This document contains the output of configuring interfaces on a Cisco router. It shows:
1. The GigabitEthernet 0/0 interface being configured with IP address 192.168.0.130/26 and being brought up.
2. The GigabitEthernet 0/1 interface being configured with an invalid IP address and mask, then being brought up with no IP address configured.
3. Router interface, IP address, and configuration commands being entered to set up the router interfaces.
hello friend,
if you wannna to get more technology related vdeos go to Lij Amare Tube on youtube channel and subscribe to my youtube channel https://www.youtube.com/results?search_query=lij+amare+tube
this is simple code for vlan configuration
i think this is very important for compas students
hello friend,
if you wannna to get more technology related vdeos go to Lij Amare Tube on youtube channel and subscribe to my youtube channel https://www.youtube.com/results?search_query=lij+amare+tube
this is simple code for vlan configuration
i think this is very important for compas students
Christchurch Embedded .NET User Group - Introduction to Microsoft Embedded pl...christopherfairbairn
Part 1 of the first session of the newly formed Christchurch Embedded .NET User Group.
Introduces the range of embedded platforms and technologies offered by Microsoft. Covers the .NET Micro and Compact Frameworks as well as operating systems such as Windows Embedded CE and Windows Mobile.
Presented by Andrew Leckie, Bryn Lewis and myself.
Issuing the show version command on a Cisco network router displays hardware unique information. Review the output of the show version command on a router and try to locate the following information. The output gives you insight into the router’s capabilities, and overall gives you practice reading the output of many Cisco commands:
ARM Linux Booting Process
One must be wondering How this Embedded Devices come to life? What goes into this devices that will tune to users Commands. We are going to explain about Embedded Arm based devices in general as The ARM architecture is a widely used 32-bit RISC processor architecture. In fact, the ARM family accounts for about 75% of all 32-bit CPUs, and about 90% of all embedded 32-bit CPUs.
IMAGE CAPTURE, PROCESSING AND TRANSFER VIA ETHERNET UNDER CONTROL OF MATLAB G...Christopher Diamantopoulos
This implemented DSP system utilizes TCP socket communication. Upon message reception, it decides the appropriate process to be executed based on cases which can be categorized as follows:
1) image capture
2) image transfer
3) image processing
4) sensor calibration
A user-friendly MATLAB GUI, named DIPeth, facilitates the system's control.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The (Io)Things you don't even need to hack. Should we worry?SecuRing
The prevalence of computers in form of so called "smart" devices embedded in our everyday environment is inevitable. From pentester's perspective, the adjective "smart" at first glance can hardly be used to describe their inventors and ambassadors.
Based on a few examples (i.a. BTLE beacons, smart meters, security cameras...) I will show how easily "smart" devices can be outsmarted. Sometimes you don't even need any 'hacking' skills, or the default configuration is wide-open. But are we doomed? What are the conditions for real threat? Can the vulnerabilities be exploited anonymously and as easily as in web application? Where is the physical border the intruder would be likely to cross? The risks involved are usually different, but does it mean we don't have to worry? Are we sure how to use securely the emerging technology?
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
In the ever-evolving landscape of technology, enterprise software development is undergoing a significant transformation. Traditional coding methods are being challenged by innovative no-code solutions, which promise to streamline and democratize the software development process.
This shift is particularly impactful for enterprises, which require robust, scalable, and efficient software to manage their operations. In this article, we will explore the various facets of enterprise software development with no-code solutions, examining their benefits, challenges, and the future potential they hold.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaYara Milbes
Discover the transformative power of the WhatsApp API in our latest SlideShare presentation, "Top 7 Unique WhatsApp API Benefits." In today's fast-paced digital era, effective communication is crucial for both personal and professional success. Whether you're a small business looking to enhance customer interactions or an individual seeking seamless communication with loved ones, the WhatsApp API offers robust capabilities that can significantly elevate your experience.
In this presentation, we delve into the top 7 distinctive benefits of the WhatsApp API, provided by the leading WhatsApp API service provider in Saudi Arabia. Learn how to streamline customer support, automate notifications, leverage rich media messaging, run scalable marketing campaigns, integrate secure payments, synchronize with CRM systems, and ensure enhanced security and privacy.
10. (c) of the Commercial ComputerSoftware- Restricted
Rightsclause at FARsec. 52.227-19 and subparagraph
(c) (1) (ii) of the RightsinTechnical Data and Computer
Software clause atDFARSsec. 252.227-7013.
cisco Systems,Inc.
170 WestTasman Drive
San Jose,California95134-1706
CiscoIOS Software,C2900 Software (C2900-UNIVERSALK9-M),Version15.1(4)M5,RELEASE SOFTWARE
(fc2)Technical Support:http://www.cisco.com/techsupport
Copyright(c) 1986-2007 by CiscoSystems,Inc.
CompiledWed18-Jul-0704:52 by pt_team
Image text-base:0x2100F918, data-base:0x24729040
Thisproduct containscryptographicfeaturesandissubject toUnited
Statesand local countrylawsgoverningimport,export,transferand
use.Deliveryof Ciscocryptographicproductsdoesnotimply
third-partyauthoritytoimport,export,distributeoruse encryption.
Importers,exporters,distributorsandusers are responsiblefor
compliance withU.S.andlocal countrylaws.By usingthisproductyou
agree to complywithapplicable lawsandregulations.If youare unable
to complywithU.S.and local laws,returnthisproductimmediately.
A summaryof U.S. laws governingCiscocryptographicproductsmaybe foundat:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
11. If you require furtherassistance pleasecontactusby sendingemail to
export@cisco.com.
CiscoCISCO2911/K9 (revision1.0) with491520K/32768K bytesof memory.
ProcessorboardID FTX152400KS
3 GigabitEthernetinterfaces
2 Low-speedserial(sync/async) networkinterface(s)
DRAMconfigurationis64 bitswide withparitydisabled.
255K bytesof non-volatile configurationmemory.
249856K bytesof ATA SystemCompactFlash0(Read/Write)
--- SystemConfigurationDialog ---
Continue withconfigurationdialog?[yes/no]:n
PressRETURN to get started!
Router>enable
Router#configure terminal
Enter configurationcommands,one perline. End withCNTL/Z.
16. interface GigabitEthernet0/1
no ipaddress
duplex auto
speedauto
shutdown
!
interface GigabitEthernet0/2
no ipaddress
duplex auto
speedauto
shutdown
!
interface Serial0/3/0
ip address192.168.0.10 255.255.255.248
!
interface Serial0/3/1
no ipaddress
shutdown
!
interface Vlan1
no ipaddress
shutdown
!
routerrip
version2
17. network192.168.0.0
!
ipclassless
!
!
--More--
VLSM
Router 6
SystemBootstrap, Version15.1(4)M4, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2010 by cisco Systems,Inc.
Total memory size = 512 MB - On-board = 512 MB, DIMM0 = 0 MB
CISCO2911/K9 platform with 524288 Kbytesof main memory
Main memoryis configuredto 72/-1(On-board/DIMM0) bit mode with ECC disabled
ReadonlyROMMON initialized
program load complete,entrypoint: 0x80803000, size:0x1b340
program load complete,entrypoint: 0x80803000, size:0x1b340
IOS Image Load Test
___________________
DigitallySignedRelease Software
18. program load complete,entrypoint: 0x81000000, size:0x3bcd3d8
Selfdecompressingthe image :
########################################################################## [OK]
Smart Init isenabled
smart initis sizingiomem
TYPE MEMORY_REQ
Onboard devices&
bufferpools 0x022F6000
-----------------------------------------------
TOTAL: 0x022F6000
RoundedIOMEM up to: 36Mb.
Using6 percentiomem.[36Mb/512Mb]
Restricted Rights Legend
Use,duplication,or disclosure by the Governmentis
subjectto restrictionsas set forth in subparagraph
(c) ofthe Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights inTechnical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 WestTasman Drive
San Jose,California95134-1706
19. Cisco IOS Software,C2900 Software (C2900-UNIVERSALK9-M),Version15.1(4)M5, RELEASE
SOFTWARE (fc2)Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by CiscoSystems,Inc.
CompiledWed18-Jul-07 04:52 by pt_team
Image text-base:0x2100F918, data-base: 0x24729040
This product contains cryptographic featuresand is subjectto United
States and local country laws governingimport, export,transfer and
use.Deliveryof Ciscocryptographic products doesnot imply
third-party authority to import, export,distribute or use encryption.
Importers,exporters,distributors and usersare responsible for
compliance with U.S.and local country laws. By using this product you
agree to comply withapplicable laws and regulations.If you are unable
to comply with U.S.and local laws,return this product immediately.
A summary of U.S. laws governingCisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require furtherassistance please contact us by sendingemail to
export@cisco.com.
Cisco CISCO2911/K9 (revision1.0) with491520K/32768K bytesof memory.
Processor board ID FTX152400KS
3 GigabitEthernetinterfaces
DRAM configurationis 64 bitswide withparity disabled.
20. 255K bytesof non-volatile configurationmemory.
249856K bytesof ATA SystemCompactFlash 0 (Read/Write)
--- SystemConfigurationDialog ---
Continue withconfiguration dialog?[yes/no]:n
PressRETURN to get started!
Router>enable
Router#configure terminal
Enter configurationcommands, one perline. End withCNTL/Z.
Router(config)#interface GigabitEthernet0/0
Router(config-if)#noshutdown
Router(config-if)#ipaddress192.168.0.130 255.255.255.0
Router(config-if)#
%LINK-5-CHANGED:Interface GigabitEthernet0/0,changed state to up
%LINEPROTO-5-UPDOWN:Line protocol on Interface GigabitEthernet0/0,changedstate to up
ip address192.168.0.130 255.255.255.192
21. Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#noshutdown
Router(config-if)#ipaddress192.168.0.192 255.255.255.192
Bad mask /26 for address192.168.0.192
Router(config-if)#
%LINK-5-CHANGED:Interface GigabitEthernet0/1,changed state to up
%LINEPROTO-5-UPDOWN:Line protocol on Interface GigabitEthernet0/1,changedstate to up
no ip address
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#ipaddress192.168.0.193 255.255.255.192
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#noipaddress
Router(config-if)#ipaddress192.168.0.193 255.255.255.192
Router(config-if)#
23. program load complete,entrypoint:0x80803000, size:0x1b340
IOSImage Load Test
___________________
DigitallySignedRelease Software
program loadcomplete,entrypoint:0x81000000, size:0x3bcd3d8
Self decompressingthe image :
########################################################################## [OK]
Smart Initisenabled
smart initissizingiomem
TYPE MEMORY_REQ
Onboarddevices&
bufferpools 0x022F6000
-----------------------------------------------
TOTAL: 0x022F6000
RoundedIOMEMup to: 36Mb.
Using6 percentiomem.[36Mb/512Mb]
RestrictedRightsLegend
Use,duplication,ordisclosure bythe Governmentis
subjecttorestrictionsassetforth insubparagraph
(c) of the Commercial ComputerSoftware- Restricted
Rightsclause at FARsec. 52.227-19 and subparagraph
(c) (1) (ii) of the RightsinTechnical Data and Computer
24. Software clause atDFARSsec. 252.227-7013.
cisco Systems,Inc.
170 WestTasman Drive
San Jose,California95134-1706
CiscoIOS Software,C2900 Software (C2900-UNIVERSALK9-M),Version15.1(4)M5,RELEASE SOFTWARE
(fc2)Technical Support:http://www.cisco.com/techsupport
Copyright(c) 1986-2007 by CiscoSystems,Inc.
CompiledWed18-Jul-0704:52 by pt_team
Image text-base:0x2100F918, data-base:0x24729040
Thisproduct containscryptographicfeaturesandissubjecttoUnited
Statesand local countrylawsgoverningimport,export,transferand
use.Deliveryof Ciscocryptographicproductsdoesnotimply
third-partyauthoritytoimport,export,distributeoruse encryption.
Importers,exporters,distributorsandusersare responsiblefor
compliance withU.S.andlocal countrylaws.By usingthisproductyou
agree to complywithapplicable lawsandregulations.If youare unable
to complywithU.S.and local laws,returnthisproductimmediately.
A summaryof U.S. lawsgoverningCiscocryptographicproductsmaybe foundat:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require furtherassistance pleasecontactusby sendingemail to
export@cisco.com.
25. CiscoCISCO2911/K9 (revision1.0) with491520K/32768K bytesof memory.
ProcessorboardID FTX152400KS
3 GigabitEthernetinterfaces
DRAMconfigurationis64 bitswide with paritydisabled.
255K bytesof non-volatile configurationmemory.
249856K bytesof ATA SystemCompactFlash0(Read/Write)
--- SystemConfigurationDialog ---
Continue withconfigurationdialog?[yes/no]:n
PressRETURN to get started!
Router>enable
Router#configure terminal
Enter configurationcommands,one perline. EndwithCNTL/Z.
Router(config)#interface GigabitEthernet0/0
Router(config-if)#noshutdown
Router(config-if)#ipaddress192.168.0.1 255.255.255.0