Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How ICMP is used in ping and traceroute facilities

Answers were Sorted based on User's Feedback



How ICMP is used in ping and traceroute facilities..

Answer / partha

Internet Control Message Protocol (ICMP) pings and
traceroute on the PIX Firewall are handled differently
based on the version of PIX and ASA code.

Inbound ICMP through the PIX/ASA is denied by default.
Outbound ICMP is permitted, but the incoming reply is
denied by default.

** ASA/PIX does not support ICMP redirects, because it does
not support asymmetric routing

Is This Answer Correct ?    4 Yes 0 No

How ICMP is used in ping and traceroute facilities..

Answer / sachin

it is used in finding out the error message like if data
gram is not reaching to the destination.It is reliable
protocol as compared to Internet protocol.

Is This Answer Correct ?    2 Yes 0 No

How ICMP is used in ping and traceroute facilities..

Answer / hasan

ICMP works on
echo-request n echo-reply

in network communications devices echo-request/reply's open
open in network security devices echo-request/reply is
close as inbound traffic is restricted by default.

so by this process of echo-request n echo-reply the PING
and traceroute works and gives the information that the
channel is established.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic

1 Answers  


Which type for communication switch do?

0 Answers  


What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE

1 Answers  


Which command will copy the routers configuration from NVRAM to a Network file server? A.) copy start tftp B.) copy start tftp server C.) copy tftp startup-config D.) copy running-config tftp E.) copy startup-config tftp

1 Answers  


Mention what is the difference between tcp and udp?

0 Answers  


What is the maximum request timer?

0 Answers  


If bandwidth will increase what will happen?

0 Answers  


i want to ask one question that why u guys are not posting the questions is any thing wrong please post question for your and others including me knowledge

3 Answers  


Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free

1 Answers  


Explain why ip address called logical address?

0 Answers  


What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP

2 Answers  


How many collisions are caused by transmitting and receiving frames simultaneously in a full-duplex Ethernet technology? A. one B. two C. none D. several

1 Answers  


Categories