Showing 8 of 8 Blog Posts
Access control list is used for security on a Network from other Network. By this we restrict an IP or pool of IP to access a computer...
Router# conf terminal Router(config)# int e0 Router(config_if)# ip add 192.168.10.10 255.255.255.0 Router(config_if)# no shut Router(config_if)# exit Router(config)# int s0 Router(config_if)# ip add 1.1.1.1 255.255.255.0 Router(config_if)# no...
Configuration for EIGRP Router# conf terminal Router(config)# int e0 Router(config_if)# ip add 192.168.10.10 255.255.255.0 Router(config_if)# no shut Router(config_if)# exit Router(config)# int s0 Router(config_if)# ip add...
Configuration for IGRP: Router# conf terminal Router(config)# int e0 Router(config_if)# ip add 192.168.10.10 255.255.255.0 Router(config_if)# no shut Router(config_if)# exit Router(config)# int s0 Router(config_if)# ip add...
When we want to access a system or network which is laying on router 3. so we will access it statically as Router# conf terminal...
In Static routing the network administrator hand type the path for routing. As Router>enable Router# conf terminal Roter(config)# int e0 Router(config_if)# ip add 192.168.10.10 255.255.255.0 Router(config_ig)#...
It consistent VLAN configuration across all switches in the network.VLAN trunking over mixed networks, suck as Ethernet ATM LAN or even FDDI. It accurate tracking and monitoring...
Direct Access through Console port Access through LAN by Telnet SSH (source socket shell)application Step2. Access through Telnet To access the IOS of switch from LAN...