Verify passwords - ccna, Computer Networking

Assignment Help:

Verify Passwords

Step 1: Telnet to the router from Host2 and verify the Telnet password.

You should be able to telnet to either Fast Ethernet interface of the router.

In a command window on Host 2, type:

telnet 192.168.7.190

When you are prompted for the Telnet password, type cisco and press Enter.

Was the telnet successful?

Step 2: Verify that the enable secret password has been set.

From the Telnet session, enter privilege exec mode and determine it is password protected:

Router>enable

Were you prompted for the enable secret password?

Step 3: Verify that the console is password protected.

Terminate and then re-establish the console connection from Host1 to the router to determine that the

console is password protected.

Depending on the Telnet client that you are using, the session can mainly be terminated with Ctrl-]. When the session is re-established, you should be prompted for the console password before being permitted access to the command line interface.   

 


Related Discussions:- Verify passwords - ccna

What is applets, What is Applets Little programs that can make the We...

What is Applets Little programs that can make the Web pages more aesthetically beautiful by means of animations, text, and graphics moving across the screen.

Record route ip option, The address recorded by a router should be its outg...

The address recorded by a router should be its outgoing interface. That is, if a router forwards a datagram that has the record route option enabled, and if the datagram arrives at

What is the function of the osi session layer, What is the function of the ...

What is the function of the OSI Session Layer? This layer gives the protocols and means for two devices on the network to communicate with each other by holding a session.  Thi

Inductor, #clasification of inductor

#clasification of inductor

What are triggers and rules, Triggers are special user defined actions usua...

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

What is the difference among tftp and ftp application, What is the differen...

What is the difference among TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) permits a local host to get files from a remote host but does n

Encoding process, Encoding Process c= uG u: binary da...

Encoding Process c= uG u: binary data sequence of length 4( input) G: Generator matrix which is 7*4 c: Codeword     D

Explain about horn antenna, Q. Explain about Horn Antenna? - Outgoing t...

Q. Explain about Horn Antenna? - Outgoing transmissions broadcast by a stem and deflected outward - Received transmissions collect by a scooped part of the horn and deflecte

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd