Question: Part 3 : Configure security measures.Step 1 : Verify that all unused ports are disabled.Router ports are disabled by default, but it is always prudent
Part : Configure security measures.Step : Verify that all unused ports are disabled.Router ports are disabled by default, but it is always prudent to verify that all unused ports are in an administratively down state. This can be quickly checked by issuing the show ip interface brief command. Any unused ports that are not in an administratively down state should be disabled using the shutdown command in interface configuration mode.Open configuration windowClose configuration windowStep : Verify that your security measures have been implemented correctly.Open configuration windowa. Use Tera Term on PCA to telnet to RQuestion:Does R accept the Telnet connection? Explain.Type your answers here.b Use Tera Term on PCA to SSH to RDoes R accept the SSH connection?Type your answers here.c Intentionally mistype the user and password information to see if login access is blocked after two attempts.Question:What happened after you failed to login the second time?Type your answers here.d From your console session on the router, issue the show login command to view the login status. In the example below, the show login command was issued within the second login blocking period and shows that the router is in QuietMode. The router will not accept any login attempts for more seconds.e After the seconds has expired, SSH to R again and login using the SSHadmin username and HAdm!n for the password.Question:After you successfully logged in what was displayed?Type your answers here.f Enter privileged EXEC mode and use $cisco!PRIV for the password.Question:If you mistype this password, are you disconnected from your SSH session after three failed attempts within seconds? Explain.Type your answers here.g Issue the show runningconfig command at the privileged EXEC prompt to view the security settings you have applied.Close configuration window
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
