?
Solved

tracert command

Posted on 2002-05-25
9
Medium Priority
?
617 Views
Last Modified: 2010-04-11
1. When I tracert on both Windows or Unix ( traceroute ) ?
What is the protocol tracert use ?
Can I filter tracert service on Checkpoint or any Firewall brand ? If so , which port or How?

2. For ping command , it is ICMP protocol , what is the number of echo when I ping to anywhere ? and how about the other echos , when we will use these other echoes ?

Thanks
0
Comment
Question by:leumas
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +1
9 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 200 total points
ID: 7034655
1. UNIX traceroute sends UDP and waits for ICMP destination-unreachable
   M$ tracert sends ICMP and waits for ICMP destination-unreachable
  You can filter it on the firewall. In modern networks it does no longer make sence to allow ICMP between LAN and internet. Filtering UDP will be tricky, 'cause traceroute uses a random port, usually

2. number of echo-requests send depend on OS:
     Solaris: 1
     M$:     3
     most other: unlimited
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7035050
Damn!  I typed out a really long (and, if I may say so, thoughtful) answer to the above, corrected a bunch of stuff ahoffman said, and was about to post it when I noticed leumas has 26 frigging questions open...  What's up with that, leumas?!?!?  I'm gonna have to get a mod to help you clean up your mess before I consider answering one of your questions...

Cheers,
-Jon
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 
LVL 3

Expert Comment

by:FlamingSword
ID: 7048037
<noNotif>
0
 

Author Comment

by:leumas
ID: 7048673
What're you doing ? Are you MAD ?
0
 

Author Comment

by:leumas
ID: 7048675
What're you doing ? Are you MAD, I HEAR.. FramingSword?
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7048952
Well, looks like leumas only half cares about closing old questions...

I am quite consoled by perusing the questions that leumas *has* actually closed.  It appears (presumably due to his poor history of closing questions) the advice he receives is often substandard, and many times incorrect, but he cheerily awards points anyway (as is the case in this qestion as well).  I guess every cloud *does* have a silver lining.

leumas - I did notice you closed half of your open questions since my first post - good going.  Now finish the job (since you still have questions open from January).

Cheers,
-Jon


0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7049797
Jon, have been behind the clouds in other questions, and the silver lining here. Hope other's get the same luck ;-)

leumas, please take some more care when grading, for example leave a appropriate comment (which might help at least future readers).Thanks.
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 7050654
ahoffman - I saved the post that corrected a couple things you said about traceroute above, if you want to see it.

Cheers
-Jon
0

Featured Post

10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question