The following text is an example:Īuthorized access only. Use an appropriate banner text to warn unauthorized access. You can also use the show run command to view the passwords. How can you verify that both passwords were configured correctly?Īfter you exit user EXEC mode, the switch will prompt you for a password to access the console interface and will prompt you a second time when accessing the privileged EXEC mode. ![]() Step 3: Verify the password configurations for S1. Use class for the privileged EXEC mode password.Step 2: Configure the console and encrypted privileged EXEC mode passwords. Enter the correct command to configure the hostname as S1.Instructions Part 1: Perform a Basic Configuration on S1 and S2Ĭomplete the following steps on S1 and S2. When the IP addressing configuration is complete, you will use various show commands to verify the configuration and use the ping command to verify basic connectivity between devices. Then, you will implement basic connectivity by configuring IP addressing on switches and PCs. In this activity, you will first create a basic switch configuration. ![]() Part 3: Configure the Switch Management Interface Background Part 1: Perform a Basic Configuration on S1 and S2
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |