Interesting thing happened on the Boson simlet
dazerski
Member Posts: 106 ■■■□□□□□□□
in CCNA & CCENT
In a nutshell, a simlet launched and basically PC1&3 could not talk to PC2&4 which were separated by two routers (A&B) over a serial link. the gateways were not configured and either was the serial link.
After my configurations, I could ping from PC1 to PC4 and PC2. That was the goal. I would click "show me the answer" and it kept saying INCORRECT.
Later I found out why it was saying I was wrong. the WAN link on Router A was using 10.1.1.114/30
The only other available address for Router B's link could be was 10.1.1.113. I was accidentally configuring it with the broadcast .115
If this was real-life scenario, that wouldn't have worked right?? When I accidentally had the serial interface configured with 10.1.1.15, PC1 would not be able to hit PC4 I would imagine. But the simlet let me and ping worked.
Weird...
I went and changed the ip to be 10.1.1.113 and then it changed to CORRECT. I still think the Ping should have failed unless I am missing something about broadcasts.
After my configurations, I could ping from PC1 to PC4 and PC2. That was the goal. I would click "show me the answer" and it kept saying INCORRECT.
Later I found out why it was saying I was wrong. the WAN link on Router A was using 10.1.1.114/30
The only other available address for Router B's link could be was 10.1.1.113. I was accidentally configuring it with the broadcast .115
If this was real-life scenario, that wouldn't have worked right?? When I accidentally had the serial interface configured with 10.1.1.15, PC1 would not be able to hit PC4 I would imagine. But the simlet let me and ping worked.
Weird...
I went and changed the ip to be 10.1.1.113 and then it changed to CORRECT. I still think the Ping should have failed unless I am missing something about broadcasts.
Comments
-
jezg76 Member Posts: 97 ■■□□□□□□□□IOS will help a brother out.
R2(config-if)#ip address 10.1.1.115 255.255.255.252 Bad mask /30 for address 10.1.1.115
policy-map type inspect TACO
class type inspect BELL
drop log