Video – Cisco CCNA Training: How to wipe the configuration on your router

Home > Blogs > Cisco > Video – Cisco CCNA Training: How to wipe the configuration on your router

Video – Cisco CCNA Training: How to wipe the configuration on your router

Like This Blog 0 Mark Jacob
Added by October 13, 2011

In this DrillBit™ Video, Cisco Instructor Mark Jacob shows how to take an existing Cisco router and make it your own. Mark recommends that students should purchase existing Cisco hardware and setup a practice environment of their own. In this video, Mark shows you how to wipe the config files of a previously installed Cisco router.  Mark uses Tera Term to clear all previous configurations and reloads the device back to its original settings.

Upcoming live Cisco training at Interface Technical Training:
CCNA210: ICND1 – Interconnecting Cisco Networking Devices Part1
CCNA220: ICND2 – Interconnecting Cisco Networking Devices Part2

Is there a DrillBit™ Video you would like to see?
Let us know in the comments section below. If it’s a popular technical problem, we’ll make a DrillBit™ video with the solution.

Videos You May Like

Identifying and Fixing Misconfigured Subnet Masks in Your Network Environment

0 352 1

In this video, Cisco CCNA instructor Mark Jacob show how to find and fix misconfigured subnet masks in a typical IT network environment.   Mark Jacob Cisco and CompTIA Network + Instructor – Interface Technical Training Phoenix, AZ

Windows 10 Features and Navigation – December 1, 2015

0 114 1

In this recorded Windows 10 webinar from December 1,2015, Windows Instructor Steve Fullmer presents the navigation and some of the new features associated with Windows 10 including Sysinternals Tools for Windows Client, Windows core concepts, exploring Process Explorer as well as some of the features that are not yet ready for prime time but will … Continue reading Windows 10 Features and Navigation – December 1, 2015

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.