Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.
HCL,
3 5835HI friends. i need a suggestion and looking towards you foryours valuable suggestion friends i have completed ccna now i want to done red het linux system admnistration and networking i am liitle bit confuse betwwen them which one is better for me for job point of view reply soon waiting for your reply
1 3676What does a router change in a packet when it forwards a packet to the next hop? * A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address
10 19901from last ten days i watched that no any new questions are placed in ccna catogarey.so plz place the questions it is very use full to beginers like us
HCL,
2 3974friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall
IBM,
3 5881what is difference between 1 pap and chap(quite easy but need on line answer) 2 chap and ms-chap(plz describe briefly) now i have posted the question is there any one to help me?
2 7914which of the following address represent unicast address A 224.1.5.2 B ffff.ffff.ffff.ffff C 192.168.24.59/30 D 255.255.255.255 E 172.138.128.255 plz tell what should be answer plz tell with explanation
5 19654
What are the types of communication in ipv6 ?
Tell me how much hold down time of eigrep protocol?
Value in which type of access list?
What are the two types of transmission technology use in ccna?
Tell me when we use extended access-list?
What is subnetting and why it is use?
Which protocol switch use for filling its mac-table?
Which command we give on privilege mode for coming back to user execution mode?
What are the advantages of a layered model in the networking industry?
Explain how many tables are in ospf protocol?
Explain how many ways to access router?
How do you go to privileged mode? How do you switch back to user mode?
What is the draw back of eigrp protocol?
What are the different types of passwords used in securing a CISCO router?
Define network congestion?