Verify passwords - ccna, Computer Networking

Assignment Help:

Verify Passwords

Step 1: Telnet to the router from Host2 and verify the Telnet password.

You should be able to telnet to either Fast Ethernet interface of the router.

In a command window on Host 2, type:

telnet 192.168.7.190

When you are prompted for the Telnet password, type cisco and press Enter.

Was the telnet successful?

Step 2: Verify that the enable secret password has been set.

From the Telnet session, enter privilege exec mode and determine it is password protected:

Router>enable

Were you prompted for the enable secret password?

Step 3: Verify that the console is password protected.

Terminate and then re-establish the console connection from Host1 to the router to determine that the

console is password protected.

Depending on the Telnet client that you are using, the session can mainly be terminated with Ctrl-]. When the session is re-established, you should be prompted for the console password before being permitted access to the command line interface.   

 


Related Discussions:- Verify passwords - ccna

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

What is an interrupt request, Question: a) Briefly describe the purpos...

Question: a) Briefly describe the purpose of Windows Powershell? b) Name three ways software can be installed on Linux? c) What is an interrupt request? d) As the

Network Fundamentals BTech Telecommunication, Write a report on your chosen...

Write a report on your chosen topic that has been approved by your Lecturer. Your report should include appropriate figures, about 2000 words. Topics: 1 MAN- Metro Ethernet 2 Inte

Advantages, What are advantages of having e-commerce over extranets

What are advantages of having e-commerce over extranets

Connection-oriented service, Sender requests connection from network. Other...

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when

Explain the different signal propagation behaviours, Question : (a) Lis...

Question : (a) List down and explain the different signal propagation behaviours that radio waves exhibit. (b) Explain the term Delay Spread with reference to signal propaga

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Which layer defines the physical topology, The Physical layer deals with th...

The Physical layer deals with the definite physical medium and the method of transporting 1s and 0s.

Achieving universal services, The purpose of internetworking is universal s...

The purpose of internetworking is universal service across heterogeneous networks. To give this service all computers, and routers have to agree to forward information from a sourc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd