Difference between ip default-gateway command & a default route

Can any please let me know the difference between ip default-gateway command & a default route. i have a couple 4500 and 2950 for which i need to have a management VLAN as well as their VLAN memberships.

ip default-gateway command is for layer 2, it's how you can access a switch from outside the mgmt interface vlan. Think of this as you would configure and ip address on a PC or a end host, it needs a default-gateway.
A default route on the other hand is for a device that has a lauer 3 capability, this is the gateway of last resort for anything that the device receives to be routed and the destination is not in it's routing table it (the L3 device) sends it to the default route or gateway of last resort.
Since you are referring to 2950 which is strictly a layer 2 device, even if it take dafault route or "ip route 0.0.0.0 0.0.0.0 x.x.x.x", it will not work, for this device you need to configure default-gateway so that this switch can be reached outside it out subnet, this is given the default-gateway have routes to the rest of the network.
Please rate all posts.

Similar Messages

  • Difference between SAP NetWeaver Gateway 2.0 and SAP NetWeaver Gateway productivity accelerator for Microsoft

    Hi Experts ,
    Can anyone tell me the difference between SAP NetWeaver Gateway 2.0 and SAP NetWeaver Gateway productivity accelerator for Microsoft ?
    Best Regards,
    SK

    SAP  Netweaver Gateway 2.0 is a product for Exposing ERP data as OData for external consumption which is independent of any Microsoft product. Using this you can model OData services and Expose them for light weight consumption. You can use this in use cases where  you just want to consume the OData in some client or so, and you do not want any kind of accelerators to help you in development or in your integration.
    GWPAM is an interoperability framework from SAP that leverages SAP NetWeaver Gateway and Microsoft technologies enabling customers and partners to easily and quickly compose solutions that consume and extend SAP throughout Microsoft technologies for on premise and on demand deployment. With GWPAM you get components like
    GWPAM Visual Studio Add-On,GWPAM Template,GWPAM Project,GWPAM Outlook Add-In which are very much Microsoft specific.

  • Difference between InDesign Defaults file and InDesign SavedData file

    Hi,
    I would like to know (as written in the topic title) the difference between these 2 files. I know that preferences are stored in these files, but I need more accurate informations. I opened each in TextWrangler but, even if I understand some infos, I can't understand the function of each of these 2 files.
    Thanks!

    I can't provide all of the answers to this, but I do know that the open recent list is in SavedData, and all of the doc and print resets are in InDesign Defaults, along with your customized preference settings. Does that help?

  • Difference between Oracle Transparent Gateway and Golden Gate

    Hi Guys
    Could you please clear the confusion, What is the difference between Transparent gateway and Golden gate? are they same? In which situation which one to use?
    Thanks in advance

    user8896122 wrote:
    >
    Satish Kandi said :
    Transparent gateways are a cross-RDBMS "querying" mechanism
    >
    So you mean if an application (designed to work with oracle only ) can actually access SQL server or DB2 without any modificaton. If i am having transparent gateway on top of DB2 or SQL server ??You caught me. I should have used different words.
    No. TG is a mechanism to query other RDBMS from Oracle. GG is a mechanism to have replication between any RDBMS.

  • Difference between srvctl and crsctl commands

    may be I am wrong but I want to know what is the difference betweens stopping service using srvctl and crsctl utilities.
    ./crsctl stop resource <service.srv> –f
    ./crsctl stop resource ora.<service>.cs –f
    and
    srvctl stop service -d <database> -s <service>
    Also what is the <servicename>.cs ? I know service.srv and its purpose but .cs resource.
    Please share document or link wheren I can have more details of services.
    Thanks
    Bhanu

    931804 wrote:
    may be I am wrong but I want to know what is the difference betweens stopping service using srvctl and crsctl utilities.
    ./crsctl stop resource <service.srv> –f
    ./crsctl stop resource ora.<service>.cs –f
    and
    srvctl stop service -d <database> -s <service>
    Also what is the <servicename>.cs ? I know service.srv and its purpose but .cs resource.
    Please share document or link wheren I can have more details of services.
    In a very generic way, CRSCTL commands would require a sudo access and the SRVCTL can be run by the grid or oracle user. I haven't checked the docs but as a guess, the +.cs+ would be cluster service as in RAC, everything runs as a service and in 11.2 as a resource.
    HTH
    Aman....

  • Trying to figure out difference between Access Point & Gateway

    Hello All,
    I am trying to figure out how to expand my home network and getting confused by the terms. The following is what I have for equipment"
    WRT 130N
    WRT 54GS
    4 hard wired assorted items hard wired to the 130N
    Here is what I want to do and not sure if I can do it:
    I would like to use the wireless side of the 54GS to connect to the wireless side of the 130N. By [lacing the 54GS on a different floor of our home  we will have four more hard wire ports to utilize for addition hardware we want to network.
    My questions are as follows:
    Is there a way that using the firmware in the 130N & 54GS to do this> The 54GS is V.7 and the 130N is only about six months old so it's the most current firmware. I am completely confused as to what the difference is between a gateway and an access point.
    Today was spent reading everything on the net about after market upgrades and in the end I am only more confused.
    Can anyone offer me some advise or guidance?
    Thanks,
    Ted

    access point:
    A device that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network.
    gateway:
    A device that interconnects networks with different, incompatible communications protocols
    Analyzing the network environment that you want to create, is it?
    1. wrt130N )))))                                    (((((  wrt54gs  ))))                              ((((( 4 devices 
    2. wrt130N )))))                                    (((((  wrt54gs ----------------------------------------- 4 devices
    If it is figure 1. it is not possible, neither  figure 2. to  get it working that way, because wireless routers can only function as a wireless router, wired router and an access point.
    What you can do though is :
     wrt54gs- at least fw: 7.50.5   ))))))             ((((( wap54g - in repeater mode -  ))))))            (((((( pc
     wrt54gs- at least fw: 7.50.5   ))))))             ((((( wap54g - access point client mode- wrt130n - dhcp disabled  --------------------- 4 devices
    Take note though that wrt54gs has not been know to work with wpa54g access access point client mode
    Your best bet is to just wire wrt130n to wrt54gs and change the ip address of the latter to i.e. 192.168.5.1.
    " I can do all things through Christ which strengthens me. "

  • Differences between Linux and Solaris command set

    Hi,
    It is complicated to learn Solaris? Is the set of commands the same of Linux?
    It is because is more simple for me to find a Linux Admin book than a Solaris book.
    Thanks.
    Lorenzo

    BTW: You might want to start with this peace if information:
    http://wwws.sun.com/software/whitepapers/linux/linux_overview.pdf
    One remark: this Blue/white paper is written for audience known to Solaris and new to Linux, but usefull the other way around.
    Specially table 1 is very usefull !
    Good luck, and Welcome as new Solaris Administrator.
    Eric.

  • Difference between DESCRIBE TABLE..... and  SY-DBCNT

    Hi,
    i want to know the difference between DESCRIBE TABLE.. command and SY-DBCNT.

    hi
    good
    SY-DBCNT->
    SY-DBCNT gives the number of records in database table
    After an open SQL statement, the system field sy-dbcnt contains the number of database lines processed.
    REPORT ychatest.
    DATA : v_matnr LIKE mara-matnr.
    SELECT matnr FROM mara INTO v_matnr UP TO 1 ROWS.
    ENDSELECT.
    WRITE : sy-dbcnt.
    DESCRIBE->
    DESCRIBE LIST
    The DESCRIBE LIST statement allows you to import certain list attributes, such as the number of lines or pages, into program variables.
    you need to know the attributes of list levels that were not stored in system variables during list creation, you can use the DESCRIBE LISTstatement.
    To retrieve the number of lines or pages of a list, use:
    DESCRIBE LIST NUMBER OF LINES|PAGES n ...
    To get the page number of a particular line number, use:
    DESCRIBE LIST LINE lin PAGE pag ...
    To get the properties of a particular page, use:
    DESCRIBE LIST PAGE pag ...
    Use DESCRIBE LIST for completed lists only, since for lists in creation (index is sy-lsind) some properties are not up to date.
    http://help.sap.com/saphelp_nw70/helpdata/en/9f/dba42335c111d1829f0000e829fbfe/content.htm
    thanks
    mrutyun^

  • Difference between WEP, WPA, and WPA2 and better suggestion to use for shared family users

    What is the difference between WEP, WPA, and WPA2? My router is set up on my family PC and connected to a modem so I access Wi-fi through my laptop and my sister has a laptop too and uses our family network to get internet. I just set up a WPA today, so will we all be able to get internet (along with my family using the pc, and my sis on her laptop, even at the same time) protected? (like nobody else using our network)

    Wired Equivalent Privacy, commonly called WEP is 802.11's first hardware form of security where both the WAP and the user are configured with an encryption key of either 64 bits or 128 bits in HEX. So when the user attempts to authenticate, the AP issues a random challenge. The user then returns the challenge, encrypted with the key. The AP decrypts this challenge and if it matches the original the client is authenticated. The problem with WEP is that the key is static, which means with a little time and the right tool a hacker could use reverse-engineering to derive the encryption key. It is important to note that this process does affect the transmission speed.
    WPA builds upon WEP, making it more secure by adding extra security algorithms and mechanisms to fight intrusion.
    WiFi Protected Access (WPA) is the new security standard adopted by the WiFi Alliance consortium. WiFi compliance ensures interoperability between different manufacturer’s equipment.WPA delivers a level of security way beyond anything that WEP can offer, bridges the gap between WEP and 802.11i networks, and has the advantage that the firmware in older equipment may be upgradeable.
    WPA2 is based upon the Institute for Electrical and Electronics Engineers’ (IEEE) 802.11i amendment to the 802.11 standard, which was ratified on July 29, 2004. The primary difference between WPA and WPA2 is that WPA2 uses a more advanced encryption technique called AES (Advanced Encryption Standard), allowing for compliance with FIPS140-2 government security requirements. 

  • Difference between keep pool Vs Recycle pool vs  Default pool

    Good Morning experts ;
    I need some differences between Keep pool Vs Recycle pool vs  Default pool.
    How it acts differ from each other.
    Thanks in advance ..

    8f953842-815b-4d8c-833d-f2a3dd51e602 wrote:
      Thanks for your answer  MARG.
    If i  pin  an object into shared pool , entire object ( all blocks) comes under into  buffer pool.
    but you say depending on the query plan ,
    Oracle will place only portions of objects into the buffer cache at any one time.
    Example :
    >> TO pin a table
    SQL> alter table emp  storage (buffer_pool keep);             
    This table having  1 million record and it contains 'n' of columns.
    Consider  i need o/p  from name , emp_id, salary columns only.
    i.e. who are getting salary more than  8000$.
    Oracle will show required o/p. As per your explanation , i cant guess  ..
    Question :  how oracle will place only portions of objects into the buffer instead of entire object ?
    Please elaborate little more .
    Oracle uses blocks.  The rows are in blocks.  When you ask for a column in a row, Oracle has to get the block.  When you ask for a couple of columns from many rows, Oracle has to get many blocks.  Oracle makes copies of blocks.  Oracle has to manage possibly many people accessing the same  or different rows in those blocks.  Each one needs to have the block appear as though it did when the transaction started.
    Oracle has many ways to get the blocks.  It can look in the SGA, if an appropriate one is not there it can read it from disk, or it may decide to read many blocks at once from a disk, or it could even decide to just read as much as it can into a user's PGA, perhaps also going to undo in any of those ways to make a read consistent copy for the user.
    So when you look at statistics for a session, you might see sequential gets or scattered gets.  The former is often from index access, then a single block is gotten from wherever, and placed in the SGA.  The latter is often from scanning, and the blocks are scattered about, as they aren't necessarily going to be gotten in an order.  Remember, an Oracle block may be a number of operating system blocks, and a multi[-oracle]-block read may be a lot of data.
    So, with all these blocks going into the SGA, it has to decide what stays and what goes.  It uses a least-recently-used (LRU) algorithm to eject blocks, and may read blocks into the middle or the end of the list, depending.  That's why the default buffer pool works so well, anything continually accessed will in the grand scheme of things be kept hot and stay there.  When SGA's were much smaller, it was a lot easier to have not-quite-so-hot things get ejected and written out, only to be read in soon after, so the alternate pools would allow those places to be kept, or recycled, as arbitrarily defined.
    So think of blocks as the portion of objects in the SGA.  There usually are multiple copies of blocks.

  • Difference between Firefox Options and Firefox default stylesheet

    I understand the concept of UA stylesheets. But I'm confused about the difference between a UA stylesheet and Firefox options.
    To clarify - I know I can change the font face, size and colour in Firefox but those changes do not appear in Firefox's default stylesheet html.css.
    If I check my changes in Firebug, the element changes are shown in the computed tag. So, for example, if I change the font size to 20px and the colour to Maroon, and then click the <p> element in Firebug then click computed, those changes are shown. But when I open the Firefox stylesheet, they are not shown. What I would like to know is where those amended stylesheets are stored on my computer and how they affect the cascasade.

    Thank you for your response. I just need a bit more clarification. I've created a page with no author stylesheet therefore the page is being styled using the default html.css. If, for example, I change the font size on my computer to 32px via Tools>Options>General - that stays changed for every visit thereafter and for every site I visit thereafter (where the text is sized using a relative unit of measure).
    What I would like to know is where is that local change being saved - is it being saved as a style for p or body elements in a different css file? It does not appear in the html.css stylesheet but it must be save somewhere. My understanding, therefore, is that my unstyled page is being styled by html.css plus a local styled generated through options. Sorry, I know I'm being pedantic on this - I've developed an understanding block on this.

  • 1. What's the difference between private mode in Safari which i have to turn on every time again when opening safari. It's a two click activity which i would love to be able to set in the preference as default.

    1. What's the difference between private mode in Safari which i have to turn on every time again when opening safari.
    It's a two click activity which i would love to be able to set in the preference as default. It's tyering when have to do it everyday a few times. (Yes, i'm one of many who have the "i like safari but since the update crash everyday a few times" syndrome...
    Yes, i have updated my system.
    Yes, i have repared disk permissions with disk utility.
    Am open for any other help in both cases. Thank you upfront
    2. and the "tell websites not to track me" under Safari - Preference - Privacy.

    That box should prevent websites using trackers to log your movements on the Web to benefit advertisers. I have no idea if it does.
    Safari can keep your browsing history private. When you turn on private browsing, Safari doesn’t remember the pages you visit, your search history, or your AutoFill information, so your partner cannot see where you have been, but you must also remember to also turn off acceptance of cookies.
    In all other respects Private Browsing is not as private as you might think:
    http://www.switchingtomac.com/tutorials/how-to-make-safaris-private-browsing-fea ture-actually-private/
    http://www.insanely-great.com/news.php?id=9054
    and then Apple's own advice from here: http://www.apple.com/pro/tips/privacy_safari.html
    "Note that the Private Browsing option does not prevent Safari from collecting cookies (the preference files automatically generated by many websites). The Reset Safari option clears all cookies. If you want to delete only certain ones, choose Preferences from the Safari menu, click the Security tab, and then click Show Cookies. You can select and delete individual cookies from the list that appears. Careful, though — if you’re a frequent web user, this list can be very, very long."
    which is itself incomplete, the relevant part being 'If you want to delete only certain ones.
    To that end it is useful to have Safari Cookies installed, which is the only cookie manager available for Safari:
    http://sweetpproductions.com/safaricookies/
    which automatically deletes all cookies not marked as 'favourites' when closing Safari. It does the same for Flash Cookies, but they are subject for themselves:
    From this website:
    http://machacks.tv/2009/01/27/flushapp-flash-cookie-removal-tool-for-os-x/
    For those who do not know about Flash cookies, more properly referred to as Local Shared Objects (LSO), they operate in a similar way to regular browser cookies but are stored outside the purview of your browser, meaning you cannot delete them from within your browser, whether Safari, Firefox, Opera or any other. Typically they are issued from sites or 3rd party sites that contain Adobe Flash content. Since virtually all internet advertising is  delivered in Flash, Google/Doudleclick and all other internet advertising companies are sure to be tracking your browsing behavior with Flash cookies. These companies can see you traverse the Internet as you come upon the plethora of sites that contain their embedded advertising. Check out the Wikipedia entry here.
    In Mac OS X they are stored in the following location:
    /User’s Home Folder/Library/Preferences/Macromedia/Flash Player/#SharedObjects
    The settings for the Flash cookies are stored in:
    /User’s Home Folder/Library/Preferences/Macromedia/Flash Player/macromedia.com/support/flashplayer/sys
    In OS X Local Shared Objects, or Flash Cookies, are appended with a .sol suffix. Flush deletes all the Flash cookies (.sol) and their settings.
    Flush can be downloaded from that page.
    If you want to retain certain Flash cookies but not others, the excellent add-on for Safari called SafariCookies now includes a setting for automatically deleting flash cookies you don't want to retain, when Safari is shut down, in the same as it deals with ordinary cookies:
    http://www.sweetpproductions.com/safaricookies/index.htm
    which not only does that but much more equally useful stuff!
    This article covers the issue in more depth:
    http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
    Flash cookies are also known as 'Zombie Cookies' and are used by a number of firms, including Hulu, MTV, and Myspace. Graham Cluley, senior technology consultant at the internet security firm Sophos, told BBC News that the source of the trouble was Adobe Flash itself, which he called "one of the weirdest programs on the planet".
    "I think it's highly unlikely that these large companies have abused Flash cookies - which are different from browser cookies - with malicious intent," he said.
    "I think it's much more likely that the vast majority of users are simply oblivious to the bizarre way in which Adobe allows them to configure the software."
    http://www.bbc.co.uk/news/technology-10787882
    And a more recent article:
    http://www.nytimes.com/2010/09/21/technology/21cookie.html?_r=3&scp=1&sq=flash&s t=cse
    [b]Tracker cookies and the invisible web:[/b]
    – tags, web bugs, pixels and beacons that are included on web pages in order to get an idea of your online behavior.
    Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
    http://www.ghostery.com/about
    This provides an extension to Safari (also available for other browsers) that shows you what data tracking is active on each web page you visit, and enables you to block them.

  • IE11 browser difference between "Default" and "Internet Explorer 11" user agent string

    I installed IE11 in my machine .And also we migrating all our developed application (ASP .Net/ VS 2010) to work in IE11 .
    But when i open (Developer tool (F12) -> Emulation) In that ,
    While selecting "User agent string" i two different option
    Default
    Internet Explorer 11
    Actually what difference between this two user agent string and too i am working in .Net
    And i select "IE11" as a user agent option , most of my application working flawless (design) but if i select "Default" throwing lot of design oriented bugs.
    Is there setting to be made in .Net framework or anything else
    Because it should work in both "Default" and "IE11" user agent string

    Hello kumaran_Arun,
    Please try to reset Internet Explorer and check if the issue still exists.
    http://windows.microsoft.com/en-hk/internet-explorer/reset-ie-settings#ie=ie-11
    If this issue is related to Internet Explorer web development, to receive better support, it is recommended to post in the MSDN forum.
    The professionals there will be glad to help you.
    https://social.msdn.microsoft.com/Forums/ie/en-US/home?category=iedevelopment
    Thanks for your understanding.
    Best regards,
    Fangzhou CHEN
    Please remember to mark the replies as answers if they help, and unmark the answers if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • Difference between 'default' and 'protected' modifier

    Hello!
    Whats the difference between 'default' and 'protected' modifier?
    Thank you!

    Explanation here
    http://www.webchalkboard.com/java/tute6.shtml

  • Difference between 'Camera Raw Defaults' option and Default button

    I am using ACR 4.6 under CS3 in Windows.
    If I open an image and click the Default button above the exposure sliders, all the tonal settings are reset to the defaults, but Clarity, Vibrance and Saturation are not altered.
    If I select 'Camera Raw Defaults' from the menu the tonal settings are reset to the defaults as above, but Clarity, Vibrance and Saturation are also reset to 0.
    I was under the impression that the Default button and the 'Camera Raw Defaults' option did the same thing, but apparently not. What is the difference?

    The default button you are talking about only affects the sliders in the same group with the button.

Maybe you are looking for

  • Bootcamp "no bootable device" Option key not working

    Ok recently rebuilt 2 older "Intel Core Duo" Mac Mini's with SSD drives. They work great and have been flying, however on one of them I wanted to setup BootCamp so that I could run Win7 Pro on it as well. So here is what I did... - When I first built

  • Vendor Text / Internal notes during Invoice creation

    Hello, We can create user ID for a Vendor contact using "Employee for Business partner" under "Manage Business partner" option. With this user ID, while trying to create an Invoice, Vendor text / Internal notes drop down does not appear under "Docume

  • Path to /i/ prefix

    What is a physical path to the /i/ prefix on a Linux system in Oracle XE? Thanks, Art

  • AIR/HTML: Icon resampling in window titlebar on Windows 7

    Dear Adobe, In my app descriptor file I've got all icon sizes specified - from 16 to 128px in 32 bit PNGs. But the icon in the application window is displayed with resampling. Instead of original 16*16image it takes larger one and resamples down to 1

  • Custom Adobe print settings not being saved as a default

    We're trying to print pdf labels from a website to either a Citizen CLP-521 or a Zebra GK420d using a custom label size and settings. This works fine when printing from the local PC the printer is connected to. However as soon as we share the printer