Custom Network Topology Setup

Welcome to another article , Here I discuss and show you Interesting Networking Concept .

Here I am glad & confident to tell you , you will definitely learn something new from this article . 🔥🔥

Do you think 🤔💭 we Create a network Topology Setup in such a way System A can ping to two Systems System B and System C but both these systems should not be pinging each other without using any security rule e.g firewall etc .

So here we go …….

Pre-requisite * 3 VM ( Virtual Machine )

Q To find How Create a network Topology Setup ❓

In My Case* IP of System -A :- 192.168.43.251* IP of System -B :- 192.168.43.159* IP of System -C :- 192.168.43.51

→ First I will show you all 3 VM are connected each other

System - A is connected to System -B & System -C
  • Here you see that all are connected to each other

Q But our requirement is different

→ First we clean our route table run below mentioned command

route del -net 0.0.0.0route del -net <IP> gw 0.0.0.0 netmask <IP>
  • At that if you want to ping any IP it shows NETWORK IS UNREACHABLE

→ Now our requirement is System B & C Connect to System A

→ For this we have to add some rule which allow that particular IP`s but remember one point here I did`nt use any firewall rule .

If you want to System B & C Connect to System A use mentioned below command in SYSTEM -B & SYSTEM -C

route add -net <IP of system-A> netmask 255.255.255.255 enp0s3

→ Now again check route table

route -n

→ Check SYSTEM -C ping to SYSTEM -B or vice versa .

It shows Network is Unreachable

→ Then ping to System -A

System -A Successfully pinging

ping <IP of System B & C>
It shows Network is Unreachable
ping <IP of System A>
System -A Successfully pinging

Here you can see that System -A Successfully pinging .

* I tried my best to explain as much as possible. Hope You learned Something from here. Feel free to check out my LinkedIn profile and obviously feel free to comment and give feedback also .

* LINKEDIN PROFILE LINK :- https://www.linkedin.com/in/jatin-lodhi

* MEDIUM PROFILE LINK :- https://jatinlodhi.medium.com/

THANKS FOR EVERYONE TO READ THIS ARTICLE !!🤗

--

--

--

I am an IT Enthusiast, who is passionate about exploring/learn all the latest technologies from research perspective.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The difference between overloading and overriding in C#

Did you Know These 5 Pillars of AWS Well-Architected Framework?

CORS Error When Accessing NPPES NPI Registry?

json result

Operating Systems 101: Virtualisation — Process(i)

WANAKA Farm AMA — 27th Mar 2022

The Clone Method: How It Has Helped Me Learn Any Skill In Under 2 Months

Mindee — Blog — An API for my API?

Is OWASP Benchmark Any Good?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jatin Lodhi

Jatin Lodhi

I am an IT Enthusiast, who is passionate about exploring/learn all the latest technologies from research perspective.

More from Medium

Bypassing LDAP Channel Binding when LDAP Signing is not Enforced

58 — Securing DNS with Peter Lowe of DNSFilter

A step toward a more secure web collab tool for VTubers

Quick view of IBM Cloud Pak for Security (CP4S) — the next-genX SOC platform