I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring
When ip confliction accord in subnet which ip assigned automatically and what it called?
Identify the command that disables name-to-address translation? A.) Router(config-dns)# no ip domain-lookup B.) Router(config)# no address translation C.) Router(config)# no ip domain-lookup D.) Router(config)# ip domain-lookup
A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?
In port based access-list which command u give instead of ip?
What s the formula for metric of ospf?
Can you explain the difference between trusted and untrusted networks?
What is the default bandwidth of a serial connection? A.) 1200 baud B.) 1.544 Mbps (T1) C.) 10 Mbps D.) 96Kpbs
What is the link state routing protocol in the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP version 2
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability
how can we block remote desktop for some user from cisco router through aaccess-list