Verify passwords - ccna, Computer Networking

Assignment Help:

Verify Passwords

Step 1: Telnet to the router from Host2 and verify the Telnet password.

You should be able to telnet to either Fast Ethernet interface of the router.

In a command window on Host 2, type:

telnet 192.168.7.190

When you are prompted for the Telnet password, type cisco and press Enter.

Was the telnet successful?

Step 2: Verify that the enable secret password has been set.

From the Telnet session, enter privilege exec mode and determine it is password protected:

Router>enable

Were you prompted for the enable secret password?

Step 3: Verify that the console is password protected.

Terminate and then re-establish the console connection from Host1 to the router to determine that the

console is password protected.

Depending on the Telnet client that you are using, the session can mainly be terminated with Ctrl-]. When the session is re-established, you should be prompted for the console password before being permitted access to the command line interface.   

 


Related Discussions:- Verify passwords - ccna

Metropolitan area network ( man)- fundamentals of networks , Normal 0 ...

Normal 0 false false false EN-IN X-NONE X-NONE Metropolitan area Network ( MAN) Metropoli

Determine the computing infrastructure, Determine the computing infrastruct...

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Challenge handshake authentication protocols (chap), Challenge Handshake Au...

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Determine control frame - set successor, Control Frame: set_successor ...

Control Frame: set_successor Station X wants to leave Successor S Predecessor P X sends set_successor frame to P With S as data field P changes its

Control - transport layer, Control This field  defines 6 different  co...

Control This field  defines 6 different  control  bits or  flags. These bits  enable flow  control  connection  establishment  and termination connection abortion and the mode

State about the packet filter firewalls, State about the Packet filter fire...

State about the Packet filter firewalls They remain the most common type of firewall in use as of today. They were the earliest firewalls developed and were capable of permitt

Explain in brief -ring topolgy, Explain in brief -Ring Topolgy Comments 1 ...

Explain in brief -Ring Topolgy Comments 1 - A faulty connection amid two stations can cause network failure 2 - It's difficult to add a new station/device as it has to come betwe

Request to a server, If a client gives a 4096-byte request to a server loca...

If a client gives a 4096-byte request to a server located 50 km away on a 1 Gbps fiber optic, then what is the efficiency of the line during this time? Suppose that the server give

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd