLink="false">https://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-3</guid> <description><![CDATA[VLAN Interfaces are required in network scenarios where you have different VLANs and need Inter-VLAN switching on Layer3 (Routing capable) switches. Every VLAN that needs to be routed should have a VLAN interface. Let&#8217;s say we have VLAN 10 which hosts the subnet 192.168.10.0 subnet, VLAN hosts 192.168.20.0 subnet and VLAN 30 hosts 192.168.30.0 subnet. [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/how-to-create-vlan-interfaces-for-intervlan-routing-in-cisco-ios-3/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Unable to delete Stale/Obsolete statc routes in Cisco IOS</title><link>https://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-3</link> <comments>https://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-3#comments</comments> <pubDate>Sun, 14 Nov 2021 20:12:50 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[delete]]></category> <category><![CDATA[routes]]></category> <category><![CDATA[Stale/Obsolete]]></category> <category><![CDATA[statc]]></category> <category><![CDATA[Unable]]></category> <guid
isPermaLink="false">http://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-3</guid> <description><![CDATA[Today, I had to troubleshoot a very peculiar problem on my Cisco Catalyst 3750 switches in two different sites. To cut a long story short, both the sites originally had IPSec VPNs over ADSL internet andtherefore static routes added to pass through their VPN firewalls. However, with a recent WAN migration with leased lines, all [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/unable-to-delete-staleobsolete-statc-routes-in-cisco-ios-3/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Clear Access Control List (ACL) Counters in Cisco IOS</title><link>https://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2</link> <comments>https://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2#comments</comments> <pubDate>Sat, 22 Nov 2014 08:13:19 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Access]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Clear]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[Counters]]></category> <category><![CDATA[List]]></category> <guid
isPermaLink="false">http://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2</guid> <description><![CDATA[When troubleshooting a problem with Access Control lists, one of the things you would want to do is to clear the counters on the ACL matches. In Cisco IOS, you can clear the ACL Matches counters as follows: Clear Counters on All ACLs ciscorouter# clear access-list counters This clears the matches on all the ACLs [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Allow user view Running/Startup-Config (red-only) in Cisco IOS</title><link>https://www.iphere.com/allow-user-view-runningstartup-config-red-only-in-cisco-ios-2</link> <comments>https://www.iphere.com/allow-user-view-runningstartup-config-red-only-in-cisco-ios-2#comments</comments> <pubDate>Fri, 21 Nov 2014 02:14:11 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Allow]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[redonly]]></category> <category><![CDATA[Running/StartupConfig]]></category> <category><![CDATA[user]]></category> <category><![CDATA[view]]></category> <guid
isPermaLink="false">http://www.iphere.com/allow-user-view-runningstartup-config-red-only-in-cisco-ios-2</guid> <description><![CDATA[If you want to allow a low-priviledged user on a Cisco router or a Switch to view the Startup Config then this can be done in Routers and Switches running Cisco IOS. This infact is a simple 2 step procedure as follows: Set Privileges to view Startup Config From the Global configuration mode, set the [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/allow-user-view-runningstartup-config-red-only-in-cisco-ios-2/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Enable/Configure DHCP Snooping in Cisco Catalyst Switches (IOS)</title><link>https://www.iphere.com/enableconfigure-dhcp-snooping-in-cisco-catalyst-switches-ios-2</link> <comments>https://www.iphere.com/enableconfigure-dhcp-snooping-in-cisco-catalyst-switches-ios-2#comments</comments> <pubDate>Thu, 20 Nov 2014 20:13:05 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Catalyst]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[DHCP]]></category> <category><![CDATA[Enable/Configure]]></category> <category><![CDATA[Snooping]]></category> <category><![CDATA[switches]]></category> <guid
isPermaLink="false">http://www.iphere.com/enableconfigure-dhcp-snooping-in-cisco-catalyst-switches-ios-2</guid> <description><![CDATA[DHCP snooping is a DHCP security feature that provides security by filtering untrusted DHCP messages and by building and maintaining a DHCP snooping binding table. An untrusted DHCP message is a message that is received from outside the network or firewall causing denial of service attacks. The DHCP snooping binding table contains the MAC address, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/enableconfigure-dhcp-snooping-in-cisco-catalyst-switches-ios-2/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Configure MD5 encrypted passwords for users on Cisco IOS</title><link>https://www.iphere.com/configure-md5-encrypted-passwords-for-users-on-cisco-ios-2</link> <comments>https://www.iphere.com/configure-md5-encrypted-passwords-for-users-on-cisco-ios-2#comments</comments> <pubDate>Thu, 20 Nov 2014 08:13:14 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Configure]]></category> <category><![CDATA[encrypted]]></category> <category><![CDATA[passwords]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/configure-md5-encrypted-passwords-for-users-on-cisco-ios-2</guid> <description><![CDATA[The enhanced password security in Cisco IOS introduced in 12.0(18)S allows an admin to configure MD5 encryption for passwords. Prior to this feature the encryption level on Type 7 passwords used a week encryption and can be cracked easily and the clear text password (type 0) as anyone would know is completely insecure. Anyone who [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/configure-md5-encrypted-passwords-for-users-on-cisco-ios-2/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>