How to perform basic switch configurations-ccna, Computer Networking

Assignment Help:

How to Perform Basic Switch Configurations

Step : Complete basic configuration of switches S1, S2, and S3.

Configure the S1, S2, and S3 switches according to the following guidelines and save all your configurations:

  • Configure the switch hostname as indicated on the topology.
  • Disable DNS lookup.
  • Configure an EXEC mode password of class.
  • Configure a password of cisco for console connections.
  • Configure a password of cisco for vty connections.

 (Output for S1 shown)

Switch>enable

Switch#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

Switch(config)#hostname S1

S1(config)#enable secret class

S1(config)#no ip domain-lookup 

S1(config)#line console 0

S1(config-line)#password cisco

S1(config-line)#login

S1(config-line)#line vty 0 15

S1(config-line)#password cisco

S1(config-line)#login

S1(config-line)#end

%SYS-5-CONFIG_I: Configured from console by console

S1#copy running-config startup-config 

Destination filename [startup-config]?

 


Related Discussions:- How to perform basic switch configurations-ccna

Modern computer , modern technology in world of 21 century

modern technology in world of 21 century

Media, explain history of internet?

explain history of internet?

Linked list for parallel algorithms, Linked List A linked list is a dat...

Linked List A linked list is a data structure composed of zero or extra nodes linked by pointers. Each node consists of two parts, as shown in Figure: info field having specifi

Packet switching, Suppose there are exactly five packet switches (Figure 4)...

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

What are the tools sued for cryptography and web security, Q. What are the ...

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec

#title. Wireless broadband, Hi, i am a college student doing a report on wi...

Hi, i am a college student doing a report on wireless broadband. I needed to know user requirements of user groups ie: Home user Small Medium Large Businesses Things like w

Layering and tcp/ip protocols, TCP/IP protocols are managed into five basic...

TCP/IP protocols are managed into five basic layers. Although some layers of the TCP/IP reference model related to layers of the ISO reference model, the ISO layers procedure does

Write down code snippets for the following in jade, Question 1 Using a ...

Question 1 Using a flowchart and appropriate annotations, describe the execution path of an Agent in JADE 2 Write down code snippets for the following in JADE a Agent A n

What is the purpose of configuration files for servers, Question 1: a) ...

Question 1: a) Give three examples of Shells in Linux. b) Differentiate between the Join command and the Paste command in Linux, use an example to support your answer.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd