I might have inadvertantly deleted your original email, therefore I copied Denis'
response to reply to you :) I have to laugh at the title of your email. I am not
laughing at you. I am laughing because I once had a Network General instructor who
would begin the class by asking if there were
For a pure packet blaster, you can use a tool such as the Sniffer and play back trace
files.
At my place of work, we use a tool called Smartbits by Netcom systems. It is a bit
more sophisticated than just playing back a trace file, as it measures such
characteristics such as latency and
Hi Jim,
Try Surf Control. It is a very comprehensive package for Web Monitoring and can even
(without being in-line) prevent users from going to specific sites (I think it sends a
TCP RST to the client).
It writes out to MSAccess databse format, so if the report you need is not there (I
Flow control is a pretty broad term. Some could argue that this is a transport layer
function but in actual practice and implementation the question is right.
Bridges do not provide congestive feedback or flow control, but routers certainly can.
Here is just some food for thought:
The data
There are probably access lists employed on the router (or intervening routers) that
deny ICMP echo requests or replies.
When you are telnet'd in, type show ip access-list or view the running configuration
(show run).
Tom Kager
___
UPDATED Posting Guidelines:
I am currently in the process of studying for it. Some much less motivated colleagues
say "Certification is worthless. What really matters is if you know how to do your
job" or "I don't have time to study".
I am pursuing this as it will lend further credibility to my resume and compliment (or
Respectfully,
I agree. When I first saw this post and the signiature I was in disbelief? A CCNA and
a CCDA should know this material. It irked me because I worked hard to become
certified and prefer not to see my certifications turn into paper. I also felt that
this was Edgar's chance to cut
Hi Everyone,
I have a need to block access to an application by geographic location on the
Internet...This would not likely be attempted through access lists, but probably
through firewalling technology such as Firewall-1
1) Can the domain name extension of an address be an accurate
Hi Bruce,
Yes. It is possible to configure 2 NICs in the same PC. You can also multinet (assign
both IPs to the same NIC without adding another physical NIC). Keep in mind though,
that NetBIOS will only bind to one of these logical interfaces. From the description
of what services you are
Essentially IP is responsible for addressing the packet so that it conveys information
about the location of the destination and therefore can be routed.
TCP is responsible for establishing and maintaining reliable communications. This
means that if TCP A sends data to TCP B and this data is
Brian,
I Hope that this is not a longer answer than you wanted, but here it goes:
From a generic sense, keepalive usually refers to a mechanism that ensures that an
established "connection" or "session" is still alive. It is used at different levels
in the OSI stack.
Here are some examples:
Fellow Victims,
As you may already know, Roosevelt Giles', All In One CCIE Study Guide is chock full
of misstatements and inaccuracies, such as mislabeled diagrams, and outright
inaccurate information.
Where is an erratum? I could understand the publisher saying that they no longer work
12 matches
Mail list logo