Ok for the life of me, i cannot figure this simple little thing out.
If I take a router(0), assign port se3/0 with the ip address 188.8.131.52
With which netmask? The interface configuration contain ip address *and* netmask.
and connect it to another router(1) se2/0 with the ip address 184.108.40.206
... should be configured with the same netmask than above. Which netmask?
and then i connect it's fa0/0 interface with ip address 192.168.1.1
then i connect a pc to that switch and give the pc fa0/0 interface ip address 192.168.1.2 with DG 192.168.1.1
Wnich netmask? Should be the same as on fa0/0 of the router ...
Why can the PC only ping the first router and not the second??
For a successful ping, you do have routing entries for the "ping target" on every device "on the way" from pinging host to the "ping target". In addition, the ping answer (which is sent from the ping target towards the pinging host) must reach the pinging host, and therefor the must be a route for the "pinging host! all along the way from the "ping target" to the "pinging host". If there is missing one of the routes on any of the devices, the ping will fail.
Thank you once again Percy!! You solved the issue.
Thank you so much for working with me.
I have even harder question now... forgive me!! =D
I am trying not to allow my isp to ping other networks. Only my public servers
I have created a nice ACL on the Building A router. It only allows 220.127.116.11/30 to ping 18.104.22.168/28.
I have applied this to SE 8/0 using : ip access-group 102 out
permit tcp any any established
permit ip host 22.214.171.124 any
permit ip host 126.96.36.199 any
permit ip host 188.8.131.52 any
permit ip host 184.108.40.206 any
permit ip host 220.127.116.11 any
deny ip any any
However, now none of my internal networks can ping the ISP..
What ACL entry do I need to use to allow them to connect ISP?r
***Ignore ACL 101*** this is for something else.
You must consider the effect of applying ACLs
If you mention the following: "Not to allow my isp to ping other networks. Only my public servers"
It means the public severs (18.104.22.168/28) can make ping to LAN ISP (192.168.1.0/24) and the another subnets can't make ping to your ISP. Remember, the communication is bidirectional
I applied another specific ACL on Building A
Router(config)#access-list 100 permit ip 22.214.171.124 0.0.0.15 any
Router(config)#access-list 100 deny ip any any
Router(config-if)#no ip access-group 103 in
Router(config-if)#no ip access-group 102 out
Router(config-if)#ip access-group 100 out