⚜Network Topology setup using Routing Table

Hello everyone,🙋‍♂️🙋‍♂️

Harshal Thakare
4 min readJan 4, 2021

In this blog, we will be demonstrating the working of network topology.

💻Task Description📄

🔰 Create a network Topology Setup in such a way so that System A can ping to two Systems System B and System C but both these systems should not be pinging each other without using any security rule e.g firewall etc .

📌Routing Table:
A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed. All IP-enabled devices, including routers and switches, use routing tables. See below a Routing Table:

The entry corresponding to the default gateway configuration is a network destination of 0.0.0.0 with a network mask (netmask) of 0.0.0.0. The Subnet Mask of default route is always 255.255.255.255 .

📌Entries of an IP Routing Table:
A routing table contains the information necessary to forward a packet along the best path toward its destination. Each packet contains information about its origin and destination. Routing Table provides the device with instructions for sending the packet to the next hop on its route across the network.

Each entry in the routing table consists of the following entries:

  1. Network ID:
    The network ID or destination corresponding to the route.
  2. Subnet Mask:
    The mask that is used to match a destination IP address to the network ID.
  3. Next Hop:
    The IP address to which the packet is forwarded
  4. Outgoing Interface:
    Outgoing interface the packet should go out to reach the destination network.
  5. Metric:
    A common use of the metric is to indicate the minimum number of hops (routers crossed) to the network ID.

🔰In this demonstration I have 3 system:

📌 A with IP 192.168.0.107

📌 B with IP 192.168.0.108

📌 C with IP 192.168.0.106

👁‍🗨Now let’s check if A is able to ping to B and C …..

👉In order to ping use the command ping

Here you can see A is able to ping B and C.

👁‍🗨Now let’s check if B can ping to A and C …..

Here you can see B can ping to A and C.

👁‍🗨Now let’s check if C can able to ping A and B …..

Here we can see C can ping A and B.

👉Now add the routing rule in B such that it will not be able to connect to C

In order to reject or block the C system IP, Use the command route add -host reject

Here you can see B is not able to ping C, it gives output no route to host.

👉In the same way add the routing rule in C such that it can not connect to B system IP.

👁‍🗨Now check if B can able to ping A and C …..

Here you can see B is able to ping A but not able to ping C, it gives output no route to host.

👁‍🗨Now check if C is able to ping A and B ……

Here you can see C is able to ping A but not able to ping B, it gives output no route to host.

👁‍🗨Now check for A is it able to ping B and C …..

Here you can see A can connect to both B and C….

So that how we can create Network Topology Setup in such a way so that System A can ping to two Systems System B and System C but both these systems should not be pinging each other without using any security rule e.g firewall etc .

Task is completed successfully !!!!🤩🙌

Thanks for Reading ❗❗

🔰Keep Learning ❗❗🔰Keep Sharing ❗❗

--

--

Harshal Thakare
Harshal Thakare

Written by Harshal Thakare

Arth Learner — LinuxWorld Informatics Pvt Ltd

No responses yet