Free Essay

It320 Week 2

In:

Submitted By dhumphrey117
Words 470
Pages 2
Darius Humphrey IT320 Homework 2
Page 24 1. Attach a rollover cable to the PC’s COM port and then to either the Console or AUX port on the router. The console port is preferred because messages from the router are logged on this line. The AUX port is used for remote access and can also be used if the console port is damaged. You can also access the CLI through Telnet, but the Telnet client must have access to the router. 2. User EXEC mode allows on a limited number of basic monitoring commands and is often referred to as view-only mode. The user EXEC lever does not allow commands that might change the configuration of the router. It is identified by the > prompt. The privileged EXEC mode provides access to all router commands and this mode can be configured to require a password. It can also be configured to require a user ID. Configuration and management commands require the network administrator to beat the privileged EXEC level. The privileged EXEC mode is identified by the # prompt. 3. The platform on which the image runs
The special features supported in the image
Where the image runs and whether it has been zipped or compressed 4. ROMMON is not IOS; therefore it does not accept the IOS commands. It cannot route IP packets. The ROM_MON software is stored in a Rom chip instead of flash, so it should always be available even if some other network engineer made a mistake and erased all the contents of flash memory. Password recovery is the most popular reason for a network engineer to use ROMMON, the boot ROM software resides in the ROM chips which means, that this software can be loaded even if no working IOS exits in flash memory. However, unlike ROMMON, the boot Rom software is an IOS image although a basic one. The entire purpose of this basic IOS is to allow an engineer to load new IOS images into flash when the image cannot be loaded because of other issues. There is the IOS operating environment in which the router has a fully functional set of features and can be configured for normal operations.

Mode | Access Method | Prompt | Exit Method | About this mode | RouterConfiguration | Enter your router command followed by the appropriate keyword while in global configuration mode | 1600 (configure-router)# | Enter the end command to exit global configuration. Enter the exit command to or press ctrl-z to exit privileged mode. | Used to configure an ip routing protocol | Line configuration | Specify a line with the line vty command while in global configuration mode | 1600 (configure-router)# | To exit global configuration mode enter the exit command. To exit privileged EXEC mode enter the end command or press ctrl-z. | Used to configure parameters for the terminal |

Similar Documents

Premium Essay

It255

...Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology &...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18