How ICMP is used in ping and traceroute facilities

Answers were Sorted based on User's Feedback



How ICMP is used in ping and traceroute facilities..

Answer / partha

Internet Control Message Protocol (ICMP) pings and
traceroute on the PIX Firewall are handled differently
based on the version of PIX and ASA code.

Inbound ICMP through the PIX/ASA is denied by default.
Outbound ICMP is permitted, but the incoming reply is
denied by default.

** ASA/PIX does not support ICMP redirects, because it does
not support asymmetric routing

Is This Answer Correct ?    4 Yes 0 No

How ICMP is used in ping and traceroute facilities..

Answer / sachin

it is used in finding out the error message like if data
gram is not reaching to the destination.It is reliable
protocol as compared to Internet protocol.

Is This Answer Correct ?    2 Yes 0 No

How ICMP is used in ping and traceroute facilities..

Answer / hasan

ICMP works on
echo-request n echo-reply

in network communications devices echo-request/reply's open
open in network security devices echo-request/reply is
close as inbound traffic is restricted by default.

so by this process of echo-request n echo-reply the PING
and traceroute works and gives the information that the
channel is established.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What does protocol mean?

0 Answers  


what is the diffination of bandwidth.

2 Answers  


You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255 B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255 C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0 D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255

2 Answers  


How many valid host IP addresses are available on the following network/subnetwork? 176.12.44.161/30 A. 2 B. 30 C. 254 D. 16,382 E. 65,534

4 Answers   Cisco,


What is de-encapsulation?

0 Answers  






What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6

1 Answers  


Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric

2 Answers  


Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable

2 Answers  


Which of the following is an example of the Session Layer? A.) TCP B.) SQL C.) IP D.) X-Windows E.) Token Ring F.) LLC

2 Answers  


Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999

1 Answers  


Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network

2 Answers  


while trouble shooting a network conectivty prob a technician observes that steady link light on the both work stations nic and the switch port which the workstation is conected.however when the ping comand is issuede from the work station the out message is request time out at which layer of osi model does the prob most likly exist 1 sessiom layer protocol layer datalink kayer acess layer network layer application layer i have ansered n/w layer but i am niot sure i have also posted privous question jitendera kumar sinha

3 Answers  


Categories