Playing with the Routing Table

🔹 In this blog, we will be demonstrating the working of network topology. 🔹

🔰 Create a network Topology Setup in such a way so that System A can ping to two Systems System B and System C but both these systems should not be pinging each other without using any security rule e.g firewall etc.

At first all the systems can ping each other. Let’s verify that.

👉🏻 SystemA : Here, SystemA can ping to SystemB and SystemC

👉🏻 SystemB: Here, SystemB can ping to SystemA and SystemC

👉🏻 SystemC : Here, SystemC can also ping to SystemA and SystemB

So we can see all the systems are pinging each other.

Now lets check the routing table of System B and add the ip address of System C in reject list.

And do the same thing in System C with ip address of System B

🔹 Now let’s ping :

👉🏻SystemA : Here, SystemA can ping to SystemB and SystemC

👉🏻 SystemB: Here, SystemB can ping to SystemA but can not to SystemC

👉🏻SystemC : Here, SystemC can ping to SystemA but unable to ping SystemB

So the desired task is completed.

If you find it riveting please upvote it.

Connect with me on LinkedIn | GitHub

Lifelong learning technologies

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store