An user from the LAN is able to ping the default gateway of
the router and other sites in the internet. but not able to
ping only the google site, no acc list configured and no
firewall and no problem with DNS atall. What may be the
problem with router?
Answers were Sorted based on User's Feedback
Answer / sudheer.d
i Guess the Network Admin Configured a NULL route to Block
Google Site!
interface <Null interface>
!
ip route <ip address> <network mask> <Null Interface>
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / nitin sood
U HAVE TO ENABLE domain name loook up in the router.
u will be able to ping all the sites.
thanks
NITIN SOOD
09871212464
| Is This Answer Correct ? | 3 Yes | 1 No |
Answer / surya
If there is no acc list configured and no
firewall and no problem with DNS atall then could be the
issue with Google site.
1) At the same time need to check with other users
are they able to access google.com.
2) Ping google.com from wan router using lan
interface as source. e.g. Ping <ip add of google> source
<Lan interface>
Hope it will helps.......
Thanks
Surya
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
I hope you make use of google alot and have fun ,these
things will be noticed and tracked from Internet and the
number of hits on any site and if they find some irrelevant
or blocked information or confidential information is being
tracked by you then they will that particular port for
particular website on that particular system.They can make
out through logs on that particluar site who is making use
of that particular site for which information .If it is
highly confidential matter then they track the ip and
system name and will block access to site on that
particular port for that particular user .
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / adi
you should apply domain network lookup command or it could
be remote physical layer problem
| Is This Answer Correct ? | 1 Yes | 2 No |
Answer / muheed
does he using non route-able ip address with out nating?
| Is This Answer Correct ? | 1 Yes | 2 No |
Which two steps are part of the process of creating Frame Relay subinterfaces on a point to point connection? (Choose two) A. configure the router to forward all broadcast packets B. remove any network address assigned to the physical interface C. configure the local data link connection identifier (DICI) for the subinterfaces D. cartoon the total committed information rate (CIP) available among the subinterfaces
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
255.255.255.128/what is the n/w id ,broadcast id and the number of valid host(according to disco rules)
At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 Answers EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,
What does the meaning of interface 0/0?
Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
Which layer is responsible for identifying and establishing the availability of the intended communication partner? A.) Application B.) Presentation C.) Transport D.) Session E.) Network
Differentiate Logical Topology from Physical Topology
UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link
What is the function of the Application Layer in networking?
What is encapsulation and de-encapsulation?