Playing with the Routing Table

Arnab Saha
3 min readMar 24, 2021

๐Ÿ”น In this blog, we will be demonstrating the working of network topology. ๐Ÿ”น

๐Ÿ”ฐ Create a network Topology Setup in such a way so that System A can ping to two Systems System B and System C but both these systems should not be pinging each other without using any security rule e.g firewall etc.

At first all the systems can ping each other. Letโ€™s verify that.

๐Ÿ‘‰๐Ÿป SystemA : Here, SystemA can ping to SystemB and SystemC

๐Ÿ‘‰๐Ÿป SystemB: Here, SystemB can ping to SystemA and SystemC

๐Ÿ‘‰๐Ÿป SystemC : Here, SystemC can also ping to SystemA and SystemB

So we can see all the systems are pinging each other.

Now lets check the routing table of System B and add the ip address of System C in reject list.

And do the same thing in System C with ip address of System B

๐Ÿ”น Now letโ€™s ping :

๐Ÿ‘‰๐ŸปSystemA : Here, SystemA can ping to SystemB and SystemC

๐Ÿ‘‰๐Ÿป SystemB: Here, SystemB can ping to SystemA but can not to SystemC

๐Ÿ‘‰๐ŸปSystemC : Here, SystemC can ping to SystemA but unable to ping SystemB

So the desired task is completed.

If you find it riveting please upvote it.

Connect with me on LinkedIn | GitHub

--

--