I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
No Answer is Posted For this Question
Be the First to Post Answer
What are the different IPX access lists?
Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport
What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolution C.) Mac to IP address resolution D.) IP to Mac address resolution
Which of the following is a connectionless protocol at the Transport layer? A.) UDP B.) ARP C.) ICMP D.) RARP E.) IP F.) FTP
In stead of 0.0.0.0 wild card mask what you can write after ip?
Why is UDP lease favored when compared to TCP?
What is the function of Layer 2 Device?
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
On which layer does L2F, PPTP and L2TP operate?
The administrator of a comapny needs to ensure that a web server in their network is accessible from the Internet. Since the network uses private addressing, this requires an IP-to-registered-address mapping. The following command is entered on the router: router(config)# ip nat inside source static 192.168.2.1 198.18.1.254 After unsuccessful results from a ping to the Internet, the administrator issues the show ip nat translations command and the output is blank. What could be the problem with the NAT configuration for this mapping? A. The keyword overload is missing from the command. B. The administrator needs to define a NAT pool first. C. An access list must be defined to create static NAT translations. D. The interfaces need to be configured for NAT.
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Of the following characteristics, which apply to UDP? Connection-oriented Connectionless Error checking Low overhead Best-effort delivery