Configure the logical topology - configure router1, Computer Networking

Assignment Help:

Configure Router1.

From Host1, connect to the console of Router 1 and establish a console session. Directions for creating a console connection using HyperTerminal are in Appendix 2. 

From the router console, configure the following: Enter the following commands on the router: 

Router>enable

Router#config term

Enter configuration commands, one per line.  End with CNTL/Z.

Router(config)#hostname Router1 

Router1(config)#enable secret class

Router1(config)#line console 0

Router1(config-line)#password cisco

Router1(config-line)#login

Router1(config-line)#line vty 0 4

Router1(config-line)#password cisco

Router1(config-line)#login

Router1(config-line interface fa0/0 )# 

Router1(config-if)#ip address 192.168.7.126  255.255.255.128

Router1(config-if)#no shutdown

Router1(config-if)#description connection to host1

Router1(config-if)#interface fa0/1

Router1(config-if)#description connection to switch1

Router1(config-if)#ip address 192.168.7.190 255.255.255.192

Router1(config-if)#no shutdown

Router1(config-if)#end

Router1#  

 


Related Discussions:- Configure the logical topology - configure router1

What do you mean by substitutional ciphers, Q. What do you mean by Substitu...

Q. What do you mean by Substitutional Ciphers? Substitutional Ciphers Monoalphabetic Substitution Polyalphabetic Substitution - Transpositional - character

Comparison and contrast between the osi and tcp-ip model, Q. Comparison and...

Q. Comparison and Contrast between the OSI and TCP-IP Model? This presentation would discuss a few comparison and contrast between the 2 main reference models which use the con

Client-server , We need to design and implement a secure conference system....

We need to design and implement a secure conference system. The system will allow users to connect to a conference server and to participate in a shared conversation. The conversat

What is intranet security, What is Intranet security Every company star...

What is Intranet security Every company starts its operations with a genuine and honest thinking. As time passes, based on the needs of its employees as well as customers, a nu

Tunnelling - point to point, Tunnelling To guarantee privacy for the  o...

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

Describe one security measure against reverse tunneling, Question: a) I...

Question: a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Introduction of dns - domain name server, Introduction of DNS While di...

Introduction of DNS While discussing about the Internet, one things comes automatically in the n=mind and hence it is directly or indirectly depended on DNS. The DNS which sta

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd