what is firewall
how fiarewall work
how many interfaeces in the cisco pix 501 firewall
what is the working of that dmz interface
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
i know most of you are not awrae of the firewall
so i am providig the answers
firewall is a router type divice but not a rputer which act
as a boder betwenn externel network(LIKE internet)and
internel network that is private network
it act as a border in a such maneer that it doesnot allow
the unwanted trafic from out side to inside
there are two tye of firewall
s/w based (YOU HAVE ON YOUR WINDOWX XP CHECK IT OUT)
and hardwair bassed
like cisco sonicfirewall and more
ciscp [pix 501 is a cisco brand firewall and it have 3
interfaec
1 intside intrefafec -through that internel lan is conected
2 ouside interfae-thriugh thatexternel network is conected
3 one is dmz
i will expalin it latter till then i am waitng for your
reply now have give you introductio trying to find it all
interfaec working principle nither at last hera i am and
sudeep is there for helping all of us
Is This Answer Correct ? | 1 Yes | 1 No |
The PIX Firewall protects an inside network from
unauthorized access by users on an outside network, such as
the public Internet. Most PIX Firewall models can
optionally protect one or more perimeter networks, also
known as demilitarized zones (DMZs). Access to the
perimeter network is typically less restricted than access
to the inside network, but more restricted than access to
the outside network. Connections between the inside,
outside, and perimeter networks are controlled by the PIX
Firewall.
All PIX Firewalls provide at least two interfaces, which by
default, are called outside and inside, and are assigned a
security level of 0 and 100, respectively.
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / rohit
Sir i don't know the working of DMZ.
but i know what is DMZ
DMZ is stands for Demilitarized Zone(DMZ).
It is separated the network located in the neutral zone
between a private network and a public(outside) network.
Is This Answer Correct ? | 0 Yes | 2 No |
Windowing is a type of? A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
thnx Jitender singh...as u told to install a stp in switches and problem vil b get solved...i wanna kno how to install stp in switches?? plz tel me detailled steps... thanx for ur answer.
Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root
In which three situations is a hold down timer reset? (Choose three) A. when the hold down timer expires B. when infinity is finally defined as some maximum number C. when the router exchanges update summaries at area borders D. when the router detects faulty LSPs propagating through the internetwork E. when another update is received indicating a new route with a better metric F. when another update is received indicaing the original route to the network has been restored G. when the router receives a processing task proportional to the number of links in the internetwork
What is topology in ccna?
why we twist the cable in case of twisted pair cable?plz give me technical answer.
Identify 2 reasons for disabling CDP? A.) If the router is not configured for RIP B.) Save bandwidth by eliminating overhead C.) If the router is configured for Appletalk D.) When connected to a non-Cisco router
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
Which of the following are examples of the Network Layer? A.) Token Ring B.) LLC C.) SQL D.) IP E.) TCP F.) IPX
Which layer is responsible for routing through an internetwork? A.) Physical B.) Session C.) Network D.) Transport E.) Application F.) Data Link
Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255
WHAT IS RIP PROTOCAL ?