Back to homepage

100-105 Part 9: Network Management

Answers: Config Archive 1

Answers: Config Archive 1

🕔09:10, 2.Jun 2016 This latest lab is actually pretty simple in terms of logic. The real trick is to get that first basic understanding of the archive feature in IOS, and then to remember the commands. Try for yourself first, and then come Read Full Article
Config Archive 1

Config Archive 1

🕔09:05, 1.Jun 2016 Even since the very first version of the CCNA R&S exam back in 1998, the exam topics included something that made people think that they needed to be ready to use the copy command to copy IOS files and config Read Full Article
Answers: CDP/LLDP 1

Answers: CDP/LLDP 1

🕔09:10, 31.May 2016   CDP and LLDP configuration does not require a lot of thought, but it does help to practice them until the configuration is automatic. Also, if you do the configuration on any kind of gear or simulator, make sure to Read Full Article
CDP/LLDP 1

CDP/LLDP 1

🕔09:05, 30.May 2016   #CDP has long been the default and favored protocol for a variety of device discovery functions, but LLDP offers an alternative as well. (LLDP is new to the exam topics per the May 2016 new CCENT and CCNA R&S Read Full Article
Answers: SCP 1

Answers: SCP 1

🕔09:10, 24.May 2016 SSH config? Detailed enough to forget a few steps. But once you have that down, can you remember the two other steps to add SCP support? And have you ever tried using SCP after configuring it? Today’s post gives you Read Full Article
SCP 1

SCP 1

🕔09:05, 21.May 2016 Secure Copy Protocol (SCP) can be used to copy files to/from a router. It can be a little difficult to understand because of its different model compared to the traditional use of the IOS copy EXEC command. With SCP, you Read Full Article
Answers: Protecting CLI Access 1

Answers: Protecting CLI Access 1

🕔09:10, 16.May 2016   How do you protect the CLI by preventing Telnet and SSH access, without matching every last interface IP address on a router? Today’s lab gives you a chance to explore and practice that configuration. Check the lab requirements in Read Full Article
Protecting CLI Access 1

Protecting CLI Access 1

🕔09:05, 13.May 2016   Routers support a method to filter incoming Telnet and SSH connections to that router. That method uses ACLs, but not to filter packets coming in each and every interface, but with a configuration method tied to the vty lines Read Full Article
Answers: Login Security 1

Answers: Login Security 1

🕔09:10, 3.May 2016 This lab asks you to work through a few login security options in IOS. Should be a quick and easy lab. Check out the requirements here first, and come back to this post for the answers. 50+ Short Sweet Lab Read Full Article
Login Security 1

Login Security 1

🕔09:05, 2.May 2016 One of the first configuration items that becomes second nature is the configuration of basic password settings. But it is also easy to forget about the small differences in password security configuration once you get used to configuring your own Read Full Article

Subscribe

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

Search

Categories