Solved

tracert command

Posted on 2002-05-25
9
592 Views
Last Modified: 2010-04-11
1. When I tracert on both Windows or Unix ( traceroute ) ?
What is the protocol tracert use ?
Can I filter tracert service on Checkpoint or any Firewall brand ? If so , which port or How?

2. For ping command , it is ICMP protocol , what is the number of echo when I ping to anywhere ? and how about the other echos , when we will use these other echoes ?

Thanks
0
Comment
Question by:leumas
  • 3
  • 2
  • 2
  • +1
9 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
ID: 7034655
1. UNIX traceroute sends UDP and waits for ICMP destination-unreachable
   M$ tracert sends ICMP and waits for ICMP destination-unreachable
  You can filter it on the firewall. In modern networks it does no longer make sence to allow ICMP between LAN and internet. Filtering UDP will be tricky, 'cause traceroute uses a random port, usually

2. number of echo-requests send depend on OS:
     Solaris: 1
     M$:     3
     most other: unlimited
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7035050
Damn!  I typed out a really long (and, if I may say so, thoughtful) answer to the above, corrected a bunch of stuff ahoffman said, and was about to post it when I noticed leumas has 26 frigging questions open...  What's up with that, leumas?!?!?  I'm gonna have to get a mod to help you clean up your mess before I consider answering one of your questions...

Cheers,
-Jon
0
 
LVL 3

Expert Comment

by:FlamingSword
ID: 7048032
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 3

Expert Comment

by:FlamingSword
ID: 7048037
<noNotif>
0
 

Author Comment

by:leumas
ID: 7048673
What're you doing ? Are you MAD ?
0
 

Author Comment

by:leumas
ID: 7048675
What're you doing ? Are you MAD, I HEAR.. FramingSword?
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7048952
Well, looks like leumas only half cares about closing old questions...

I am quite consoled by perusing the questions that leumas *has* actually closed.  It appears (presumably due to his poor history of closing questions) the advice he receives is often substandard, and many times incorrect, but he cheerily awards points anyway (as is the case in this qestion as well).  I guess every cloud *does* have a silver lining.

leumas - I did notice you closed half of your open questions since my first post - good going.  Now finish the job (since you still have questions open from January).

Cheers,
-Jon


0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7049797
Jon, have been behind the clouds in other questions, and the silver lining here. Hope other's get the same luck ;-)

leumas, please take some more care when grading, for example leave a appropriate comment (which might help at least future readers).Thanks.
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7050654
ahoffman - I saved the post that corrected a couple things you said about traceroute above, if you want to see it.

Cheers
-Jon
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Adoption of Microsoft’s Enterprise Mobility and Security solution and Office 365 will re-order the File Sync and Share market Microsoft has stated that its Enterprise Mobility + Security (EMS) is the fastest growing product in the history of the …
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question