Please i dont understand why i have to assign ip add to fast interface. I said i am connected to the router through console cable. PLS MY QUES IS,HOW CAN I USE SDM TO CONFIGURE ROUTER CONNECTED TO THE SYSTEM THROUGH CONSOLE .
Step 3 If the username/password dialog is displayed, enter a level 15 username and password to launch SDM. After SDM launches go to Help > About SDM and check the SDM version number. If you have SDM version 1.1 or later, you can let SDM help you update to the latest files by clicking Tools > Update SDM > From Cisco.com. Follow the instructions in the displayed screens to update the SDM files on your router.
So - as per the above you have to a a connection to the device via IP over the LAN. The console cable DOES NOT transport any TCP/IP traffic, again if you had actually read the url you would have known this.
Good morning justkennie. If you are using the console cable you should be using the command line.
If you want to use SDM from your PC directly to the router then you need to use a cross over cable on your ethernet. Not the console cable or a regular ethernet cable. If you cannot make the cable yourself then order one online or check out Best Buy or Circuit city (I am not sure if they have some but I think I saw some there at one time.
Read the CCNA book for 644-802 by Todd Lammle or thru Cisco. I am sure you will find more info here on this site as well.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...