answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What three statements describe why Host1 and Host2 are unable to communicate?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Communications
Related questions

Refer to the graphic Five PCs are connected through a hub If host host1 wants to reply to a message from host Host2?

H1 sends a Uni-Cast message to H2, but the hub forwards it to all devices.


Which command will display RIP activity as it occurs on a router?

"debug ip rip" is the correct answer. Use to display information on selected RIP events. This command has many keywords that allow you to specify a variety of RIP events. You can set the level of severity for the events you want displayed; specify the desired descriptive term or a corresponding number (0-7). You can set the verbosity of the messages you want displayed: low, medium, high. Example host1#debug ip rip events Use the no version to cancel the display of any information on the designated variable.


What movie and television projects has Gert Scobel been in?

Gert Scobel has: Played himself in "III nach neun" in 1974. Played himself in "NDR Talk Show" in 1979. Played Host in "Kulturzeit" in 1995. Played himself in "Die Harald Schmidt Show" in 1995. Played himself in "Die Johannes B. Kerner Show" in 1998. Played himself in "Late Lounge: Club" in 1999. Played Himself - Host in "Delta" in 2004. Played Himself - Guest in "Harald Schmidt" in 2004. Played Himself - Host1 in "Delta" in 2004. Played Himself - Host in "Scobel" in 2008. Played himself in "Die Tietjen und Dibaba" in 2008. Played himself in "Die Harald Schmidt Show" in 2011.


Can you trace where a text was sent from?

Here's an abbreviated version of the answer from Ken Hollis and the alt.spam FAQ: To trace the e-mail you have to look at the header. Most mail readers do not show the header because it contains information that is for computer to computer routing. The information you usually see from the header is the subject, date and the "From" / "Return" address. About the only thing in an e-mail header that can't be faked is the "Received" portion referencing your computer (the last received). Unfortunately there is no "single" place to complain to about spam (or Unsolicited Commercial E-Mail). Complaints have to be directed to the correct ISP (Internet Service Provider) that the spam originated from. URL's to help you figure out how to look at the headers: http://support.xo.com/abuse/guide/guide1.shtml http://www.rahul.net/falk/mailtrack.html Also, please look through the body of the message for e-mail addresses to reply to. Complain to the postmasters of those sites also (see below for a list of complaint addresses). Assuming a reasonably standard and recent sendmail setup, a Received line that looks like: Received: from host1 (host2 [ww.xx.yy.zz]) by host3 (8.7.5/8.7.3) with SMTP id MAA04298 shows four pieces of useful information (reading from back to front, in order of decreasing reliability): * The host that added the Received line (host3) * The IP address of the incoming SMTP connection (ww.xx.yy.zz) * The reverse-DNS lookup of that IP address (host2) * The name the sender used in the SMTP HELO command when they connected (host1).


What is the function of line vty in router configuration?

Vty Line Authentication and AuthorizationThe system supports 20 virtual tty (vty) lines for Telnet, Secure Shell Server (SSH) and FTP services. Each Telnet, SSH, or FTP session requires one vty line. You can add security to your system by configuring the software to validate login requests. There are two modes of authentication for a vty line:Simple authentication - password-only authentication via the local configurationAAA authentication - username and password authentication via a set of authentication serversYou can enable AAA authorization, which allows you to limit the services available to a user. Based on information retrieved from a user's profile, the user is either granted or denied access to the requested server.Configuring Simple AuthenticationTo configure simple authentication: Specify a vty line or a range of vty lines on which you want to enable the password.host1(config)#line vty 8 13 host1(config-line)# Specify the password for the vty lines.host1(config-line)#password 0 mypassword Enable login authentication on the lines.host1(config-line)#login Display your vty line configuration.host1#show line vty 8 no access-class in data-character-bits 8 exec-timeout never exec-banner enabled motd-banner enabled login-timeout 30 seconds lineUse to specify the vty line(s) on which you want to enable the password.You can set a single line or a range of lines. The range is 0-19.Examplehost1(config)#line vty 8 13 Use the no version to remove a vty line or a range of lines from your configuration; users will not be able to run Telnet, SSH, or FTP to lines that you remove. When you remove a vty line, the system removes all lines above that line. For example, no line vty 6 causes the system to remove lines 6 through 19. You cannot remove lines 0 through 4.loginUse to enable password checking at login.The default setting is to enable a password.Examplehost1(config-line)#login Use the no version to disable password checking and allow access without a password.passwordUse to specify a password on a single line or a range of lines.If you enable password checking but do not configure a password, the system will not allow you to access virtual terminals.Specify a password in plain text (unencrypted) or cipher text (encrypted). In either case, the system stores the password as encrypted.Use the following keywords to specify the type of password you will enter:0 (zero) - unencrypted password5 - secret7 - encrypted passwordNote: To use an encrypted password or a secret, you must follow the procedure in Setting Basic Password Parameters earlier in this chapter to obtain the encrypted password or secret. You cannot create your own encrypted password or secret; you must use a system-generated password or secret.Example 1 (unencrypted password)host1(config-line)#password 0 mypassword Example 2 (secret)host1(config-line)#password 5 bcA";+1aeJD8)/[1ZDP6Example 3 (encrypted password)host1(config-line)#password 7 dq]XG`,%N"SS7d}o)_?YUse the no version to remove the password. By default, no password is specified.show line vtyUse to display the configuration of a vty line.Field descriptionsaccess-class - access-class associated with the vty linedata-character-bits - number of bits per character7 - setting for the standard ASCII set8 - setting for the international character setexec-timeout - time interval that the terminal waits for expected user inputNever - indicates that there is no time limitexec-banner - status for the exec banner: enabled or disabled. This banner is displayed by the CLI after user authentication (if any) and before the first prompt of a CLI session.motd-banner - status for the MOTD banner: enabled or disabled. This banner is displayed by the CLI when a connection is initiated.login-timeout - time interval during which the user must log in.Never - indicates that there is no time limitExamplehost1#show line vty 0 no access-class in data-character-bits 8 exec-timeout 3w 3d 7h 20m 0s exec-banner enabled motd-banner enabled login-timeout 30 seconds Configuring AAA Authentication and AAA AuthorizationBefore you configure AAA authentication and AAA authorization, you need to configure a RADIUS and/or TACACS+ authentication server. Note that several of the steps in the configuration procedure are optional. To configure AAA new model authentication and authorization for inbound sessions to vty lines on your system:Specify AAA new model authentication.host1(config)#aaa new-modelCreate an authentication list that specifies the type(s) of authentication methods allowed.host1(config)#aaa authentication login my_auth_list tacacs+ line enable(Optional) Specify the privilege level by defining a method list for authentication.host1(config)aaa authentication enable default tacacs+ radius enable(Optional) Enable authorization, and create an authorization method list.host1(config)aaa authorization commands 15 Boston if-authenticated tacacs+(Optional) Disable authorization for all Global Configuration commands.host1(config)#no aaa authorization config-commandsSpecify the range of vty lines.host1(config)#line vty 6 10 host1(config-line)# (Optional) Apply an authorization list to a vty line or a range of vty lines.host1(config-line)#authorization commands 15 BostonSpecify the password for the vty lines.host1(config-line)#password xyz Apply the authentication list to the vty lines you specified on your system.host1(config-line)#login authentication my_auth_listaaa authentication enable defaultUse to allow privilege determination to be authenticated through the TACACS+ or RADIUS server. This command specifies a list of authentication methods that are used to determine whether a user is granted access to the privilege command level.The authentication methods that you can use in a list include these options: radius, line, tacacs+, none, and enable.To specify that the authentication should succeed even if all methods return an error, specify none as the final method in the command line.Requests sent to a TACACS+ or RADIUS server include the username that is entered for login authentication.If the authentication method list is empty, the local enable password is used.Examplehost1(config)#aaa authentication enable default tacacs+ radiusUse the no version to empty the list.aaa authentication loginUse to set AAA authentication at login. This command creates a list that specifies the methods of authentication.Once you specify aaa new-model as the authentication method for vty lines, an authentication list called "default" is automatically assigned to the vty lines. To allow users to access the vty lines, you must create an authentication list and either:Name the list "default."Assign a different name to the authentication list, and assign the new list to the vty line using the login authenticationcommand.The authentication methods that you can use in a list include these options: radius, line, tacacs+, none, and enable.The system traverses the list of authentication methods to determine whether a user is allowed to start a Telnet session. If a specific method is available but the user information is not valid (such as an incorrect password), the system does not continue to traverse the list and denies the user a session.If a specific method is unavailable, the system continues to traverse the list. For example, if tacacs+ is the first authentication type element on the list and the TACACS+ server is unreachable, the system attempts to authenticate with the next authentication type on the list, such as radius.The system assumes an implicit denial of service if it reaches the end of the authentication list without finding an available method.Examplehost1(config)#aaa authentication login my_auth_list tacacs+ radius line noneUse the no version to remove the authentication list from your configuration.aaa authorizationUse to set the parameters that restrict access to a network.Use the keyword exec to determine if the user is allowed to run User Exec mode commands. The commands you can execute from User Exec mode provide only user-level access.Use the keyword commands to run authorization for all commands at the specified privilege level (0- 15). See Table 6-1 for a description of privilege levels.You can enter up to three authorization types to use in an authorization method list. Options include: if-authenticated, none, and tacacs+.Note: For information about TACACS+, see the ERX Broadband Access Configuration Guide, Chapter 4, Configuring TACACS+.Authorization method lists define the way authorization is performed and the sequence in which the methods are performed. You can designate one or more security protocols in the method list to be used for authorization. If the initial method fails, the next method in the list is used. The process continues until either there is successful communication with a listed authorization method or all methods defined are exhausted.Examplehost1(config)#aaa authorization execUse the no version to delete method list.aaa authorization config-commandsUse to reestablish the default created when the aaa authorization commands command was issued.After the aaa authorization commands command has been issued, aaa authorization config-commands is enabled by default, which means that all configuration commands in Exec mode are authorized.Examplehost1(config)#aaa new-model host1(config)#aaa authorization command 15 parks tacacs+ none host1(config)#no aaa authorization config-commandsUse the no version to disable AAA configuration command authorization.aaa new-modelUse to specify AAA new model as the authentication method for the vty lines on your system.If you specify AAA new model and you do not create an authentication list, users will not be able to access the system through a vty line.Examplehost1(config)#aaa new-modelUse the no version to restore simple authentication.authorizationUse to apply AAA authorization to a specific vty line or group of lines.Use the exec keyword to apply this authorization to CLI access in general.Use the commands keyword to apply this authorization to user commands of the privilege level you specify.You can specify the name of an authorization method list; if no method list is specified, the default is used.After you enable the aaa authorization command and define a named authorization method list (or use the default method list) for a particular type of authorization, you must apply the defined list to the appropriate lines for authorization to take place.Examplehost1(config)#line vty 6 host1(line-config)#authorization commands 15 sonnyUse the no version to disable authorization.lineUse to specify the virtual terminal lines.You can set a single line or a range of lines. The range is 0-19.Examplehost1(config)#line vty 6 10 Use the no version to remove a vty line or a range of lines from your configuration; users will not be able to run Telnet, SSH, or FTP to lines that you remove. When you remove a vty line, the system removes all lines above that line. For example, no line vty 6 causes the system to remove lines 6 through 19. You cannot remove lines 0 through 4.login authenticationUse to apply an authentication list to the vty lines you specified on your system.Examplehost1(config-line)#login authentication my_auth_listUse the no version to specify that the system should use the default authentication list.passwordUse to specify a password on a line or a range of lines if you specified the line option with the aaa authentication login command.If you enable password checking but do not configure a password, the system will not allow you to access virtual terminals.Use the following keywords to specify the type of password you will enter:0 (zero) - unencrypted password5 - secret7 - encrypted password


What is a possession?

A possessive noun is a noun indicating ownership, possession, origin or purpose. For example "the story of the witness" can be turned into "the witness's story".The possessive is shown by adding an apostrophe s ('s) to the end of a noun or just an apostorphe (') after plural nouns already ending in -s.Examples:the car of my mother = my mother's carthe teacher of our class = our class's teacherthe coats of the children = the children's coatsthe covers of the books = the books' coversthe meeting of the bosses = the bosses' meetingThe ladies' room does not belong to ladies, it means that it is designated for the use of ladies.A store that sells men's suits doesn't sell suits that belong to some men, it sells suits for men.A book of Shakespeare's plays are not plays that belong to Mr. Shakespeare, they are plays written by him.There are two types of possessive pronouns:Possessive pronouns are words that take the place of a noun that belongs to someone or something.The seven possessive pronouns are: mine, yours, hers, his, its, ours, theirs.Possessive adjectives are words that describe a noun as belonging to someone or something. Possessive adjectives are placed just before the noun they describe.The seven possessive adjectives are: my, your, his, her, its, our, their.Examples:The Browns live on this street. That house is theirs. (possessive pronoun)The Browns live on this street. That is their house. (possessive adjective)


What is the meaning of possession?

Meanings of POSSESSIVESense 1: In language, the case expressing ownership orpossession.Example: Mine, its and dog's are words that show possession.Sense 2: Strong feelings of ownership, unwillingness to share.Example: Small children are so possessive they will not let others play with their toys.Sense 3: Having or showing a desire to control or dominate another person.Example: Her possessive boyfriend tried to keep her away from her friends.


What is the answer to packet tracer 11.5.1?

Dirección IP:Máscara de subred#SubredPrimera dirección hostÚltima dirección hostBroadcast0198.133.219.0/24198.133.219.1198.133.219.14198.133.219.151198.133.219.16/24198.133.219.17198.133.219.30198.133.219.312198.133.219.32/24198.133.219.33198.133.219.46198.133.219.473198.133.219.48/24198.133.219.49198.133.219.62198.133.219.634198.133.219.64/24198.133.219.65198.133.219.78198.133.219.795198.133.219.80/24198.133.219.81198.133.219.94198.133.219.956198.133.219.96/24198.133.219.97/24198.133.219.110198.133.219.1117198.133.219.112/24198.133.219.1133198.133.219.126198.133.219.1278198.133.219.128/24198.133.219.129198.133.219.142198.133.219.1439198.133.219.144/24198.133.219.145198.133.219.158198.133.219.15910198.133.219.160/24198.133.219.161198.133.219.174198.133.219.17511198.133.219.176/24198.133.219.177198.133.219.190198.133.219.19112198.133.219.192/24198.133.219.193198.133.219.206198.133.219.207133198.133.219.208/24198.133.219.209198.133.219.222198.133.219.22314198.133.219.224/24198.133.219.225198.133.219.238198.133.219.23915198.133.219.240/24198.133.219.241198.133.219.254198.133.219.255¿Cantidad máxima de subredes utilizables (incluida la subred 0)? 16¿Cantidad de hosts utilizables por subred? 14Tarea 1: Configuración de las opciones de configuración global del router de CiscoPaso 1. Conecte físicamente los dispositivos.Conecte la consola o el cable de consola al puerto de consola en el router. Conecte el cable de conexión cruzada entre la tarjeta de interfaz de red (NIC) de la computadora host y la interfaz Fa0/0 del router. Conecte un cable de conexión directa entre la interfaz Fa0/1 del router y cualquiera de las interfaces del switch.Asegúrese de que se haya suministrado energía a la computadora host, al switch y al router.Paso 2. Conecte la computadora host al router a través del terminal PT.Haga clic en Host1 | Ficha escritorio | Terminal para iniciar el programa del terminal PT.Deje todos los valores predeterminados cuando haga clic en terminal.Paso 3. Configure las opciones de nombre de host de la configuración global.¿Cuáles son los dos comandos que pueden usarse para salir del modo EXEC privilegiado?exit , ex¿Qué comando directo se puede utilizar para ingresar al modo EXEC privilegiado? enableExamine los distintos modos de configuración que se pueden ingresar con el comando configure? Terminal, memory, networkTome nota de la lista de modos de configuración y la descripción. Desde el modo EXEC privilegiado, ingrese al modo de configuración global:router# configure terminal router(config)#¿Cuáles son los tres comandos que pueden usarse para salir del modo de configuración global y volver al modo EXEC privilegiado? control+z , exit, ex¿Qué comando directo se puede emplear para ingresar al modo de configuración global?ConfigureEstablezca el nombre de host del dispositivo en Router1:router(config)# hostname Router1 Router1(config)#¿Cómo se puede eliminar el nombre de host? No hostname router1Paso 4. Configure el banner MOTD.En las redes de producción, el contenido del banner puede tener un impacto legal significativo en la organización. Por ejemplo, si el mensaje es "Bienvenido", un tribunal puede interpretar que se ha otorgado permiso para que se acceda sin autorización al router. El banner debe incluir información sobre la autorización, el castigo por el acceso no autorizado, el registro de la conexión y las leyes locales vigentes. En la política de seguridad corporativa se debe incluir una cláusula sobre los mensajes del banner. Cree un banner MOTD adecuado. Sólo los administradores del sistema de la compañía ABC tienen acceso autorizado. Se penaliza todo acceso no autorizado y se registra toda la información de la conexión.Examine los diferentes modos de banner que se pueden ingresar. Tome nota de la lista de modos de banner y la descripción.Router1(config)# banner ?Elija un carácter de terminación que no se utilizará en el texto del mensaje. Configure el banner MOTD. El banner MOTD se muestra en todas las conexiones antes del aviso de inicio de sesión. Utilice el carácter de terminación en la línea en blanco para finalizar la entrada del MOTD:Router1(config)# banner motd % Enter TEXT message. End with the character '%' *** Unauthorized access is prohibited and will be prosecuted. *** % Router1(config)#¿Cuál es el comando de configuración global que se utiliza para eliminar el banner MOTD? No banner motdTarea 2: Configurar el acceso con contraseña al router CiscoLas contraseñas de acceso se configuran para el modo EXEC privilegiado y punto de entrada de usuarios, como consola, aux y líneas virtuales. La contraseña del modo EXEC privilegiado es la contraseña más crítica, ya que controla el acceso al modo de configuración.Paso 1: Configure la contraseña de EXEC privilegiado.El IOS de Cisco admite dos comandos que permiten el acceso al modo EXEC privilegiado. Un comando, enable password, contiene criptografía débil y no debe usarse nunca si el comando enable secret está disponible. El comando enable secret usa un algoritmo hash de criptografía MD5 muy seguro. Cisco sostiene que "Hasta ahora, es imposible recuperar una contraseña secreta de enable a partir del contenido de un archivo de configuración (aparte de los obvios ataques de diccionario)". La seguridad con contraseña se basa en el algoritmo de contraseña y la contraseña. En los entornos de producción, se deben usar contraseñas seguras en todo momento. Una contraseña segura consta de nueve caracteres como mínimo, en minúsculas y mayúsculas, intercalados con números y símbolos. En un entorno de práctica de laboratorio usaremos contraseñas débiles. Establezca la contraseña del modo EXEC privilegiado en class. Router1(config)# enable secret class Router1(config)#Paso 2: Configure la contraseña de consola.Establezca la contraseña de acceso a la consola en cisco. La contraseña de consola controla el acceso de la consola al router.Router1(config)# line console 0 Router1(config-line)# password cisco Router1(config-line)# login¿Cuál es el comando que se utiliza para eliminar la contraseña de consola? No password ciscoPaso 3: Configure la contraseña de línea virtual.Establezca la contraseña de acceso de línea virtual en cisco. La contraseña de línea virtual controla el acceso Telnet al router. En las primeras versiones de Cisco IOS, sólo se podían configurar cinco líneas virtuales, de la 0 a la 4. En las versiones de Cisco IOS más recientes, la cantidad ha aumentado. A menos que haya una contraseña Telnet, el acceso a esa línea virtual está bloqueado.Router1(config-line)# line vty 0 4 Router1(config-line)# password ciscoRouter1(config-line)# loginEmita el comando exit. ¿Qué indicador mostró el router? ¿Cuál es el modo?Router1(config)# Router1(config-line)# exitEmita el comando end. ¿Qué indicador mostró el router? ¿Cuál es el modo?Router1#Tarea 3: Configurar las interfaces del router CiscoPaso 1: Configure la interfaz Fa0/0 del router con la última dirección disponible de la segunda subred. (Subred 1 en la tabla de direcciones).Router1(config)# interface fa0/0 Router1(config-if)# description Connection to Host1 with crossover cable Router1(config-if)# ip address máscara de la direcciónRouter1(config-if)# no shutdown Router1(config-if)# end Router1#Look for the interface to become active: *Mar 24 19:58:59.602: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to upPaso 2: Configure la interfaz Fa0/1 del router con la última dirección disponible de la tercera subred. (Subred 2 en la tabla de direcciones). Router1(config)# interface fa0/1Router1(config-if)# description Connection to switch with straight-through cable Router1(config-if)# ip addressmáscara de la dirección Router1(config-if)# no shutdown Router1(config-if)# end Router1# Look for the interface to become active: *Mar 24 19:58:59,602: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to upPaso 3: Configure la computadora host.Configure la computadora host para conectividad LAN. Recuerde que para acceder a la ventana de configuración LAN hay que hacer clic en la PC en la ficha Escritorio y luego en Configuraciones IP. Complete los siguientes campos:Dirección IP: La primera dirección host en la segunda subred. (Subred 1 en la tabla de direcciones).Máscara de subred: La máscara de subredGateway predeterminado: La dirección IP FastEthernet 0/0 en el Router1Paso 4: Verifique la conectividad de la red.Use el comando ping para verificar la conectividad de la red con el router. Si las respuestas del ping no son exitosas, siga una resolución de problemas de la conexión:¿Qué comando IOS de Cisco puede usarse para verificar el estado de la interfaz? Show ip Interface brief¿Qué comando de Windows se puede utilizar para verificar la configuración de la computadora host? Ipconfig¿Cuál es el cable LAN correcto para conectar el host1 y el Router1? Conexio creuadaTarea 4: Guardar el archivo de configuración del routerCisco IOS se refiere al almacenamiento de la configuración de RAM como configuración en ejecución y al almacenamiento de la configuración NVRAM como configuración de inicio. Para que las configuraciones se mantengan luego de reiniciar o suministrar energía, la configuración RAM se debe copiar en la RAM no volátil (NVRAM). Esto no ocurre automáticamente; la NVRAM se debe actualizar manualmente luego de los cambios realizados.Paso 1: Compare las configuraciones de router de RAM y de NVRAM.Use el comando show de Cisco IOS para ver las configuraciones de RAM y de NVRAM.Escriba un posible comando directo que mostrará el contenido de NVRAM. Muestre el contenido de la NVRAM. Si falta el resultado de la NVRAM, se debe a que no se ha guardado ninguna configuración:Router1# show startup-config startup-config is not present Router1# Display the contents of RAM. Router1#show running-configUtilice el resultado para responder las siguientes preguntas:¿Qué tamaño tiene el archivo de configuración? 727 bytes¿Cuál es la contraseña secreta de enable? Class¿El banner MOTD contiene la información que ingresó antes? Si¿Las descripciones de la interfaz contienen la información que ingresó antes? SiEscriba un posible comando directo que mostrará el contenido de RAM.Paso 2: Guarde la configuración de RAM en la NVRAM.Se debe guardar la configuración manualmente en NVRAM para utilizarla la próxima vez que el router se encienda o recargue. Guarde la configuración de RAM en la NVRAM:Router1# copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK] Router1#Tome nota de un comando directo posible que copie la configuración de RAM en la NVRAM. Revise el contenido de la NVRAM y verifique que la configuración sea la misma que la configuración en RAM.Tarea 5: Configurar un switch CiscoLa configuración del switch Cisco IOS (afortunadamente) es similar a la configuración del router Cisco IOS. El beneficio de aprender los comandos de IOS es que son similares a muchos dispositivos y versiones de IOS diferentesPaso 1: Conecte el host al switch.Mueva la consola, o el cable de consola, al puerto de la consola en el switch. Asegúrese de que se haya aplicado energía al switch. En Hyperterminal, presione Ingresar hasta que el switch responda.Paso 2. Configure las opciones de nombre de host de la configuración global.Dependiendo del modelo del router y de la versión de IOS, su configuración puede verse ligeramente diferente. Sin embargo, no debe haber contraseñas configuradas. Si su router no tiene una configuración por defecto, pida al instructor que elimine la configuración. Desde el modo exec usuario, ingrese al modo de configuración global:Switch> en Switch# config t Switch(config)# Set the device hostname to Switch1.Switch(config)# hostname Switch1 Switch1(config)#Paso 3: Configure el banner MOTD.Cree un banner MOTD adecuado. Sólo los administradores de sistema de la Compañía ABC tienen acceso autorizado; el acceso no autorizado será penalizado y toda la información de conexión será registrada. Configure el título MOTD. El título MOTD aparece en todas las conexiones antes de la petición de inicio de sesión. Use el carácter de finalización en una línea en blanco para finalizar la entrada MOTD. Para obtener ayuda, revise el paso similar para configurar un título MOTD de router.Switch1(config)# banner motd % Advertencia de acceso autorizado solamente.%Paso 4: Configure la contraseña de EXEC privilegiado.Establezca la contraseña de EXEC privilegiado en class. Switch1(config)# enable secret class Switch1(config)#Paso 5: Configure la contraseña de consola.Establezca la contraseña de acceso a la consola en cisco.Switch1(config)# line console 0 Switch1(config-line)# password cisco Switch1(config-line)# loginPaso 6: Configure la contraseña de línea virtual.Establezca la contraseña de acceso de línea virtual en cisco. Hay 16 líneas virtuales que pueden configurarse en un switch del IOS de Cisco, de 0 a 15.Switch1(config-line)# line vty 0 15 Switch1(config-line)# password ciscoSwitch1(config-line)# login