Basic Configuration Exercise 1-12 pg. 56-58 1. Austin’s router# configure terminal Austin’s router(config)#hostname AUS AUS(config)#end AUS# 2 .AUS > enable AUS # configure terminal AUS (config )# enable password class AUS > enable AUS # configure terminal AUS(config)# enable secret class 3. The enable secret password . you do not need to configure both. 4. AUS# conf t AUS (config) # line con 0 AUS(config-line) # login AUS (config-line) # password cisco AUS (config-line)
Words: 655 - Pages: 3
CHAPTER ONE BACKGROUND OF MINISTRY OF LOCAL GOVERNMENT The system of Local Government (LG) in Uganda is established under the 1995 constitution and enacted through the Local Government Act (LGA) cap 243 Laws of Uganda 2000. Local Government Financial and Accounting Regulations, issued under the LGA, prescribe the accountability measures for compliance by LGs. The goal of the decentralization policy is to facilitate economic growth and development by devolving powers, functions,
Words: 3387 - Pages: 14
Tutorial Tutorial Overview Welcome to NetCracker’s Tutorial. This seven-part tutorial is designed to: • introduce you to NetCracker Designer’s functionality, • familiarize you with the Graphical User Interface (GUI), • provide you with step-by-step instructions so you can create network designs. This tutorial uses four sample project files, which are included with your NetCracker Designer Software. While you can start at any point, it is recommended that you begin with Lesson 1
Words: 9909 - Pages: 40
IT 320 WAN Homework Unit 1 Vocabulary Exercise: Matching (Pg 3) Matching a) When referring to clocking, the CSU/DSU is this piece of equipment Data Circuit Terminating Equipment (DTE) b) The software used by a router Cisco IOS c) Dialup and ISDN are examples of these types of networks Circuit Switching d) Describes the timing between the router and the CSU/DSU Synchronous e) Lost when a device is powered down or rebooted Contents of RAM f)
Words: 1202 - Pages: 5
NETWORKING Victor P. Mangulabnan Director, Professional Services Division FYI… Ø 1 DAY TRAINING (Informal) Ø BREAK – Lunch Ø Mobile Phone – Off or Silent Mode Ø Raise a hand if there’s a question Ø Introduce yourself NETWORKING Group of Computers connected together by cables or some other medium. Is a connection of two or more components that gives people the ability to share software, peripheral devices, communicate with each other and share processing power. IS ALL ABOUT
Words: 2163 - Pages: 9
what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value
Words: 1186 - Pages: 5
principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. Chapter 1 2 3 4 5 6 7 8 9 10 11 Topic Exploring the Network Configuring a Network Operating System Network Protocols and Communications Network Access Ethernet Network Layer Transport
Words: 1022 - Pages: 5
A Case Project (Network Security Plan) - Acme Corporation Network infrastructure design for two campuses located in Atlanta and Cincinnati The following will be required • Unshielded Twisted Pair (UTP) Cables • Shielded Twisted Pair (STP) Cable • Coaxial Cable • Fiber Optic Cable • Cable Installation Guides • Unshielded Twisted Pair (UTP) Cable > In this network we will use CAT5 and CAT6 patch. These closets should be used in the server room of the location at Atlanta location
Words: 1177 - Pages: 5
CE3.15 I was in-charge of assuring the security for the network. I selected the network switch as the main device for configuring security as it acts as the heart of the network. I proposed the use of Cisco Network switches for the design. Although there are top selling network switches brands like Linksys, D-link, Netgear, Juniper networks available, I chose Cisco Catalyst 2960 series network switch. I decided that the routers were physically secured by providing a locker room facility and a video
Words: 898 - Pages: 4