Preview

Assignment 3.1 Ccna Labs 2

Powerful Essays
Open Document
Open Document
1221 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 3.1 Ccna Labs 2
Assignment 3.1
Router Prompt Exercise on page 56
3-1
User EXEC router>
Privileged EXEC router#
Global configuration #configure
Line Configuration (config-map-class)#
Interface Configuration (config-if)#
Router Configuration (config-line)#

3-2 Basic Configuration Exercise

1. Router(config)#hostname AUS 2. AUS(config)#enable password class, AUS(config)#enable secret class 3. If both are configures, the enable secret password can be used. The enable password command is ignored. Therefore, you do not need to configure both. The enable password is still supported by the IOS for legacy purposes. 4. AUS(config)#line console 0, AUS(config-line)#password cisco, AUS(config-line)#login, AUS(config-line)#exec-timeout 30 0 < - - optional, AUS(config-line)#logging synchronous < - - optional. 5. AUS(config)#line vty 04, AUS(config-line)#password cisco, AUS(config-line)#login, AUS(config-line)#exec-timeout 30 0 < - - optional, AUS(config-line)#logging synchronous < - - optional. 6. AUS(config)#service password-encryption 7. Service password Encrption is used to encrypt all the passwords available in the configuration.
For ex: if you are having enable password ,pap,chap password in ur configuration.then If you turn on service password encryption it will encrypt all the password.(enable password,pap,chap passwords)
The enable secret command provides better security by storing the enable secret password using a non-reversible cryptographic function. The added layer of security encryption provides is useful in environments where the password crosses the network 8. Router(config)#int s0/0
Router(config-if)#ip address 192.168.10.1 255.255.255.0
Router(config-if)#clock rate 56000
Router(config-if)#no shut
Router(config-if)#description Link to ISP

9. Router(config)#int fa0/0
Router(config-if)#description Accounting LAN

You May Also Find These Documents Helpful

  • Satisfactory Essays

    * Use A to select all of the commands in the edited device configuration file. Use C to put the commands in the clip board. Paste these commands into the table cell below with V.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    1.) Change control manager enforces change of things passwords. Password change policies makes things difficult for hackers. It’s Brute force attack.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Router CLI Exec Mode I Page 13 5. Router CLI Exec Mode II Page 15 6. Route CLI Configuration Process Page 18 7. Setting Switch Passwords Page 20 8. Setting Router Passwords Page 23 9.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    Next, if the software installed did indeed discover the password over the wire and was able to crack it then two changes need to be made. The first is that the password should be sent over the wire in an encrypted format and should be encrypted via current accepted encryption algorithms, such as AES at the date of this document's creation. The second change would be to enforce complex passwords which would be at least one capital letter, one lower case letter, numbers, special characters, and more than 8 characters.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Procedures/ The SA or other personnel to be the responsible authority in informing all local authorities about patches that are related to software packages included on the entire inventory of the organizations software.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The password for a user can be set with the PASSWORD clause of the CREATE USER command.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Without passwords being assigned to data and systems, this simply protection becomes a target for hackers.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Authentication: The key badge given to each employee will be used to allow access and authenticate that employee. An initial temporary password will be applied to each employee logon information and require the employee to change the password on first login. The policy will be set up to ensure that the employees create strong passwords and are required to change their passwords every 60 to 90 days. Employees at higher levels who have access to sensitive information may also be required to use two-factor authentication such as fingerprint biometric access to get into rooms and buildings and/or simply login to their computer system. PIN numbers will be used to access server rooms. Token will be issued to provide access remotely to allow for secure logins.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    1. ADI Employee passwords are to be kept strictly confidential. Each user is solely responsible for the activity taking place under their I.D…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Max and Min

    • 464 Words
    • 2 Pages

    Save all these passwords in your browser because it will be a HUGE pain to type them in every time you need them.…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    User setup and passwords are maintained by the Systems Support Team (please contact telephone number Customer Services 01332 868900) please see: Figure 8. Password Maintenance…

    • 539 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Freeradius Eduroam

    • 1328 Words
    • 6 Pages

    # authtype value, if present, will be used # to overwrite (or add) Auth-Type during # authorization. Normally should be MS-CHAP authtype = MS-CHAP # if use_mppe is not set to no mschap will # add MS-CHAP-MPPE-Keys for MS-CHAPv1 and # MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2 # use_mppe = yes # if mppe is enabled require_encryption makes # encryption moderate # require_encryption = yes # require_strong always requires 128 bit key # encryption # require_strong = yes # Windows sends us a username in the form of # DOMAIN\user,…

    • 1328 Words
    • 6 Pages
    Powerful Essays

Related Topics