Verify passwords - ccna, Computer Networking

Assignment Help:

Verify Passwords

Step 1: Telnet to the router from Host2 and verify the Telnet password.

You should be able to telnet to either Fast Ethernet interface of the router.

In a command window on Host 2, type:

telnet 192.168.7.190

When you are prompted for the Telnet password, type cisco and press Enter.

Was the telnet successful?

Step 2: Verify that the enable secret password has been set.

From the Telnet session, enter privilege exec mode and determine it is password protected:

Router>enable

Were you prompted for the enable secret password?

Step 3: Verify that the console is password protected.

Terminate and then re-establish the console connection from Host1 to the router to determine that the

console is password protected.

Depending on the Telnet client that you are using, the session can mainly be terminated with Ctrl-]. When the session is re-established, you should be prompted for the console password before being permitted access to the command line interface.   

 


Related Discussions:- Verify passwords - ccna

What are the benefits of intranet applications, What are the benefits of In...

What are the benefits of Intranet applications The benefits of successful Intranet applications can be enumerated as follows: Cheaper: Use of client browsers with one

Show about alternate mark inversion, Q. Show about Alternate mark inversion...

Q. Show about Alternate mark inversion? Bipolar AMI - Neutral, zero voltage represents binary 0 - Binary 1s symbolized by alternating positive and negative voltages

Layer 2 switch, A typical layer 2 switch has a number of features. Identify...

A typical layer 2 switch has a number of features. Identify and explain 5 features that you think are important that you would consider in your evaluation of L2 switches offered b

What do you mean by protocol, What do you mean by Protocol? In the cont...

What do you mean by Protocol? In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a netw

Intrinsic functions, Intrinsic Functions HPF introduces some new intri...

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

Require class and how many different types of class exists, Why do we requi...

Why do we require class and how many different parts of class exists?

What do you understand by the term lan, Question: (a) What do you mean...

Question: (a) What do you meant by the term ‘LAN'? How is a LAN different from a WAN? (b) Explain three types of cables which are commonly used with LANs. (c) Three com

CEI45 Network Communications, How could a VPN be used to facilitate secure ...

How could a VPN be used to facilitate secure remote administration of a server?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd