Customizing Your Home Router with Openwrt

Total Page:16

File Type:pdf, Size:1020Kb

Customizing Your Home Router with Openwrt BEFN$?FN Tuning WLAN Routers :ljkfd`q`e^pfli_fd\iflk\in`k_Fg\eNik ><KK@E>@EJ@;< Ai^Mfccd\i#=fkfc`X Learn how to take control of your home routing device with OpenWrt. BY THOMAS LEICHTERNSTERN he OpenWrt project calls itself “a many basic uses, but it doesn’t begin to custom logging, scripts, or alerts. Open- Linux distribution for embedded exploit the device’s true potential. Wrt can also save you money by letting Kdevices.” Beyond this simple in- OpenWrt lets you adapt the router to you adapt an inexpensive router, such as troduction, OpenWrt [1] is a framework your own needs. To monitor traffic, you the WRT54GL, to perform the functions for creating custom firmware to install can build in security tools, such as Snort of a more expensive tool. on devices such as home routers and and tcpdump. Also, you can configure Of course, hacking the home router is firewalls. not exactly an activity for the Versions of OpenWrt are novice. OpenWrt provides a available for a variety of de- variety of powerful and inter- vices, including the trusty esting features, but you need Linksys WRT54GL residential to be ready to experiment. firewall/ router [2], a low- Although OpenWrt imple- budget SOHO router you ments various security mech- probably recognize from anisms to help you restore the browsing the aisles of com- system, use of the OpenWrt puter shops (Figure 1). software can alter the device in a way that could make it N_p:ljkfd`q\6 impossible to return to the The pre-installed firmware original configuration. that comes with a device Installing third-party soft- such as the WRT54GL is ware on a device such as a intended for easy configura- home router also usually tion in a one-size-fits-all voids your warranty. environment. This prepack- OpenWrt is available for aged solution is good for =`^li\(1K_\C`ebjpjNIK,+>C`jXgfglcXiJF?F]`i\nXccXe[iflk\i% several router models, includ- 52 ISSUE 93 AUGUST 2008 Tuning WLAN Routers BEFN$?FN Alternatives Other open source projects, such as FreeWRT [5] and DD-WRT [6], also offer third-party firmware alternatives for embedded devices. ing devices by Linksys, Netgear, Allnet, or Asus. The OpenWrt system was origi- nally designed to operate from the com- mand line, but the recent X-Wrt [3] front end provides a GUI environment for router configuration. Because X-Wrt does not fully support the current Open- Wrt release (code name “Kamikaze”), it makes more sense to use the previous version (“White Russian”) if you plan to use the X-Wrt front end. X-Wrt is avail- able for download either as an operating system/ GUI bundle or as a web GUI standalone for various router models [4]. To replace the original WRT54GL router software with OpenWrt and X-Wrt, open the web interface (the ad- =`^li\)1=ifdk_\=`idnXi\Lg^iX[\Zfe]`^liXk`fe[`Xcf^`ek_\fi`^`eXcjf]knXi\#pflZXe dress defaults to http:// 192. 168. 1. 1), lgcfX[k_\Fg\eNik`dX^\kfpfliiflk\iXe[`ejkXcck_\lg^iX[\% type admin as the username and pass- word, and then click Administration | Firmware Upgrade (Figure 2). Then click the folder icon next to the input box and select the image file in the file browser. To launch the process, click the Upgrade button. Note that the network connection must be up while you are installing the image. To avoid irreparable damage to the device, do not attempt this step via WLAN. After about a minute, the X-Wrt GUI appears without any further inter- vention. The new operating system as- similates the original configuration files. >\kk`e^JkXik\[ To prepare the system for use, you first need to set up the network. OpenWrt is simply a core installation. Localizations, add-on modules, or updates are down- loaded off the Internet. Watch out for the following quirk whenever you change the router’s settings: To apply changes, first click the Save Changes button, and then click on the Apply text link – only then will the system actually store the changes. Clicking Network in the top menu bar takes you to a submenu where you can select the first entry, WAN-LAN, to go to the basic setup. To use the router to connect to the In- =`^li\*1KfZfee\Zkkfk_\@ek\ie\k#Fg\eNike\\[jX;JCdf[\c%:fe]`^li\k_\ZfekXZk ternet via a DSL or conventional modem, [\kX`cj]fik_`j`eN8E$C8Ej\kk`e^j% AUGUST 2008 ISSUE 93 53 BEFN$?FN Tuning WLAN Routers Command Line dialog is automatically enabled after you packages you need before installing. If complete the installation. not, you might run out of space for criti- OpenWrt supports comprehensive The System | Packages section (Figure cal extensions at a later stage. configuration via the console, which you 4) features a list of hundreds of Avail- can access via SSH. Use root as the able packages, which you can install by NC8E username with the admin password that clicking the Install item next to the pack- The comprehensive WLAN configuration you have set. Thanks to BusyBox, you age description. options, which by far outclass the origi- can access almost any system tools that Unfortunately, most of these packages nal firmware, are some of the most inter- you are familiar with from Linux. lack a graphical user interface, and con- esting aspects for many users. To access The lightweight ipkg package manager, figuration requires a detour to the con- the basic settings, press Network | Wire- based on Debian’s dpkg, is available sole (see the box titled “Command less, where you can specify the operating for installing and uninstalling packages. Line”). Besides displaying installed and mode for the wireless network. Options The command ipkg install package_ installable packages, the website also of- include Client, Ad Hoc, and Access Point. name installs the specified package and fers a nearly complete package manage- The latter is the default, which is typi- automatically resolves any dependen- ment system that is reminiscent of DPKG cally the right choice for most applica- cies. ipkg update and ipkg upgrade up- and supports repository management. tion scenarios. grade your system to the latest version. On top of this, the Install Package from When you boot a WLAN client, it first URL also supports the installation of broadcasts a message to discover reach- select PPPoE as your Connection Type selected online packages. able access points. Setting ESSID Broad- (Figure 3). In the Redial Policy, specify cast to Hide makes your router invisible whether the router will dial up the Inter- JJC<ok\ej`fe to the rest of the world. net connection when it receives a re- If you need to manage OpenWrt in an OpenWrt also gives you various en- quest (Connect on Demand) or keep the untrusted LAN environment, it makes cryption options for protection against connection alive (Keep Alive). Add the sense to install the SSL extension, which unauthorized use; you are strongly ad- access data for your dial-up account in you can access via System. To install, vised to enable them. Your options in- the Username and Password fields. Note click the Install Matrix Tunnel button. clude 48- and 128-bit WEP encryption that the router does not support POTS or Because of the restricted memory space, and WPA, version 1 or 2, which is far ISDN. you should carefully consider which more secure. To use WPA, you must in- Lg[Xk\jXe[8[[$fe Df[lc\j To update the router software to the lat- est version, select Info in the menu, and then click the Check For Webif Update button. If you check the box next to Include daily builds when checking for update to webif, the updater will check for the daily builds, which could be buggy. To install the update, click Install Webif. As mentioned previously, OpenWrt is simply a core installation that you cus- tomize by installing add-on programs. This approach lets developers keep the basic system small, which is a good idea because a device such as the WRT54GL has only 2,112KB of flash memory, which restricts the number of tools you can install. To query the memory status, click Status. The value queried is the free space in /dev/ mtdblock/ 4. For some menu items, such as UPnP or SNMP, the underlying programs are not installed by default. To download the programs, click In- stall in the appropriate online repository section then continue to install. X-Wrt has a configuration dialog for any pro- =`^li\+1Fg\eNik_XjX[gb^$jkpc\gXZbX^\dXeX^\ik_XkXlkfdXk`ZXccpi\jfcm\j[\g\e[\e$ grams that install in this way, and the Z`\j]figif^iXdjpflZ_ffj\kf`ejkXcc% 54 ISSUE 93 AUGUST 2008 Tuning WLAN Routers BEFN$?FN stall add-on software via the Install NAS metric. The Processes entry takes you to up the configuration files and partitions Package option. a list of all active processes, which is re- are available below System | Backup & The advanced WLAN configuration is freshed at 20-second intervals. Clicking Restore. accessible via Advanced Wireless. The Stop Refreshing stops the refresh and dis- Restrict access (MAC address) filter lets plays a pull-down menu next to the pro- I\j\k you restrict access to the router to spe- cess names. If you can’t get the machine to talk to cific MAC addresses. If the router and From the pull-down menu, you can you in the normal way, pressing the client are further apart, you can modify kill individual processes by sending the reset button might be your only option. the transmitter output below Transmit SIGHUP, SIGKILL, or SIGTERM signals.
Recommended publications
  • Hotspot Feature for Wi-Fi Clients with RADIUS User Authentication on Digi Transport
    Application Note 56 Hotspot feature for Wi-Fi clients with RADIUS User Authentication on Digi TransPort. Digi Support November 2015 1 Contents 1 Introduction ......................................................................................................................................... 4 1.1 Outline ......................................................................................................................................... 4 1.2 Assumptions ................................................................................................................................ 4 1.3 Corrections .................................................................................................................................. 4 2 Version .................................................................................................................................................5 3 Configuration .......................................................................................................................................5 3.1 Mobile Interface Configuration .....................................................................................................5 3.2 Ethernet Interface Configuration ................................................................................................. 6 3.2.1 ETH 0 Configuration ................................................................................................................. 6 3.2.2 ETH 12 Logical Interface Configuration ....................................................................................
    [Show full text]
  • Multiple Internet Connections by Balancing Traffic and Managing Failover with Zeroshell
    Multiple Internet Connections by Balancing Traffic and Managing Failover With Zeroshell The purpose of this document is to describe the creation of a router to access a network that uses multiple Internet connections in order to balance the outgoing LAN demand and to obtain network access redundancy, managing fault situations for one or multiple lines. To reach our objective, we shall use the Net Balancer module by Zeroshell. Lastly, we shall examine the possibility of aggregation (Bonding) of VPN aimed at increasing the bandwidth for point-to-point connection between remote locations via the Internet. Is it really possible to increase the Internet connection bandwidth? The answer to this question is not, "yes, absolutely." It depends on what you mean by increasing the Internet connection bandwidth. In essence, the Net Balancer distributes requests originating from the LAN by round-robin (weighed) policy over multiple Internet gateways. In other words, if at a given point in time there is only one LAN user making only one TCP connection (e.g. he executes only one download from the web), his traffic will flow from a single gateway, thus it would not benefit from balanced connections. Instead, if the LAN is crowded with users, each executing multiple requests at the same time, as a whole, their connections will have access to a higher bandwidth, equal to the sum of the single-access bandwidths. We then conclude that a single connection may never have more bandwidth than what offered by a single link, while multiple simultaneous connections will, on average, altogether have access to a greater bandwidth, which will stretch to the sum of the bandwidths of all the Internet links being balanced.
    [Show full text]
  • Linksys E800 Router User Guide
    User Guide Linksys E800 Linksys E800 Contents Contents Product overview How to find your network on the Internet 14 How to clone a MAC address 15 Package contents 1 How to connect to your corporate office using a VPN 15 Features 1 Back view 2 How to optimize your router for gaming and voice 16 Bottom view 2 How to remotely change your router settings 17 How to enable Voice over IP on your network 18 Setting Up: Basics How to configure UPnP 19 How to create a home network 3 How to use a router as an access point 19 What is a network? 3 How to put your new router behind an existing router 21 How to set up a home network 3 To add your router to an existing router or gateway 21 Where to find more help 3 To share an Internet connection 21 To extend your network 23 How to set up your router 3 How to start Cisco Connect 4 How to expose a device to the Internet 23 How to improve your wireless connection speed 5 How to test your Internet connection speed 5 Improving Security How to connect devices to your network 6 How do I know if my network is secure? 25 How to connect a computer to your network 6 How to connect a printer 8 Network security following a manual setup 25 How to connect other devices 8 How to set up wireless security using Wi-Fi Protected Setup 26 How to change your router’s name and password 10 Wi-Fi Protected Setup activity light 26 Connecting a device using the Wi-Fi Protected Setup button 26 How to connect a device using its Wi-Fi Protected Setup PIN 27 How to connect a device using the router’s Wi-Fi Protected Setup PIN 27
    [Show full text]
  • Internet Protocol Suite
    InternetInternet ProtocolProtocol SuiteSuite Srinidhi Varadarajan InternetInternet ProtocolProtocol Suite:Suite: TransportTransport • TCP: Transmission Control Protocol • Byte stream transfer • Reliable, connection-oriented service • Point-to-point (one-to-one) service only • UDP: User Datagram Protocol • Unreliable (“best effort”) datagram service • Point-to-point, multicast (one-to-many), and • broadcast (one-to-all) InternetInternet ProtocolProtocol Suite:Suite: NetworkNetwork z IP: Internet Protocol – Unreliable service – Performs routing – Supported by routing protocols, • e.g. RIP, IS-IS, • OSPF, IGP, and BGP z ICMP: Internet Control Message Protocol – Used by IP (primarily) to exchange error and control messages with other nodes z IGMP: Internet Group Management Protocol – Used for controlling multicast (one-to-many transmission) for UDP datagrams InternetInternet ProtocolProtocol Suite:Suite: DataData LinkLink z ARP: Address Resolution Protocol – Translates from an IP (network) address to a network interface (hardware) address, e.g. IP address-to-Ethernet address or IP address-to- FDDI address z RARP: Reverse Address Resolution Protocol – Translates from a network interface (hardware) address to an IP (network) address AddressAddress ResolutionResolution ProtocolProtocol (ARP)(ARP) ARP Query What is the Ethernet Address of 130.245.20.2 Ethernet ARP Response IP Source 0A:03:23:65:09:FB IP Destination IP: 130.245.20.1 IP: 130.245.20.2 Ethernet: 0A:03:21:60:09:FA Ethernet: 0A:03:23:65:09:FB z Maps IP addresses to Ethernet Addresses
    [Show full text]
  • Frequently Asked Questions
    User Guide E-Series Routers Linksys E-Series Table of Contents Table of Contents Product overview Wireless Security E900/E1200/E1500/E2500/E3200 1 Wireless > Wireless Security 8 Back view 1 Personal options 8 Bottom view 1 Office options 8 E4200 2 Option settings 8 Top view 2 Back view 2 Troubleshooting Setting Up Your E-Series Router How to run Linksys Connect after setup 11 Your router was not successfully set up 12 Where to find more help 3 Get Windows XP Service Pack 3 message 12 How to set up your router 3 Your Internet cable is not plugged in message 13 How to start Linksys Connect 3 Use Linksys Connect to manage your router 3 Cannot access your router message 14 How to manually set up your router 3 Device not found message 15 Advanced Configuration Specifications How to open the browser-based utility 4 Linksys E900 17 Setup > Basic Setup 5 Linksys E1200 18 Language 5 Linksys E1500 19 Internet Setup 5 Linksys E2500 20 Wireless > Basic Wireless Settings 6 Wireless Settings 6 Linksys E3200 21 Linksys E4200 22 i Linksys E-Series Product overview • Power indicator—Stays on steadily while power is connected and Product overview following a successful Wi-Fi Protected Setup connection Flashes slowly during bootup, during firmware upgrades, and during a Wi-Fi Protected Setup connection Flashes quickly when there is a Wi-Fi Protected Setup error • Power—Connect the included AC power adapter to this port E900/E1200/E1500/E2500/E3200 CAUTION Use only the adapter that came with your router Back view • Power button—Press | (on) to turn on the
    [Show full text]
  • Using the Cisco IOS Web Browser User Interface
    Using the Cisco IOS Web Browser User Interface The Cisco IOS software includes a Web browser user interface (UI) from which you can issue Cisco IOS commands. The Cisco IOS Web browser UI is accessed from the router home page, and can be customized for your business environment. For example, you can view pages in different languages and save them in Flash memory for easy retrieval. For a complete description of the Cisco Web browser UI configuration commands in this chapter, refer to the “Cisco IOS Web Browser User Interface Commands”chapter of the Configuration Fundamentals Command Reference. To locate documentation of other commands that appear in this chapter, use the Cisco IOS Command Reference Master Index or search online. • Finding Feature Information, on page 1 • Prerequisites for Cisco IOS Web Browser User Interface, on page 1 • Restrictions for Cisco IOS Web Browser User Interface, on page 2 • Information About Cisco IOS Web Browser User Interface, on page 2 • How to Configure and Use the Cisco IOS Web Browser User Interface, on page 7 • Configuration Examples for the Cisco IOS Web Browser User Interface, on page 12 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
    [Show full text]
  • Network PC Card
    Instant WirelessTM Series Network PC Card Use this Guide to install the following: WPC11 V2.5 User Guide COPYRIGHT & TRADEMARKS Copyright © 2001 Linksys, All Rights Reserved. Instant Wireless™ is a registered trade- mark of Linksys. Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation. All other trademarks and brand names are the property of their respective proprietors. LIMITED WARRANTY Linksys guarantees that every Instant Wireless™ Network PC Card V2.5 is free from phys- ical defects in material and workmanship under normal use for one year from the date of purchase. If these products prove defective during this warranty period, call Linksys Customer Support in order to obtain a Return Authorization Number. BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT’S PACKAGING ON HAND WHEN CALLING. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. When returning a product, mark the Return Authorization Number clearly on the outside of the package and include your original proof of pur- chase. All customers located outside of the United States of America and Canada shall be held responsible for shipping and handling charges. IN NO EVENT SHALL LINKSYS’ LIABILITY EXCEED THE PRICE PAID FOR THE PROD- UCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAM- AGES RESULTING FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFT- WARE, OR ITS DOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANY PRODUCT. Linksys makes no warranty or representation, expressed, implied, or statuto- ry, with respect to its products or the contents or use of this documentation and all accompanying software, and specifically disclaims its quality, performance, mer- chantability, or fitness for any particular purpose.
    [Show full text]
  • USER GUIDE R75 Model EA7500/EA7500S Contents
    USER GUIDE R75 Model EA7500/EA7500S Contents Product Overview .........................................................................................................3 Top ....................................................................................................................................................................... 3 Back ..................................................................................................................................................................... 4 Setting Up: Basics ........................................................................................................5 Where to find more help ............................................................................................................................... 5 How to install your router ............................................................................................................................ 6 www.LinksysSmartWiFi.com ....................................................................................9 How to log in to www.LinksysSmartWiFi.com ...................................................................................... 9 Network Map ................................................................................................................................................. 11 Guest Access ................................................................................................................................................ 11 Parental Controls........................................................................................................................................
    [Show full text]
  • Voice Over IP Digital Phone Concerns with Security and Fire Alarm Communications Systems
    Voice Over IP Digital Phone Concerns with Security and Fire Alarm Communications Systems OMNI Fire and Security Systems LP, 9811 North Freeway #A101, Houston, TX, 77037, (281) 591-1944 Disclaimer: The term “digital phone” as used within this document refers to the generic VOIP phone infrastructure and layout. The term does NOT refer to the Digital Phone service offered by Time Warner Cable or Time Warner. The Digital Phone service is a trademark of Time Warner Communications and for more information on their service, please visit http://www.twcdigitalphone.com. This article outlines the new weaknesses concerned with Voice Over IP (VOIP) Digital Phone Service and how it can affect security and fire alarm system communication. VOIP service is much different than classic POTS telephone lines in that it routes all phone traffic through a digital converter, then over the internet. When compared with a POTS line, new concerns are introduced that could affect the stability and dependability of burglar or fire alarm system communication. Plain old telephone service, or POTS, is the service available from analogue telephones prior to the introduction of electronic telephone exchanges into the public switched telephone network. These services had been available almost since the introduction of the telephone system in the late 19th century. VOIP is a very new technology and this list will help reduce the possibilities of failure wherever possible by educating the end user and presenting possible solutions. 1 Power Supply Problem The VOIP modem can come as a stand-alone network device, or a combination broadband modem/router/and VOIP converter.
    [Show full text]
  • Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1
    CONFIGURATION GUIDE Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1 Supporting Brocade 5600 vRouter, VNF Platform, and Distributed Services Platform 53-1004724-01 24 October 2016 © 2016, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/ brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
    [Show full text]
  • Function of Tcp Ip Protocol Suite
    Function Of Tcp Ip Protocol Suite politically?Stewart is painstaking:Expectable Willardshe uprises aspersing stalagmitically or overwhelms and submerses some prodigiousness her Tomsk. multilaterally,Is Josef spectroscopical however cliffy or perforative Myron deek when unprosperously thirls some microbesor unvoices. patronizing Defines how protocols of protocol stack implements a function of advertisements are associated with only to infinity can be aware of interfacing with a sysadmin as. The unsuspecting hapless user may cause his application to crash or otherwise fail. But obscure protocol suite and ip makes sure that. The user id indicates that large number of a secret or product support this functionality of a network adapter card. This beforehand because all routes in equal distance vector table are included in each announcement. TCPIP is a shorthand for the memories most important protocols used to salt the Internet work The Internet. Therefore, MBGP can create routes for both unicast and multicast traffic. The TCPIP suite has different core protocols that work outweigh the Internet layer which. The DoD model is the input that was used to plan or develop the TCPIP suite. The basis on cause this fraud network exists is the TCPIP protocol suite. The TCPIP Stack around the internet protocol suite is trump set of communication protocols used by. Ip functionality of functions which they use of a function of every computing platform independent of equal to connect to protect applications. When tcp protocol suite and function at each level. Connections are made to the first host in the anycast address group to respond. What is OSI Model 7 Layers Explained Imperva.
    [Show full text]
  • Rebooting a Router
    Rebooting a Router This chapter describes the basic procedure a router follows when it reboots, how to alter the procedure, and how to use the ROM Monitor. For a complete description of the booting commands mentioned in this chapter, refer to the “Booting Commands” chapter in the Cisco IOS Configuration Fundamentals Command Reference. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online. Rebooting a Router Task List You can perform the tasks related to rebooting discussed in the following sections: • Displaying Booting Information • Rebooting Procedures • Modifying the Configuration Register Boot Field • Setting Environment Variables • Scheduling a Reload of the System Image • Entering ROM Monitor Mode • Manually Loading a System Image from ROM Monitor • Configuring High System Availability on the Cisco 7500 Series Cisco IOS Configuration Fundamentals Configuration Guide FC-207 Rebooting a Router Displaying Booting Information Displaying Booting Information Use the following commands in EXEC mode to display information about system software, system image files, and configuration files: Command Purpose show bootvar Lists the contents of the BOOT environment variable, the name of the configuration file pointed to by the CONFIG_FILE environment variable, and the contents of the BOOTLDR environment variable. more nvram:startup-config Lists the startup configuration information. On all platforms except the Class A Flash file systems, the startup configuration is usually in NVRAM. On Class A Flash file systems, the CONFIG_FILE environment variable points to the startup configuration, defaulting to NVRAM. show version Lists the system software release version, system image name, configuration register setting, and other information.
    [Show full text]