What is proxy-ARP and how it is used and configured
Answer / jerald
Proxy ARP (RFC 1027) is a way to make a machine physically
located on one network appear to be logically part of a
different physical network connected to the same
router/firewall. Typically it allows us to hide a machine
with a public IP address on a private network behind a
router, and still have the machine appear to be on the
public network "in front of" the router. The
router "proxys" ARP requests and all network traffic to and
from the hidden machine to make this fiction possible.
Consider a router with two interface cards, one connected
to a public network PUBNET and one connected to a private
network PRIVNET. We want to hide a server machine on the
PRIVNET network but have it accessible from the PUBNET
network. The IP address of the server machine lies in the
PUBNET network, even though we are placing the machine on
the PRIVNET network behind the router.
By enabling proxy ARP on the router, any machine on the
PUBNET network that issues an ARP "who has" request for the
server's MAC address will get a proxy ARP reply from the
router containing the router's MAC address. This tells
machines on the PUBNET network that they should be sending
packets destined for the server via the router. The router
forwards the packets from the machines on the PUBNET
network to the server on the PRIVNET network.
Similarly, when the server on the PRIVNET network issues
a "who has" request for any machines on the PUBNET network,
the router provides its own MAC address via proxy ARP. This
tells the server to send packets for machines on the PUBNET
network via the router. The router forwards the packets
from the server on the PRIVNET network to the machines on
the PUBNET network.
The proxy ARP provided by the router allows the server on
the PRIVNETnetwork to appear to be on the PUBNET network.
It lets the router pass ARP requests and other network
packets in both directions between the server machine and
the PUBNET network, making the server machine appear to be
connected to the PUBNET network even though it is on the
PRIVNET network hidden behind the router.
| Is This Answer Correct ? | 5 Yes | 0 No |
Which protocol you manually enable route summarization?
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
What is the function of the Application Layer in networking?
What does the command show access-lists 101 list? A. all defended access lists B. all access lists within the router C. the contents of standard access list 101 D. the contents of defended access list 101
IPX traffic using different encapsulation types can go over the same data link A. true B. false
Given the global configuration commands: 'banner motd #' 'Hello #' When would the message be displayed? A.) The message of the day banner shows up before login. B.) The message of the day banner shows up during logoff. C.) These commands are not the right syntax for MOTD. D.) Message of the day banners are displayed upon entering global config mode. E.) Message of the day banners are not possible. F.) The message of the day would be, 'Hello #'
What is the diiffernce between windows xp & windows 2000?
6 Answers TCS, Trimax, Trymax, VigaTech,
Identify IPX GNS and it's purpose? A.) Go Network Server - sends a print job to a network server B.) Get Nearest Server - locate the nearest server C.) Guaranteed Network Services - allocates resources to users D.) Get Notes Server - locates Domino Server
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
Explain how an spf algorithm works?
How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route