Configure the logical topology - configure router1, Computer Networking

Assignment Help:

Configure Router1.

From Host1, connect to the console of Router 1 and establish a console session. Directions for creating a console connection using HyperTerminal are in Appendix 2. 

From the router console, configure the following: Enter the following commands on the router: 

Router>enable

Router#config term

Enter configuration commands, one per line.  End with CNTL/Z.

Router(config)#hostname Router1 

Router1(config)#enable secret class

Router1(config)#line console 0

Router1(config-line)#password cisco

Router1(config-line)#login

Router1(config-line)#line vty 0 4

Router1(config-line)#password cisco

Router1(config-line)#login

Router1(config-line interface fa0/0 )# 

Router1(config-if)#ip address 192.168.7.126  255.255.255.128

Router1(config-if)#no shutdown

Router1(config-if)#description connection to host1

Router1(config-if)#interface fa0/1

Router1(config-if)#description connection to switch1

Router1(config-if)#ip address 192.168.7.190 255.255.255.192

Router1(config-if)#no shutdown

Router1(config-if)#end

Router1#  

 


Related Discussions:- Configure the logical topology - configure router1

State about data and data files - information, State about data and data fi...

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

Tqm in design manufacturing, Quality assurance through statistical methods...

Quality assurance through statistical methods is a key component in a manufacturing organization where TQM generally starts by sampling a random selection selection of th

State about the bus topology, State about the Bus Topology Comments ...

State about the Bus Topology Comments 1 - Requires less cabling than a star network 2 - If there is a central cable problem entire netwo. rk goes down 3 - Less e

Security and reciprocity of RSA, Q. Security and Reciprocity of RSA? S...

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Options - transport layer, Options The options  fields may be  used to...

Options The options  fields may be  used to  provide  other functions that are not  covered by  the header. If the length  of the  options  field is not  a multiple of 32 bits

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Explain about the middleware support, Explain about the Middleware support ...

Explain about the Middleware support All the connectivity interface related tools come under the category of middleware. Middleware provides the link for data exchange between

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd