13 hours 57 minutes
Hello and welcome back to I seen Do you want interconnecting Cisco Networking advice? Part one.
This is less than 2.3 introduction, configuring basics. Which management? I had Trenton Darryl, and I'm gonna be a structure for this course. And this lesson we're gonna be covering how to set up a cessation telling that
a little bit of counsel connections on the switch, how to secure those connections with usernames and passwords and how to set the management i p address on the interface for the switch.
So little about the lesson over here. And 2.32 we're gonna secure the switch with the user names and passwords. And 233 we're going to set up as this h tell. Not everyone could figure that remote interface for management. The last lesson. The word's gonna go quickly over some useful lab commands,
and I'll get us a pre assessment questions for this lesson. What do you think? The differences between the logging command and the log in local command in the lie configuration.
Give us a few seconds to think about it. Uh, I know we went over it a little bit a few previous lessons, so we'll see if you figure it out.
All right. Remember the log in command, You have to sit with a password command, and then the log in local, you will use the user name and password database.
All right, which of these is gonna be most secure on your switch?
Give it a few seconds to think about it. And I talked about it previously.
All right. Over you got enable secret. And then the random alphanumeric characters.
Password one is a very, very generic password.
And remember, password. The just command password is just a clear text password and a runny configure. This secret is MD five hashed.
And if you have a bunch of random alphanumeric characters, that is gonna be
much more difficult to actually crack because you can't use a dictionary for it
And the last pre assessment here, which what is the interface called that we're gonna set up the management I pee on.
All right. So you might not know this one. It is going to be a switched virtual interface or S p I.
You see, they're just throw. I seen you want, and I see Andy to the other three I just made up. They are
roughly correlated to similar stuff, but
the one that were in some arrangement I pee on is the FBI.
All right. In the next episode, we're going to secure the switch. See Ally, with usernames and passwords using that data base. Remember, guys,
let's get this lab going. Um, make sure you guys have the Gina's three set up or packet tracer, a home lab or using the press to practice labs
from Cyber Eri.
Um, I have some sort of lab environment is essential to success in this course.
I was always. If you have questions and need some help, feel free to shoot the message. It was. Look forward to seeing you next lesson.
This course will enable students to understand virtualization and cloud services, and network programmability related to LAN, access and core segments.