answersLogoWhite

0

1. console
2. Auxiliary
3. Telnet

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What are two logging methods?

There are three different types of logging methods. 1.clear-cutting 2.slective-cutting 3.shelter wood Thank you:)


What are the general methods for logging into an account?

General methods for logging into an account include providing a user name and password and also your email address to create an account with websites.


How do you setup a password on a wireless router through iPod touch?

by simply opening safari and logging into the website of your router's maker... example netgear.com cisco.com


What are the different types of logging?

There are currently three types of logging methods currently in use and they are Stem Only Harvesting (SOH) or tree-length logging, Whole Tree Logging (WTL) and finally cut-to-length logging.


10 What purpose does a hostname serve on a router?

provides device identification to users logging on remotely


What are a few general methods for logging into an account?

"When logging on to an account, you need to input your username, email address or client number into the appropriate box and then input your password."


What are the special processes that the route processor of a router performs?

Handling Broadcasts, Error Logging, Debug packet filtering, & SNMP processing


How can you tell what websites have been visited via your router?

Not all routers support logging of surfing history, only more expensive models do. You need to make sure that your router is capable of what you want. If it's not you have to live with what you have, or get a router which will satisfy your security requirements.


If someone connects to my wi-fi?

You can generally tell who has connected to your wi-fi by logging into your router. From there, you need to locate the DHCP clients list. (this is router specific). Do a google search for your brand of router to determine how to connect to it, what the default username/password are (if you have not set them yourself) and where the clients list is located.


Where do you find your WEP key?

You are able to find your wireless key by logging into your router. Under the tab "Wireless (Setup)" you will find your Wi-Fi password.


What commands would you use to see real-time errors or events on a router?

That depends on the brand and OS version of the router.For most versions of Cisco routers, the command to enable logging to the terminal isterminal monitorThis just allows log messages to be sent to the terminal. To actually start logging errors, use the commandlogging monitor errorTo end error logging, typeno logging monitorand to disable logging to the terminal, typeterminal no monitorHTH,Gdunge


What different methods are used in deforestation?

Different methods of deforestation include clear-cutting, selective logging, burning, and bulldozing. Clear-cutting involves removing all trees in an area, while selective logging targets specific tree species. Burning is often used to clear land quickly, and bulldozing involves pushing trees over and uprooting them.