Archive for 2006年4月15日


问题:刻录DVD盘,当文件大于2G的时候,Nero会提示NERO选文件时提示无法刻录这么大的文件,请转换格式。

这到底是怎么回事呢?怎么样才能解决这个问题呢?

其实这是一个格式的问题。

先介绍两种常用的光盘格式,ISO和UDF:

ISO-9660:又简称ISO,是由国际标准化组织在1985年制定的,当前唯一通用的光盘文件系统,任何类型的计算机都支持它,所有的烧录软件也都支持它。而且,若想让所有的CD-ROM都能读取烧录好的光盘,就必须使用ISO-9660或与其兼容的文件系统,其他的文件系统只能在CD-R或CD-RW上读取(有的还需要相应的烧录软件配合)。ISO-9660目前有两个标准:Level 1和Level 2。Level 1与DOS兼容,文件名采用传统的8.3格式,而且所有字符只能是26个大写英文字母、10个阿拉伯数字及下划线。Level 2则在Level 1的基础上加以改进,允许使用长文件名,但不支持DOS。

UDF是统一光盘格式(Universal Disc Format)的缩写。它采用标准的封装写入技术(PW,Packet Writing)将CD-R当作硬盘来使,用户可以在光盘上修改和删除文件。其基本原理是在进行烧录时先将数据打包,并在内存中临时建立一个特殊的文件目录表,同时接管系统对光盘的访问。被删除的文件或文件中被修改的部分其实仍存在CD-R光盘中,修改后的部分则以单独的数据块写入光盘,只不过在内存的目录表中,通过设定允许和不允许访问以及特殊链接等重定向寻址方法将数据重新组合,让系统找不到“老数据”,或让新数据替换老数据,从而达到删除与修改的目的。当用户结束操作后,便将新的目录表写回光盘并记下操作内容以便光盘日后的读取和数据的恢复(Undo)。这样一来,无疑大大增加了操作的便利性。而且在使用UDF时,一般都可以使用Windows中的资源管理器就能进行烧录,不会象使用ISO映像文件进行烧录时,每次完毕后都要进行关闭区段(Close Session)的操作,减少了烧录失败的机率。目前使用UDF技术的软件也都支持对CD-RW盘片的烧录,但在一些细节上有所不同,如删除的文件真的是被删除而不再是欺骗操作系统了。不过,在增加便利性的同时UDF也减少了有效存储空间,而且还要事先将CD-R与CD-RW盘片进行格式化,其中CD-RW盘片格式化后的容量要减少近100MB,所以大家要视情使用。另外,它还有一种派生的格式,即UDF/ISO,用UDF的技术制作ISO标准的光盘。

两者的区别:

ISO 不支持单个大于2G的文件
UDF 支持2G大小以上文件

ISO 兼容性好
UDF DOS和Win98系统不支持此格式,2000和XP以上系统和MAC系统支持

用NERO刻录大于2G文件的正确方法:

NERO中新建的时候,选DVD – 选择DVD/UDF – 选择“无多重区段(No Multisession)”
注明:选择“无多重区段(No Multisession)是为了保持DVD的最大兼容性,能在绝大多数光驱读得出的话。

  Windows XP的自动更新功能是保证Windows安全性所不可或缺的,但有时会碰上这样的情形:需要安装的补丁全部已经安装了,但仍然提示需要更新该补丁,而且反复提示,此时需要把这个功能禁用。大家会首先想到在系统属性设置里把自动更新设置为禁用,这个方法在WinXP SP1里是管用的,但若用在SP2版本里的话,系统托盘栏会出现一个红色盾牌状的图标,提示进入“Windows安全中心”重新设置自动更新,这样同样给我们带来不便。其实不用担心,我们可以从源头上把这个功能彻底禁用,用的工具就是“组策略”。

  在开始菜单的“运行”里输入gpedit.msc按回车启动“组策略”,打开之后依次展开“用户配置”-“管理模板”-“Windows 组件”-“Windows Update”,在右边窗口双击“删除使用所有Windows Update功能的访问”,打开对话框,把设置改为“已启用”,单击“确定”,然后关闭“组策略”,重新启动即可。现在再打开系统属性的“自动更新”页看看,是不是该页的全部设置都灰色不可用了?不光是这样,Windows Update的网站会被阻止访问,XP中所有位置的自动更新功能被禁用,也不会再出现任何更新补丁的提示。这样一来你的系统就清净不少了。但此法也将会令使用者不能及时获知最新升级补丁信息和升级系统补丁,因此使用此法需要三思而后行。

(1)网络基本情况
        网络拓扑结构为:中心交换机采用Cisco Catalyst 4006-S3,Supervisor Engine III G引擎位于第1插槽,用于实现三层交换;1块24口1000Base-T模块位于第2插槽,用于连接网络服务器;1块6端口1000Base-X模块位于第3插槽,用于连接6台骨干交换机。一台交换机采用Cisco Catalyst 3550-24-EMI,并安装1块1000Base-X GBIC千兆模块。一台交换机采用Cisco Catalyst 3550-24-SMI,也安装1块1000Base-X GBIC千兆模块。另外四台交换机采用Cisco Catalyst 2950G-24-SMI,安装1块1000Base-T GBIC千兆模块。
        所有服务器划分为一个VLAN,即VLAN 50。四台Catalyst 2950G-24-SMI交换机也只划分为一个VLAN,分别为VLAN 60、VLAN 70、VLAN 80和VLAN 90。Catalyst 3550-24-EMI划分为4个VLAN,分别为VLAN 10、VLAN 20、VLAN 30和VLAN 40。Catalyst 3550-24-SMI划分2个VLAN,分别为VLAN 60和VLAN 80,与另外两台Catalyst 2950G-24-SMI交换机分别位于同一VLAN。

(2)实例分析
        由于所有Catalyst 2950G交换机都是一个独立的VLAN,因此,必须先在这些交换机上创建VLAN(VLAN 60~VLAN 90),并将所有端口都指定至该VLAN。然后,再在Catalyst 4006交换机相应端口上分别创建VLAN。Catalyst 4006的1000Base-X端口分别与各Catalyst 2950G的1000Base-X端口连接。其中,GigabitEthernet3/2端口连接至1号Catalyst 2950交换机(VLAN 60),GigabitEthernet3/3端口连接至2号Catalyst 2950交换机(VLAN 70),GigabitEthernet3/4端口连接至3号Catalyst 2950交换机(VLAN 80),GigabitEthernet3/5端口连接至4号Catalyst 2950交换机(VLAN 90),GigabitEthernet3/6端口连接至6号楼交换机(VLAN 80)。
        由于在Catalyst 3550-24-EMI上划分有4个VLAN(VLAN 10~VLAN 40),而4个VLAN都需借助于一条1000Base-X链路实现与Catalyst 4006的GigabitEthernet3/1端口连接,因此,必须在Catalyst 4006与Catalyst 3550-24- EMI之间创建一个Trunk。
        同样,在Catalyst 3550-24-SMI上划分有2个VLAN(VLAN 60和VLAN 80),而4个VLAN都需借助于一条1000Base-X链路实现与Catalyst 4006的GigabitEthernet3/6端口连接,因此,必须在Catalyst 4006与Catalyst 3550-24- EMI之间创建一个Trunk。
        另外,所有服务器均连接至Catalyst 4006的1000Base-T模块,并单独成为一个VLAN(VLAN 90),因此,也必须为这些交换机创建一个VLAN,并将所有端口指定至该VLAN。需要注意的是,考虑到网络管理的需要,也可以剩余几个RJ-45端口(如21至24端口)不指定至任何VLAN,从而便于连接网络管理设备。默认状态下,所有端口都属于VLAN1,而且也只有在VLAN1中才能实现对网络中所有设备的管理。

(3)配置清单
●Cisco Catalyst 4006交换机配置清单
Current configuration : 5594 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
service compress-config
!
hostname hsnc
!
boot system bootflash:cat4000-is-mz.121-8a.EW1.bin
no logging console
enable secret level 1 5 $1$rkQW$1HKyKdN5f.Ri5zxeoF8Yv/
!
ip subnet-zero
!
!
!
interface GigabitEthernet1/1
 no snmp trap link-status
!–不为Supervisor Engine III G引擎中的1000Base-X插槽指定VLAN
interface GigabitEthernet1/2
 no snmp trap link-status
!
!
interface GigabitEthernet2/1
switchport access vlan 50
 no snmp trap link-status
!–将端口GigabitEthernet2/1指定至VLAN 50
!
interface GigabitEthernet2/2
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/3
switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/4
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/5
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/6
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/7
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/8
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/9
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/10
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/11
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/12
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/13
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/14
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/15
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/16
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/17
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/18
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/19
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/20
 switchport access vlan 50
 no snmp trap link-status
!–不将GigabitEthernet2/20~24指定至任何VLAN
!
interface GigabitEthernet3/1
 switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-90在该中继线通讯
!–可以拒绝或允许某个VLAN访问该Trunk
!–确保未被授权的VLAN通过该Trunk,实现VLAN的访问安全
 switchport mode trunk
!–将该端口设置为Trunk
 description netcenter
 no snmp trap link-status
!
interface GigabitEthernet3/2
 switchport access vlan 60
 no snmp trap link-status
!–将端口GigabitEthernet3/2指定至VLAN 60
!
interface GigabitEthernet3/3
 switchport access vlan 70
 no snmp trap link-status
!–将端口GigabitEthernet3/3指定至VLAN 70
!
interface GigabitEthernet3/4
 switchport access vlan 80
 no snmp trap link-status
!–将端口GigabitEthernet3/4指定至VLAN 80
!
interface GigabitEthernet3/5
switchport access vlan 90
 no snmp trap link-status
!–将端口GigabitEthernet3/5指定至VLAN 90
!
interface GigabitEthernet3/6
switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-90在该中继线通讯
!–可以拒绝或允许某个VLAN访问该Trunk
!–从而确保未被授权的VLAN通过该Trunk,实现VLAN访问安全
 switchport mode trunk
!–将该端口设置为Trunk
 description netcenter
 no snmp trap link-status
!
interface Vlan1
 description netmanger
no ip address
!
!–对VLAN1进行描述
interface Vlan10
 description network center
 no ip address
!–对VLAN2进行描述
!
interface Vlan20
 description computer center
no ip address
!
interface Vlan30
 description network lab
no ip address
!
interface Vlan40
 description huaxuelou
no ip address
!
interface Vlan50
 description wulilou
no ip address
!
interface Vlan60
 description shengwulou
no ip address
!
interface Vlan70
 description zhongwenxi
no ip address
!
interface Vlan80
 description tushuguan
no ip address
!
!
line con 0
 stopbits 1
line vty 0 4
 password aaa
 login
!
end

●Cisco Catalyst 3550-EMI配置清单
Building configuration…

Current configuration : 4055 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname office
!
enable secret 5 $1$p0fU$JeyPOM0RuL.Fqfe71efHF1
!
ip subnet-zero
!
!
spanning-tree extend system-id
!
!
!
interface FastEthernet0/1
 switchport access vlan 10
!–将端口FastEthernet0/1指定至VLAN 10
 no ip address
!
interface FastEthernet0/2
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/3
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/4
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/5
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/6
 switchport access vlan 20
 no ip address
!–将端口FastEthernet0/6指定至VLAN 20
!
interface FastEthernet0/7
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/8
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/9
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/10
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/11
 switchport access vlan 30
 no ip address
!–将端口FastEthernet0/6指定至VLAN 30
!
interface FastEthernet0/12
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/13
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/14
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/15
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/16
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/17
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/18
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/19
 switchport access vlan 40
 no ip address
!–将端口FastEthernet0/6指定至VLAN 40
!
interface FastEthernet0/20
 switchport access vlan 40
 no ip address
!
interface FastEthernet0/21
 switchport access vlan 40
 no ip address
!
interface FastEthernet0/22
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/23
 switchport access vlan 40
 no ip address
!
interface FastEthernet0/24
 switchport access vlan 40
 no ip address
!
interface GigabitEthernet0/1
 switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-80在该中继线通讯
switchport mode trunk
!–将该端口设置为Trunk
 no ip address
!
interface GigabitEthernet0/2
 no ip address
!
interface Vlan1
 ip address 172.16.100.12 255.255.255.0
!–LAN1指定IP地址
 no ip route-cache
 no ip mroute-cache
!
ip classless
ip http server
!
!
!
!
line con 0
line vty 0 4
 password aaa
 login
line vty 5 15
login
!
end

●Cisco Catalyst 3550-SMI配置清单
Building configuration…

Current configuration : 4055 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname office
!
enable secret 5 $1$p0fU$JeyPOM0RuL.Fqfe71efHF1
!
ip subnet-zero
!
!
spanning-tree extend system-id
!
!
!
interface FastEthernet0/1
 switchport access vlan 60
!–将端口FastEthernet0/1指定至VLAN 60
 no ip address
!
interface FastEthernet0/2
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/3
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/4
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/5
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/6
 switchport access vlan 20
 no ip address
!–将端口FastEthernet0/6指定至VLAN 20
!
interface FastEthernet0/7
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/8
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/9
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/10
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/11
 switchport access vlan 80
 no ip address
!–将端口FastEthernet0/6指定至VLAN 80
!
interface FastEthernet0/12
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/13
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/14
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/15
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/16
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/17
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/18
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/19
 switchport access vlan 80
 no ip address
!–将端口FastEthernet0/6指定至VLAN 80
!
interface FastEthernet0/20
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/21
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/22
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/23
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/24
 switchport access vlan 80
 no ip address
!
interface GigabitEthernet0/1
 switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-80在该中继线通讯
switchport mode trunk
!–从将该端口设置为Trunk
 no ip address
!
interface GigabitEthernet0/2
 no ip address
!
interface Vlan1
 ip address 172.16.100.13 255.255.255.0
!–为LAN1指定IP地址
 no ip route-cache
 no ip mroute-cache
!
ip classless
ip http server
!
!
!
!
line con 0
line vty 0 4
 password aaa
 login
line vty 5 15
 login
!
end

●Cisco Catalyst 2950G配置清单
四台Cisco Catalyst 2950G的配置基本相同,下面仅列出VLAN 60的配置情况。
Building configuration…

Current configuration : 2143 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname msl
!
enable password aaa
!
ip subnet-zero
!
!
spanning-tree extend system-id
!
!
interface FastEthernet0/1
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/2
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/3
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/4
 no ip address
!
interface FastEthernet0/5
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/6
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/7
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/8
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/9
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/10
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/11
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/12
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/13
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/14
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/15
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/16
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/17
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/18
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/19
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/20
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/21
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/22
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/23
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/24
 switchport access vlan 60
 no ip address
!
interface GigabitEthernet0/1
 no ip address
!
interface GigabitEthernet0/2
 no ip address
!
interface Vlan1
 ip address 172.16.100.10 255.255.255.0
!
ip classless
ip http server
!
!
!
!
line con 0
line vty 0 4
 password aaa
 login
line vty 5 15
 login
!
end

(1)网络基本情况
        网络拓扑结构为:中心交换机采用Cisco Catalyst 4006-S3,Supervisor Engine III G引擎位于第1插槽,用于实现三层交换;1块24口1000Base-T模块位于第2插槽,用于连接网络服务器;1块6端口1000Base-X模块位于第3插槽,用于连接6台骨干交换机。一台交换机采用Cisco Catalyst 3550-24-EMI,并安装1块1000Base-X GBIC千兆模块。一台交换机采用Cisco Catalyst 3550-24-SMI,也安装1块1000Base-X GBIC千兆模块。另外四台交换机采用Cisco Catalyst 2950G-24-SMI,安装1块1000Base-T GBIC千兆模块。
        所有服务器划分为一个VLAN,即VLAN 50。四台Catalyst 2950G-24-SMI交换机也只划分为一个VLAN,分别为VLAN 60、VLAN 70、VLAN 80和VLAN 90。Catalyst 3550-24-EMI划分为4个VLAN,分别为VLAN 10、VLAN 20、VLAN 30和VLAN 40。Catalyst 3550-24-SMI划分2个VLAN,分别为VLAN 60和VLAN 80,与另外两台Catalyst 2950G-24-SMI交换机分别位于同一VLAN。

(2)实例分析
        由于所有Catalyst 2950G交换机都是一个独立的VLAN,因此,必须先在这些交换机上创建VLAN(VLAN 60~VLAN 90),并将所有端口都指定至该VLAN。然后,再在Catalyst 4006交换机相应端口上分别创建VLAN。Catalyst 4006的1000Base-X端口分别与各Catalyst 2950G的1000Base-X端口连接。其中,GigabitEthernet3/2端口连接至1号Catalyst 2950交换机(VLAN 60),GigabitEthernet3/3端口连接至2号Catalyst 2950交换机(VLAN 70),GigabitEthernet3/4端口连接至3号Catalyst 2950交换机(VLAN 80),GigabitEthernet3/5端口连接至4号Catalyst 2950交换机(VLAN 90),GigabitEthernet3/6端口连接至6号楼交换机(VLAN 80)。
        由于在Catalyst 3550-24-EMI上划分有4个VLAN(VLAN 10~VLAN 40),而4个VLAN都需借助于一条1000Base-X链路实现与Catalyst 4006的GigabitEthernet3/1端口连接,因此,必须在Catalyst 4006与Catalyst 3550-24- EMI之间创建一个Trunk。
        同样,在Catalyst 3550-24-SMI上划分有2个VLAN(VLAN 60和VLAN 80),而4个VLAN都需借助于一条1000Base-X链路实现与Catalyst 4006的GigabitEthernet3/6端口连接,因此,必须在Catalyst 4006与Catalyst 3550-24- EMI之间创建一个Trunk。
        另外,所有服务器均连接至Catalyst 4006的1000Base-T模块,并单独成为一个VLAN(VLAN 90),因此,也必须为这些交换机创建一个VLAN,并将所有端口指定至该VLAN。需要注意的是,考虑到网络管理的需要,也可以剩余几个RJ-45端口(如21至24端口)不指定至任何VLAN,从而便于连接网络管理设备。默认状态下,所有端口都属于VLAN1,而且也只有在VLAN1中才能实现对网络中所有设备的管理。

(3)配置清单
●Cisco Catalyst 4006交换机配置清单
Current configuration : 5594 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
service compress-config
!
hostname hsnc
!
boot system bootflash:cat4000-is-mz.121-8a.EW1.bin
no logging console
enable secret level 1 5 $1$rkQW$1HKyKdN5f.Ri5zxeoF8Yv/
!
ip subnet-zero
!
!
!
interface GigabitEthernet1/1
 no snmp trap link-status
!–不为Supervisor Engine III G引擎中的1000Base-X插槽指定VLAN
interface GigabitEthernet1/2
 no snmp trap link-status
!
!
interface GigabitEthernet2/1
switchport access vlan 50
 no snmp trap link-status
!–将端口GigabitEthernet2/1指定至VLAN 50
!
interface GigabitEthernet2/2
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/3
switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/4
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/5
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/6
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/7
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/8
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/9
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/10
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/11
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/12
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/13
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/14
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/15
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/16
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/17
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/18
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/19
 switchport access vlan 50
 no snmp trap link-status
!
interface GigabitEthernet2/20
 switchport access vlan 50
 no snmp trap link-status
!–不将GigabitEthernet2/20~24指定至任何VLAN
!
interface GigabitEthernet3/1
 switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-90在该中继线通讯
!–可以拒绝或允许某个VLAN访问该Trunk
!–确保未被授权的VLAN通过该Trunk,实现VLAN的访问安全
 switchport mode trunk
!–将该端口设置为Trunk
 description netcenter
 no snmp trap link-status
!
interface GigabitEthernet3/2
 switchport access vlan 60
 no snmp trap link-status
!–将端口GigabitEthernet3/2指定至VLAN 60
!
interface GigabitEthernet3/3
 switchport access vlan 70
 no snmp trap link-status
!–将端口GigabitEthernet3/3指定至VLAN 70
!
interface GigabitEthernet3/4
 switchport access vlan 80
 no snmp trap link-status
!–将端口GigabitEthernet3/4指定至VLAN 80
!
interface GigabitEthernet3/5
switchport access vlan 90
 no snmp trap link-status
!–将端口GigabitEthernet3/5指定至VLAN 90
!
interface GigabitEthernet3/6
switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-90在该中继线通讯
!–可以拒绝或允许某个VLAN访问该Trunk
!–从而确保未被授权的VLAN通过该Trunk,实现VLAN访问安全
 switchport mode trunk
!–将该端口设置为Trunk
 description netcenter
 no snmp trap link-status
!
interface Vlan1
 description netmanger
no ip address
!
!–对VLAN1进行描述
interface Vlan10
 description network center
 no ip address
!–对VLAN2进行描述
!
interface Vlan20
 description computer center
no ip address
!
interface Vlan30
 description network lab
no ip address
!
interface Vlan40
 description huaxuelou
no ip address
!
interface Vlan50
 description wulilou
no ip address
!
interface Vlan60
 description shengwulou
no ip address
!
interface Vlan70
 description zhongwenxi
no ip address
!
interface Vlan80
 description tushuguan
no ip address
!
!
line con 0
 stopbits 1
line vty 0 4
 password aaa
 login
!
end

●Cisco Catalyst 3550-EMI配置清单
Building configuration…

Current configuration : 4055 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname office
!
enable secret 5 $1$p0fU$JeyPOM0RuL.Fqfe71efHF1
!
ip subnet-zero
!
!
spanning-tree extend system-id
!
!
!
interface FastEthernet0/1
 switchport access vlan 10
!–将端口FastEthernet0/1指定至VLAN 10
 no ip address
!
interface FastEthernet0/2
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/3
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/4
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/5
 switchport access vlan 10
 no ip address
!
interface FastEthernet0/6
 switchport access vlan 20
 no ip address
!–将端口FastEthernet0/6指定至VLAN 20
!
interface FastEthernet0/7
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/8
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/9
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/10
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/11
 switchport access vlan 30
 no ip address
!–将端口FastEthernet0/6指定至VLAN 30
!
interface FastEthernet0/12
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/13
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/14
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/15
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/16
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/17
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/18
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/19
 switchport access vlan 40
 no ip address
!–将端口FastEthernet0/6指定至VLAN 40
!
interface FastEthernet0/20
 switchport access vlan 40
 no ip address
!
interface FastEthernet0/21
 switchport access vlan 40
 no ip address
!
interface FastEthernet0/22
 switchport access vlan 30
 no ip address
!
interface FastEthernet0/23
 switchport access vlan 40
 no ip address
!
interface FastEthernet0/24
 switchport access vlan 40
 no ip address
!
interface GigabitEthernet0/1
 switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-80在该中继线通讯
switchport mode trunk
!–将该端口设置为Trunk
 no ip address
!
interface GigabitEthernet0/2
 no ip address
!
interface Vlan1
 ip address 172.16.100.12 255.255.255.0
!–LAN1指定IP地址
 no ip route-cache
 no ip mroute-cache
!
ip classless
ip http server
!
!
!
!
line con 0
line vty 0 4
 password aaa
 login
line vty 5 15
login
!
end
●Cisco Catalyst 3550-SMI配置清单
Building configuration…

Current configuration : 4055 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname office
!
enable secret 5 $1$p0fU$JeyPOM0RuL.Fqfe71efHF1
!
ip subnet-zero
!
!
spanning-tree extend system-id
!
!
!
interface FastEthernet0/1
 switchport access vlan 60
!–将端口FastEthernet0/1指定至VLAN 60
 no ip address
!
interface FastEthernet0/2
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/3
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/4
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/5
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/6
 switchport access vlan 20
 no ip address
!–将端口FastEthernet0/6指定至VLAN 20
!
interface FastEthernet0/7
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/8
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/9
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/10
 switchport access vlan 20
 no ip address
!
interface FastEthernet0/11
 switchport access vlan 80
 no ip address
!–将端口FastEthernet0/6指定至VLAN 80
!
interface FastEthernet0/12
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/13
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/14
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/15
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/16
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/17
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/18
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/19
 switchport access vlan 80
 no ip address
!–将端口FastEthernet0/6指定至VLAN 80
!
interface FastEthernet0/20
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/21
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/22
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/23
 switchport access vlan 80
 no ip address
!
interface FastEthernet0/24
 switchport access vlan 80
 no ip address
!
interface GigabitEthernet0/1
 switchport trunk encapsulation dot1q
!–启用802.1Q Trunk封装协议,即在该端口创建Trunk
 switchport trunk allowed vlan 1-80
!–允许vlan 1-80在该中继线通讯
switchport mode trunk
!–从将该端口设置为Trunk
 no ip address
!
interface GigabitEthernet0/2
 no ip address
!
interface Vlan1
 ip address 172.16.100.13 255.255.255.0
!–为LAN1指定IP地址
 no ip route-cache
 no ip mroute-cache
!
ip classless
ip http server
!
!
!
!
line con 0
line vty 0 4
 password aaa
 login
line vty 5 15
 login
!
end

●Cisco Catalyst 2950G配置清单
四台Cisco Catalyst 2950G的配置基本相同,下面仅列出VLAN 60的配置情况。
Building configuration…

Current configuration : 2143 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname msl
!
enable password aaa
!
ip subnet-zero
!
!
spanning-tree extend system-id
!
!
interface FastEthernet0/1
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/2
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/3
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/4
 no ip address
!
interface FastEthernet0/5
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/6
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/7
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/8
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/9
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/10
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/11
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/12
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/13
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/14
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/15
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/16
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/17
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/18
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/19
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/20
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/21
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/22
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/23
 switchport access vlan 60
 no ip address
!
interface FastEthernet0/24
 switchport access vlan 60
 no ip address
!
interface GigabitEthernet0/1
 no ip address
!
interface GigabitEthernet0/2
 no ip address
!
interface Vlan1
 ip address 172.16.100.10 255.255.255.0
!
ip classless
ip http server
!
!
!
!
line con 0
line vty 0 4
 password aaa
 login
line vty 5 15
 login
!
end

        局域网采用10Mb/s光纤,以城域网方式接入Internet。路由器选用拥有2个10/100 Mb/s自适应端口的Cisco 2611。内部网络使用的IP地址段为192.168.1.1~192.168.1.254,局域网端口Ethernet 0的IP地址为192.168.1.1,子网掩码为255.255.255.0。网络分配的合法IP地址范围为211.82.220.128~ 211.82.220.131,连接ISP的端口Ethernet 1的IP地址为211.82.220.129,子网掩码为255.255.255.252,可用于转换的IP地址为211.82.220.130。要求网络内部的所有计算机均可访问Internet。

配置清单:
interface fastethernet0/0
ip address 10.18.100.1 255.255.0.0  //指定局域网口的IP地址
duplex auto
speed auto
ip nat inside  //指定局域网接口
!
interface fastethernet0/1
ip address 211.82.220.129 255.255.255.248   //指定广域网口的IP地址
duplex auto
speed auto
ip nat outside //指定广域网口的IP地址
!
access-list 1 permit 192.168.1.0 0.0.0.255   //定义本地访问列表1
ip nat pool everyone 211.82.220.130 211.82.220.130 netmask 255.255.255.252
//定义合法IP地址池,名称为everyone
ip nat inside source list1 pool everyone overload   //启用端口复用地址转换
ip nat inside source static tcp 192.168.1.11 80 202.99.160.130 80
//定义Web服务至192.168.1.11
ip nat inside source static tcp 192.168.1.12 21 202.99.160.130 21
//定义FTP服务至192.168.1.12
ip nat inside source static tcp 192.168.1.13 25 202.99.160.130 25
//定义POP3服务至192.168.1.13
ip nat inside source static tcp 192.168.1.13 110 202.99.160.130 110
//定义SMTP服务至192.168.1.13,POP3和SMTP服务使用同一服务器
或者
interface fastethernet0/0
ip address 10.18.100.1 255.255.0.0
duplex auto
speed auto
ip nat inside
!
interface fastethernet0/1
ip address 211.82.220.129 255.255.255.248
duplex auto
speed auto
ip nat outside
access-list 1 permit 192.168.1.0 0.0.0.255
!
ip nat inside source list1 interface fastethernet0/1 overload
//启用端口复用地址转换,并直接采用fastethernet0/1的IP地址
ip nat inside source static tcp 192.168.1.11 80 202.99.160.129 80
ip nat inside source static tcp 192.168.1.12 21 202.99.160.129 21
ip nat inside source static tcp 192.168.1.13 25 202.99.160.129 25
ip nat inside source static tcp 192.168.1.13 110 202.99.160.129 110

        局域网以2Mb/s DDN专线接入Internet,路由器选用安装了广域网模块的Cisco 2611。内部网络使用的IP地址段为10.1.1.1~10.1.3.254,局域网端口Ethernet 0的IP地址为10.1.1.1,子网掩码为255.255.0.0。网络分配的合法IP地址范围为202.110.198.80~ 202.110.198.87,连接ISP的端口Ethernet 1的IP地址为202.110.198.81,子网掩码为255.255.255.248。要求网络内部的所有计算机均可访问Internet,并且在3台Web服务器和2台FTP服务器上实现负载均衡。
配置文件:
interface fastethernet0/1
ip address 10.1.1.1 255.255.0.0   //定义局域网端口IP地址
duplex auto
speed auto
ip nat inside   //定义为局域端口
!
interface serial 0/0
ip address 202.110.198.81 255.255.255.248   //定义广域网端口IP地址
duplex auto
speed auto
ip nat outside   //定义为广域端口
!
access-list 1 permit 202.110.198.82    //定义轮询地址列表1
access-list 2 permit 202.110.198.83
access-list 3 permit 10.1.1.0 0.0.255.255   //定义本地访问列表3
!
ip nat pool websev 10.1.1.2 10.1.1.4 255.255.255.248 type rotary
//定义Web服务器的IP地址池,Rotary关键字表示准备使用轮询策略从NAT池中取出相应的IP地址用于转换进来的IP报文,访问202.110.198.82的请求将依次被发送给10.1.1.2、10.1.1.2和10.1.1.4
ip nat pool ftpsev 10.1.1.8 10.1.1.9 255.255.255.248 type rotary
ip nat pool normal 202.110.198.84 202.110.198.84 netmask 255.255.255.248
//定义合法IP地址池,名称为normal
ip nat inside destination list 1 pool websev
// inside destination list语句定义与列表1相匹配的IP地址的报文将使用轮询策略
ip nat inside destination list 2 pool ftpsev
        局域网以2Mb/s DDN专线接入Internet,路由器选用安装了广域网模块的Cisco 2611。内部网络使用的IP地址段为172.16.100.1~172.16.102.254,局域网端口Ethernet 0的IP地址为172.16.100.1,子网掩码为255.255.0.0。网络分配的合法IP地址范围为202.99.160.128~ 202.99.160.191,广域网接口Serial 0的IP地址为202.99.160.129,子网掩码为255.255.255.192,可用于转换的IP地址范围为202.99.160.130~ 202.99.160.190。要求网络部分的部分计算机可以不受任何限制地访问Internet,服务器无需提供Internet访问服务。
配置清单:
interface fastethernet0/1
ip address 10.100.100.1 255.255.255.0   //定义局域网端口IP地址
duplex auto
 speed auto
ip nat inside   //定义为局域端口
!
interface serial 0/0
ip address 202.99.160.129 255.255.255.192   //定义广域网端口IP地址
duplex auto
speed auto
ip nat outside   //定义为广域端口
!
ip nat pool public 202.99.160.190 202.99.160.190 netmask 255.255.255.192
//定义合法IP地址池,名称为public
ip nat pool super 202.99.160.130 202.130.160.189 netmask 255.255.255.192
//定义合法IP地址池,名称为super
ip nat inside source list1 pool super  //定义列表1采用动态地址转换
ip nat inside source list2 pool public overload? 
//定义列表2采用端口复用地址转换
access-list1 permit 172.16.100.0 0.0.0.255 
//定义本地访问列表1
access-list2 permit 172.16.101.0?0.0.0.255
//定义本地访问列表2
access-list2 permit 172.16.102.0 0.0.0.255
        局域网采用10Mb/s光纤,以城域网方式接入Internet。路由器选用拥有2个10/100 Mb/s自适应端口的Cisco 2611。内部网络使用的IP地址段为10.18.100.1~10.18.104.254,局域网端口Ethernet 0的IP地址为10.18.100.1,子网掩码为255.255.0.0。网络分配的合法IP地址范围为211.82.220.80~211.82.220.87,连接ISP的端口Ethernet 1的IP地址为211.82.220.81,子网掩码为255.255.255.248。要求网络内部的所有计算机均可访问Internet,并且在Internet中提供Web、E-mail、FTP和Media等4种服务。
配置清单:
interface fastethernet0/0
ip address 10.18.100.1 255.255.0.0  //定义局域网口IP地址
duplex auto
speed auto
ip nat inside  //定义局域网口
!
interface fastethernet0/1
ip address 211.82.220.81 255.255.255.248  //定义广域网口IP地址
duplex auto
speed auto
ip nat outside  //定义广域网口
!
ip nat pool every 211.82.220.86 211.82.220.86 netmask 255.255.255.248
//定义合法IP地址池
access-list 1 permit 10.18.101.0 0.0.0.255  //定义本地访问列表1
access-list 1 permit 10.18.102.0 0.0.0.255
access-list 1 permit 10.18.103.0 0.0.0.255
access-list 1 permit 10.18.104.0 0.0.0.255
ip nat inside source list1 pool every overload 
//定义列表1采用端口复用地址转换
ip nat inside source static 10.18.100.10 211.82.220.82  //定义静态地址转换
ip nat inside source static 10.18.100.11 211.82.220.83
ip nat inside source static 10.18.100.12 211.82.220.84
ip nat inside source static 10.18.100.13 211.82.220.85
        局域网采10Mb/s光纤,以城域网方式接入Internet。路由器选用拥有2个10/100 Mb/s自适应端口的Cisco 2611。内部网络使用的IP地址段为192.168.100.1~192.168.101.254,局域网端口Ethernet 0的IP地址为192.168.100.1,子网掩码为255.255.0.0。网络分配的合法IP地址范围为202.99.160.128~ 202.99.160.131,连接ISP的端口Ethernet 1的IP地址为202.99.160.129,子网掩码为255.255.255.252,可用于转换的IP地址为202.99.160.130。要求网络内部的所有计算机均可访问Internet。
interface fastethernet0/0
ip address 192.168.100.1 255.255.0.0   //定义本地端口IP地址
duplex auto
speed auto
ip nat inside  //定义为本地端口
!
interface fastethernet0/1
ip address 202.99.160.129 255.255.255.252
duplex auto
speed auto
ip nat outside
!
ip nat pool onlyone 202.99.160.130 202.99.160.130 netmask 255.255.255.252
    //定义合法IP地址池,名称为onlyone
access-list 1 permit 192.168.100.0 0.0.0.255   //定义本地访问列表
access-list 1 permit 192.168.101.0 0.0.0.255
ip nat inside source list1 pool onlyone overload  //采用端口复用动态地址转换

  有些方法当然是反编译 CHM 文件,将里面的限制代码去除后再编译成 CHM 文件,不过这样比较麻烦。
  其实 CHM 文件里的内容大多是 HTML 文件,而通过加入脚本可以屏蔽鼠标右键、鼠标选择等操作,所以我们通过更改本地的区域安全设置就可以达到解决限制的目的。

  即通过更改“Internet 属性”里的“我的电脑”区域的“安全设置”(此“我的电脑”默认是不显示的),通过它来屏蔽脚本就可以解除 CHM 文件中的限制了。

  定位到注册表的[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZones],将这个注册表项导出后备份,然后将右边窗口的“Flags”改成“db”(十六进制的,如果是十进制则是219),确定后关闭注册表,然后右击桌面的“Internet Explorer”→属性→打开“Internet 属性”→安全→这时你会发现多了一个“我的电脑”,选择它后点“自定义级别”,然后找到“活动脚本”的选项→把它选择为“禁用”→确定,这时你再打开 CHM 文件就不会有限制了。

  最后,如果要恢复“我的电脑”的默认级别,只要把前面导出的备份注册表文件重新导入即可。

  另外,“我的电脑”区域的安全级别一般情况下不要乱动,否则会出现一些问题。