Command : tracert
Uses: Helps to identify problems in a network path between a sender and receiver. Trace route receives a reply from each router(hop) within a path. Here you can pinpoint where a connection may be misconfigured or failed
Examples:
-tracert www.bbc.co.uk
-tracert 192.168.0.10
Command : ping
Uses: Verifies connectivity between two devices. Using the ping command determines whether or not a host is reachable. Uses ICMP(Inernet Control Message Protocol) which is a layer 3 protocol.
Examples:
-ping www.bbc.co.uk
-ping 192.168.1.1
-ping 127.0.0.1 (this is a loopback address to ensure your network adapter on your PC/Laptop/Server is configured correctly for network communication)
Expected Results
Allows traffic to be forwarded without a specific route configured. Default routes are written as per the example below ;
0.0.0.0 0.0.0.0 fa0/0 (network / subnet mask / exit interface)
The routing configuation is specific, manually configured and link a point to another point. An example is below;
172.31.0.1 255.225.0.0 10.10.10.10.1 (network / subnet mask / next hop)
Dynamic routing is a type of routing that automatically updates routing tables in response to changes in the network topology. In dynamic routing, routers use routing protocols such as OSPF (Open Shortest Path First), RIP (Routing Information Protocol), and BGP (Border Gateway Protocol) to exchange routing information with other routers in the network. This type of routing is suitable for large networks that are subject to frequent changes in topology.
WIthin Cisco you can configure different passwords for different access levels. The msot basic is the example below. This configuration will ask for the password DOG after the enable command is inputted.
Router(config)#enable password DOG
If you test this and run the command show running-config at the Router level you will notice that the password is viewable in plaintext
If you run the command Router(config)#service password-encryption and now rerun show running-config you will see that the password is encrypted