Verify passwords - ccna, Computer Networking

Assignment Help:

Verify Passwords

Step 1: Telnet to the router from Host2 and verify the Telnet password.

You should be able to telnet to either Fast Ethernet interface of the router.

In a command window on Host 2, type:

telnet 192.168.7.190

When you are prompted for the Telnet password, type cisco and press Enter.

Was the telnet successful?

Step 2: Verify that the enable secret password has been set.

From the Telnet session, enter privilege exec mode and determine it is password protected:

Router>enable

Were you prompted for the enable secret password?

Step 3: Verify that the console is password protected.

Terminate and then re-establish the console connection from Host1 to the router to determine that the

console is password protected.

Depending on the Telnet client that you are using, the session can mainly be terminated with Ctrl-]. When the session is re-established, you should be prompted for the console password before being permitted access to the command line interface.   

 


Related Discussions:- Verify passwords - ccna

Issues to process of message passing, The following issues are decided by t...

The following issues are decided by the system in the process of message passing: 1) Whether the communication link is established or not 2) Whether the receiver is ready to

What is telnet, What is Telnet It is a protocol or set of rules that us...

What is Telnet It is a protocol or set of rules that uses to connect one computer to another computer in network. It is also called as a remote login. The telnet operates on cl

Itc597, restore the scrambled bits to their original order

restore the scrambled bits to their original order

Illustrate the bellman-ford algorithm, Illustrate the Bellman-Ford algorith...

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

Show the parity check - performance, Q. Show the Parity Check - Performance...

Q. Show the Parity Check - Performance? Parity Check - Performance Is able to detect all single-bit errors Can as well detect burst errors if the total number of

Which type of switching is considered to be ''wire speed'', Cut-Through is ...

Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec

Enumerate the various internetworking facility, Enumerate the various inter...

Enumerate the various internetworking facility 1.) Give a link among networks. At minimum, a physical and link control connection is required.   (2) Provide for the routing

Define about unix systems and windows servers, What protocol can be applied...

What protocol can be applied when you need to transfer files between different platforms, such among UNIX systems and Windows servers? Use FTP (File Transfer Protocol) for file

Approaches use in constructing application entities, The diagram below offe...

The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model. ISO Approach - Occasionally called Horizontal Approach - OSI asse

Determine the window positions for succession of events, Two neighbouring n...

Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is r

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd