Networking 202 Essay

971 Words4 Pages
iLab Grading Rubric
Category
Points
Description
Section 1
Performing Initial Router Startup—20 Points Total
Task 1: Step 17
Related Explanation or Response
Summary Paragraph

3
9

8

Paste the requested screenshot.
Provide the requested answer .

In your own words, summarize what you have learned about IP Subnetting and configuration.
Section 2
Enhancing the Security of Initial Router Configuration—20 Points Total
Task 1: Step 5
Related Explanation or Response
Task 1: Step 16
Related Explanation or Response
Task 1: Step 17
Related Explanation or Response
Task 1: Step 18
Related Explanation or Response
Summary Paragraph

1
2

1
2

1
2

1
2

8

Paste the requested screenshot.
…show more content…
Enhancing the security of routers is important to avoid unauthorized users change configuration settings and avoid unauthorized information and routing from entering. For instance, clear text authentication takes advantage of more flexible key management capabilities. Copy and paste the following screenshots from the Enhancing the Security of Initial Router Configuration lab below. Task 1, Step 5: Test your user mode and privileged mode passwords on R1 by exiting the router and logging back in. Once you are in user mode, access privileged mode. Take a screenshot of the output. (1 point)

Question: What is the most current command used to create the enable password? What makes it a better choice?
Hint: Read and study the explanations within the lab for assistance. (2 points)Cisco is the command used to create the enable password. Cisco is used to access the user mode through the console port but adding the login command helps safeguard the console port. Sanfran is the password for the login command.

Task 2, Step 16: Use a show command on R1 to verify the SSH settings. Take a screenshot of the output. (1 point)

Question: In addition to SSH, what other method of remote access was selected on step 15?
Hint: Read and study the explanations within the lab for assistance. (2 points)The other method was through telnet. A command using transport input telnet ssh forces admins to SSH into the device.

Task 5, Step 17:
Open Document