take a pen and copy before solving that question
there is a router name Ra
there is two switch sw1 and sw2
sw1 is coneceted through fa0/1 interface of router Ra
sw2 is conected through the fa1/1
serai interface of router s0/1 conected through the isp
with it ip address 192.168.1.1
now therer are three host conexted through the sw1 and
having ip
host1=10.1.2.1
host2=10.1.2.2
host3=10.1.2.3
now there is also 3ree host conected through switch 2 i.e
sw2 having ip
host4=10.1.1.1
host 5=10.1.1.2
host 6=10.1.1.3
now i think u have made corect confrigation.now questios is
started
network admin configure the Ra router in that fassion
Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255
Ra(config)#line vty 0 4
ra(config)#access-class 2 in
now question is that why should network admnistratoe do it
in this maneer
A to give access sw1 host to acess internet
B to prevent sw1 host from acessing comand promt
c to prevent sw2 host from accessing console of router ra
D to give sw2 host access to the enternet
e prevent sw1 host from accessing internet
f to prevent sw1 host from acessing the sw2 host network
isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6)
|
|
(sw1)------host 1,2,3
this is not exect digarm but help to derive the diagram
plz answer as soon as possible
Answer Posted / shahin
Check it out in packet tracer & let me knw...!!! If u r
unable to do the telnet of router from client command
prompt, thn ultimately u r unable to access the command
prompt of router as well.
U cn access the client command prompt as ur requirement, but
not router's command prompt.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is osi?
What does data packets consist of?
Which way of communication bus topology use?
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?
Utilizing RIP, what is the limit when it comes to the number of hops?
Which protocol used before part of ccna?
Mention what is the difference between the switch, hub, and router?
Explain on which interface we always apply access-list?
Define network?
Explain dhcp scope?
Differentiate Logical Topology from Physical Topology
Can you explain voluntary and compulsory tunnels?
How do we do encryption and authentication in L2TP?
What is the mac address?
How does RIP differ from IGRP?