How ICMP is used in ping and traceroute facilities

Answers were Sorted based on User's Feedback



How ICMP is used in ping and traceroute facilities..

Answer / partha

Internet Control Message Protocol (ICMP) pings and
traceroute on the PIX Firewall are handled differently
based on the version of PIX and ASA code.

Inbound ICMP through the PIX/ASA is denied by default.
Outbound ICMP is permitted, but the incoming reply is
denied by default.

** ASA/PIX does not support ICMP redirects, because it does
not support asymmetric routing

Is This Answer Correct ?    4 Yes 0 No

How ICMP is used in ping and traceroute facilities..

Answer / sachin

it is used in finding out the error message like if data
gram is not reaching to the destination.It is reliable
protocol as compared to Internet protocol.

Is This Answer Correct ?    2 Yes 0 No

How ICMP is used in ping and traceroute facilities..

Answer / hasan

ICMP works on
echo-request n echo-reply

in network communications devices echo-request/reply's open
open in network security devices echo-request/reply is
close as inbound traffic is restricted by default.

so by this process of echo-request n echo-reply the PING
and traceroute works and gives the information that the
channel is established.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode

1 Answers  


Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share

2 Answers  


How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?

6 Answers  


MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation

4 Answers  


Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation

2 Answers  






Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup

2 Answers  


what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?

1 Answers  


Which statements are true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not at the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth

2 Answers  


what is stub router

11 Answers   Satyam,


What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards

1 Answers  


Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable

1 Answers  


Which command we use for ping in ipv6?

0 Answers  


Categories