?
Solved

autonomous system

Posted on 2004-04-30
3
Medium Priority
?
258 Views
Last Modified: 2010-04-11
I know that Autonomous System (AS) is an administrative 'domain' that has its own routing policy.   I was wondering if this 'domain' has any relation to a 'domain' name, such as .com or .org.   I'd just like to clear my confusion.   Any explanation would be appreciated.
0
Comment
Question by:skyblue01
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Accepted Solution

by:
funkusmunkus earned 400 total points
ID: 10965786
what your talking about is a private domain, a server of some sort that authenticates and delegates privleges to any one who trys to logon to that domain, it doesn't have anything to do with a .com or .org or any thing like that.
0
 

Author Comment

by:skyblue01
ID: 10966000
I thought AS was more of a network prefix rather than a single machine (like a server).   Do you mean that there a single machine on an AS that does the authentication stuff to any other machine outside the domain and tries to logon to that server's domain?

Also, thanks for your response.
0
 
LVL 1

Expert Comment

by:funkusmunkus
ID: 10967101
yeah to a point, if you have a private network, with a DC (domain controler) and other machines in that private network try to log on to that domain, then your DC will authenticate and delegate privileges, but if you have a DC on a private network and i try and authenticate from my machine, that won't be posable(unless there was a VPN between the two networks)
0

Featured Post

Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question