1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
4 years ago
3

Why must you use a console connection to initially configure the switch? why is it not possible to connect to the switch via tel

net or ssh?
Computers and Technology
2 answers:
andrey2020 [161]4 years ago
8 0
For a new switch, you must use console connection to initially configure it.

This is because, a new switch initially has no data and no IP address.
Both <span>telnet and ssh cannot be used to connect the new switch as they both require an IP address to establish the connection.</span>
Alex_Xolod [135]4 years ago
5 0

For a new switch, you must use console connection to initially configure it. This is because, a  new switch initially has no data and no IP address. Both telnet and ssh cannot be used  to connect the new switch as they both require an IP address to establish the connection.

Further Explanation:

When we buy a new switch, it is coming with this configuration: No IP address , No host  name, No default gateway (router) , No sub-net mask, No console password, No Telnet  password, No startup configuration, so you use the console connection to management ports and  IP addresses, password, remote control, in addition to that the Ethernet management ports are  used for out-of-band network management tasks.

“Best practice: At a minimum, you should set passwords for console and VTY access to secure  access through the console port and to enable and secure remote access through Telnet or SSH.  You have two main reasons to have several VTY access lines on a Cisco device:

  • Allowing you to connect to the switch and connect to another device from the switch:  Two VTY lines are needed in this case: one line to connect into the switch and another  line to connect out of the switch to another device.
  • Allowing several administrators to work on the switch: In large networks, more than one  administrator may manage the network. More than one administrator may need to  connect from a remote location to the same switch using Telnet or SSH. This is typical  with large core switches.”

Problem with Telnet and SSH

The problem with Telnet is it transmits the data in plain text.so it insecure for usage according to  security purpose. In contrast, SSH is the secure protocol replacement to Telnet and is used to  encrypt the communication between your administration system and the Cisco device you are  remotely connecting to. SSH can be used to encrypt all communication, including authentication  traffic.

Learn more:

  • Difference between switching and circuit switching brainly.com/question/12561463
  • What was the original rfc number that described telnet?

        brainly.com/question/2114528

Keywords: switch, telnet, SSH, Cisco, communication, encrypt

You might be interested in
1. I am a rectangle in a flowchart. What do I represent?
Strike441 [17]

Answer:

Down;

1.Parallelogram

3. Start

Across;

1. process

2.diamond

4. Flowchart

5. Arrow

Explanation:

3 0
3 years ago
On which tab can you find the margins button
insens350 [35]
In the tab key you alwAy use that to center
4 0
4 years ago
Read 2 more answers
What is a computer briage coures​
Stella [2.4K]

what's your choices for this question

4 0
3 years ago
What are the two basic literary forms?
Korolek [52]
Fiction and nonfiction
6 0
3 years ago
What are the chances that we are living in a simulation? (Percentage)
harkovskaia [24]
Round about 95% Chance to living in a Simulation
5 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Of which of the following is a box an example?
    10·2 answers
  • Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
    5·1 answer
  • Which country began expanding its borders with exploration in the late 16th<br>century?​
    15·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • How to wire two separate switches &amp; lights using the same power source?
    14·1 answer
  • We wish to design a decoder, with three inputs, x, y, z, and eight active high outputs, labeled 0, 1, 2, 3, 4, 5, 6, 7. There is
    5·1 answer
  • How long are most personal vision statements?
    13·1 answer
  • Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
    12·1 answer
  • PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regardi
    7·1 answer
  • How have cell phones improved our lives​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!