Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.
HCL,
3 5969HI friends. i need a suggestion and looking towards you foryours valuable suggestion friends i have completed ccna now i want to done red het linux system admnistration and networking i am liitle bit confuse betwwen them which one is better for me for job point of view reply soon waiting for your reply
1 3774What does a router change in a packet when it forwards a packet to the next hop? * A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address
10 20129from last ten days i watched that no any new questions are placed in ccna catogarey.so plz place the questions it is very use full to beginers like us
HCL,
2 4091friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall
IBM,
3 6025what is difference between 1 pap and chap(quite easy but need on line answer) 2 chap and ms-chap(plz describe briefly) now i have posted the question is there any one to help me?
2 8014which of the following address represent unicast address A 224.1.5.2 B ffff.ffff.ffff.ffff C 192.168.24.59/30 D 255.255.255.255 E 172.138.128.255 plz tell what should be answer plz tell with explanation
5 19856
What is passive topology in ccna?
What are the two types of transmission technology use in ccna?
Explain how many maximum paths you can give on latest ios in rip?
What are 10base5 ethernet lans?
When dr communicate with bdr which multicast ip it use?
Explain the types of communication in ipv6 ?
How do you configure a cisco router for routing ipx?
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
How do we do encryption and authentication in L2F?
What are the different IPX access lists?
In how many ways you can access router?
Is hub intelligent device?
Mention what is the matric of eigrp protocol?
How we can see mac address from dos prompt?
What is the virtual channel?