Configure the logical topology - configure router1, Computer Networking

Assignment Help:

Configure Router1.

From Host1, connect to the console of Router 1 and establish a console session. Directions for creating a console connection using HyperTerminal are in Appendix 2. 

From the router console, configure the following: Enter the following commands on the router: 

Router>enable

Router#config term

Enter configuration commands, one per line.  End with CNTL/Z.

Router(config)#hostname Router1 

Router1(config)#enable secret class

Router1(config)#line console 0

Router1(config-line)#password cisco

Router1(config-line)#login

Router1(config-line)#line vty 0 4

Router1(config-line)#password cisco

Router1(config-line)#login

Router1(config-line interface fa0/0 )# 

Router1(config-if)#ip address 192.168.7.126  255.255.255.128

Router1(config-if)#no shutdown

Router1(config-if)#description connection to host1

Router1(config-if)#interface fa0/1

Router1(config-if)#description connection to switch1

Router1(config-if)#ip address 192.168.7.190 255.255.255.192

Router1(config-if)#no shutdown

Router1(config-if)#end

Router1#  

 


Related Discussions:- Configure the logical topology - configure router1

What is the mesh network, A network in which there is multiple network link...

A network in which there is multiple network links among computers to provide multiple paths for data to travel.

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Explain the working of ISDN, Explain the working of ISDN Stands for ...

Explain the working of ISDN Stands for Integrated Services Digital Network. It is a way to move more data over existing regular phone lines. ISDN is rapidly becoming availab

Show the data encryption standard, Q. Show the Data Encryption Standard? ...

Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us

Mail message format - application layer, Mail Message  Format When an...

Mail Message  Format When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained

Why you require connecting two computers for file sharing, You require conn...

You require connecting two computers for file sharing. Is it possible to do this without using a hub or router? Yes, you can connect two computers together using only one cable

IP datagram, On a LAN where are IP Datagram transported?

On a LAN where are IP Datagram transported?

What is network address, Q. What is Network Address? Network Address ...

Q. What is Network Address? Network Address First address in the block, assigned to the organization Defines the network itself and cannot be assigned to a host

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd