Seattle default gateway subnet mask slash notation G0/0 172.19.8.1 255.255.255.0 /24 G0/1 172.19.20.1 255.255.255.0/ 24 Serial 0/0/0 172.18.0.2 255.255.255.252/30 Serial 0/1/0 172.19.0.1 255.255.255.252/30 West Covina G0/0 -172.20.8.1 255.255.255.0/24 G 0/1- 172.20.20.1 255.255.255.0/24 Serial 0/0/0 172.19.0.2 255.255
Words: 308 - Pages: 2
details about the router or switch such as Model #, flash memory, RAM, IOS version and physical interfaces? a. Show version 2. During the Instructor’s TELNET session to LAN Switch 1 and LAN Switch 2, - What was the captured terminal password for LAN Switch 1 and LAN Switch 2? b. Cisco 3. What is the size of the IOS file used for the Cisco 28xx Routers? c. 239Kb 4. What is the command used to enter the global configuration mode for interfaces on a Cisco Router or Switch?
Words: 279 - Pages: 2
guidelines.Conduct LAN domain vulnerability assessments.7. Download of unknown file types from unknown sources by local users.B. Apply file transfer monitoring, scanning, and alarming for unknown filetypes and sources.8. Errors and weaknesses of network router, firewall, and network applianceconfiguration file.H. Conduct post configuration penetration tests of the layered security solutionwithin the LAN-to-WAN Domain. Test inbound and outbound traffic and fix any gaps.9. WAN eavesdropping.M. Use encryption
Words: 372 - Pages: 2
Routers A router is a network layer device responsible for routing traffic between subnetwork that make up a data internetwork . A subnetwork is defined as a collection of network resources that can be reached without needing to go through a router. A internetwork a collection of two or more subnetworks connected using routers. The role of a router is pretty simple. It receives packets transmitted by end stations and routes them through the internetwork to the right subnetwork. Routers can
Words: 369 - Pages: 2
set switches and routers are interconnected to from a Wide Area Network. The switches can be connected in different topologies. All remote users must follow the security requirements set forth in the standard for the company’s remote host accessing Information Technology Resources prior to such access, as well as any guidelines, procedures or other requirements issued by the Information Technology Department. Within the virtual private network multiple Virtual Private Network routers communicate securely
Words: 660 - Pages: 3
specific ports and protocols. In addition to securing the VPN server, I will configure it to help protect the intranet from direct attacks. If you configure the remote access server to provide network address translation, the server will act as an IP router that translates addresses for packets being forwarded between the intranet and the Internet. This way the remote access server helps provide NAT flexibility with security. I will be requiring connections to use L2TP, rather than PPTL. L2TP tunneling
Words: 349 - Pages: 2
(Northwest Branch2) necesitará 1000 direcciones IP de host. • Sección de red central • La LAN1 Central requerirá 8000 direcciones IP de host. • La LAN2 Central requerirá 4000 direcciones IP de host. • Los enlaces WAN entre cada uno de los routers requerirán
Words: 3116 - Pages: 13
hardware 2) Understanding Cisco router hardware Notes As you perform the various steps of the lab, update your lab report. You will send the lab report to your online instructor for evaluation after you quit the lab. Submit the following screenshots to your online instructor for evaluation: 1) A screenshot of the output from the show version command on NYACCESS1 2) A screenshot of the show version output on NYWAN1 showing how many serial interfaces this router has These screenshots map to
Words: 3375 - Pages: 14
03 May 2014 Networking Basics NETWORKS Networks are made up of a basic personal computer, network interface card (NIC), hub, switch, or router. NIC card communicates to the rest of the computer. The NIC card connects the modem to the computer electrically. The NIC has a logic board that relays information to the computer. The NIC card figures out the speed at which information is sent from the computer to the internet. The network can potentially use a hub. Although a hub is rarely
Words: 1141 - Pages: 5
application. 2.) Virtual Router Introduction Computers are the integral part of our life. One can not think of his/her life without the help of computers. Computer network has been playing important role in bringing the world closer due to its functionalities. Routers are the heart of computer network. Virtual Router is an attempt to automate all the functionalities of the physical router on the computer. Various institutes, offices can use virtual router to carry out the routing
Words: 1214 - Pages: 5