Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is firewall
how fiarewall work
how many interfaeces in the cisco pix 501 firewall
what is the working of that dmz interface

Answers were Sorted based on User's Feedback



what is firewall how fiarewall work how many interfaeces in the cisco pix 501 firewall what is ..

Answer / jitendera sinha

i know most of you are not awrae of the firewall
so i am providig the answers
firewall is a router type divice but not a rputer which act
as a boder betwenn externel network(LIKE internet)and
internel network that is private network
it act as a border in a such maneer that it doesnot allow
the unwanted trafic from out side to inside
there are two tye of firewall
s/w based (YOU HAVE ON YOUR WINDOWX XP CHECK IT OUT)
and hardwair bassed
like cisco sonicfirewall and more

ciscp [pix 501 is a cisco brand firewall and it have 3
interfaec
1 intside intrefafec -through that internel lan is conected
2 ouside interfae-thriugh thatexternel network is conected
3 one is dmz

i will expalin it latter till then i am waitng for your
reply now have give you introductio trying to find it all
interfaec working principle nither at last hera i am and
sudeep is there for helping all of us

Is This Answer Correct ?    1 Yes 1 No

what is firewall how fiarewall work how many interfaeces in the cisco pix 501 firewall what is ..

Answer / raj

The PIX Firewall protects an inside network from
unauthorized access by users on an outside network, such as
the public Internet. Most PIX Firewall models can
optionally protect one or more perimeter networks, also
known as demilitarized zones (DMZs). Access to the
perimeter network is typically less restricted than access
to the inside network, but more restricted than access to
the outside network. Connections between the inside,
outside, and perimeter networks are controlled by the PIX
Firewall.

All PIX Firewalls provide at least two interfaces, which by
default, are called outside and inside, and are assigned a
security level of 0 and 100, respectively.

Is This Answer Correct ?    0 Yes 0 No

what is firewall how fiarewall work how many interfaeces in the cisco pix 501 firewall what is ..

Answer / rohit

Sir i don't know the working of DMZ.
but i know what is DMZ

DMZ is stands for Demilitarized Zone(DMZ).
It is separated the network located in the neutral zone
between a private network and a public(outside) network.

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CCNA Interview Questions

Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification

1 Answers  


Explain the types of resource sharing?

0 Answers  


What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.

1 Answers  


Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root

5 Answers  


Can you explain different components in PKI?

0 Answers   CCIE,


Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP

3 Answers  


(1)what is "rtp" and how it work, (2)what is diffrence between igrp and eigrp (3)the slection prcedure of dr and bdr is depend open (4)why frame really is called nbma (5)what is ppp (6) what is diffrence b/w tcp and udp (7) how can we implement ospf protocall on any router (8)whta is as nomber (9)what is AD value (10)what is the broadcast id,n/w id and number of vallid host of the 255.255.255.128/25 195.168.10.10/25 (11) what is stub network (12) what is contigues n/w (13)on which type of router we can implement default routing (14)what is diffrence b/w hub switch;switch router, (15)what is v lan (16)what is the diffrence b/w link sate protocal and distance vector protocall (17)what is synchoransh mode of data transfer and asynchronash mode of data transfer (18) question on lab, belive me frnds there are 20 questions and 5 questions on lab implimentaion.around 1.1/2 hour i was in interview room and after givieng 17 right answera and 4 in lab i got slected try to give answer if any difficulty or any prob plz email me on jitenderasinha.it@gmail.com if any one of you havae boson netsim plz also intimate me

4 Answers  


What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF

5 Answers   HCL,


Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0

2 Answers  


The administrator of a comapny needs to ensure that a web server in their network is accessible from the Internet. Since the network uses private addressing, this requires an IP-to-registered-address mapping. The following command is entered on the router: router(config)# ip nat inside source static 192.168.2.1 198.18.1.254 After unsuccessful results from a ping to the Internet, the administrator issues the show ip nat translations command and the output is blank. What could be the problem with the NAT configuration for this mapping? A. The keyword overload is missing from the command. B. The administrator needs to define a NAT pool first. C. An access list must be defined to create static NAT translations. D. The interfaces need to be configured for NAT.

4 Answers  


Identify 3 Fast Ethernet technologies? A.) 100 Base FastEther B.) 100 Base FX C.) 100 Base T4 D.) 100 Base TX

2 Answers  


As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command? A. 6 B. 1 C. 2 D. 4

1 Answers  


Categories