RE: icmp - time-exceeded vs ttl-exceeded

From: Scott Morris (swm@emanon.com)
Date: Tue Jun 21 2005 - 08:27:23 GMT-3


But on the other hand, Socrates is dead. Spoons aren't.

;)

But yes, there's much better retention when you SEE something really
occurring rather than placing faith in someone else's answer that something
occurs.

Scott

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Brian Dennis
Sent: Tuesday, June 21, 2005 12:33 AM
To: John Matus; Group Study
Subject: RE: icmp - time-exceeded vs ttl-exceeded

John,
        You just need a PC and Ethereal (download free from
http://www.ethereal.com) to test this out.

        Are we really helping if we just tell someone the answer? Part of
the CCIE preparation is learning how to solve problems. This is a great one
for somebody to solve. You would be amazed at the number of networking
engineers that can't tell you how traceroute works.

        Lastly I'll bet that the socratic method is better for CCIE
preparation than the "spoon fed" method ;-)

Brian Dennis, CCIE #2210 (R&S/ISP-Dial/Security)
bdennis@internetworkexpert.com
 
Internetwork Expert, Inc.
http://www.InternetworkExpert.com
Toll Free: 877-224-8987
Direct: 775-745-6404 (Outside the US and Canada)

-----Original Message-----
From: John Matus [mailto:jmatus@pacbell.net]
Sent: Monday, June 20, 2005 8:56 PM
To: Brian Dennis; ccie2be; Group Study
Subject: Re: icmp - time-exceeded vs ttl-exceeded

being a philosphy major in college <wonders that did for my
marketability>,
i really despize socratic method/dialogue!!! :-p it would be great if we all
had labs to just "test stuff out on" hehehe

Regards,

John D. Matus
MCSE, CCNP
Office: 818-782-2061
Cell: 818-430-8372
jmatus@pacbell.net
----- Original Message -----
From: "Brian Dennis" <bdennis@internetworkexpert.com>
To: "ccie2be" <ccie2be@nyc.rr.com>; "Group Study"
<ccielab@groupstudy.com>
Sent: Monday, June 20, 2005 3:37 PM
Subject: RE: icmp - time-exceeded vs ttl-exceeded

> Tim,
> Did you think about trying the options out?
>
> Brian Dennis, CCIE #2210 (R&S/ISP-Dial/Security)
> bdennis@internetworkexpert.com
>
> Internetwork Expert, Inc.
> http://www.InternetworkExpert.com
> Toll Free: 877-224-8987
> Direct: 775-745-6404 (Outside the US and Canada)
>
> -----Original Message-----
> From: ccie2be [mailto:ccie2be@nyc.rr.com]
> Sent: Monday, June 20, 2005 3:25 PM
> To: Brian Dennis; 'Group Study'
> Subject: RE: icmp - time-exceeded vs ttl-exceeded
>
> Hi Brian,
>
> As you suggested I did look through the archives and found some
> interesting
> things that refreshed my memory about reflexive acl's and Traceroute
in
> general.
>
> But, none of the posts I could find talked about the difference
between
> time-exceeded vs ttl-exceeded.
>
> I accept the fact that I need to permit time-exceeded to fulfill the
> tasks
> in IE lab 2 and 3, but I'm still curious as to the difference between
> these
> 2 icmp options.
>
> My hope is that if I really knew the difference, it would be easier to
> remember which one to use under the pressure of the lab.
>
> Thanks, Tim
>
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf
Of
> Brian Dennis
> Sent: Monday, June 20, 2005 5:31 PM
> To: ccie2be; Group Study
> Subject: RE: icmp - time-exceede vs ttl-exceeded
>
> Tim,
> You should search the archive as there was a long discussion on
> this topic about a year ago. Also as far as using the traceroute
option
> for the ICMP type, if you understand how traceroute works you'll know
> why you don't use it.
>
> Brian Dennis, CCIE #2210 (R&S/ISP-Dial/Security)
> bdennis@internetworkexpert.com
>
> Internetwork Expert, Inc.
> http://www.InternetworkExpert.com
> Toll Free: 877-224-8987
> Direct: 775-745-6404 (Outside the US and Canada)
>
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf
Of
> ccie2be
> Sent: Monday, June 20, 2005 2:02 PM
> To: Group Study
> Subject: icmp - time-exceede vs ttl-exceeded
>
> Hi guys,
>
> Let's assume I want to configure a reflexive acl which allows
Traceroute
> packets back in.
>
> I'm trying to make sure I select the correct icmp type packet to allow
> back-in. But, when I do the following I see lots of options.
>
> R5(config)#access-list 101 perm icmp any any ?
> <0-255> ICMP message type
> administratively-prohibited Administratively prohibited
> alternate-address Alternate address
> conversion-error Datagram conversion
> dod-host-prohibited Host prohibited
> dod-net-prohibited Net prohibited
> dscp Match packets with given dscp value
> echo Echo (ping)
> echo-reply Echo reply
> fragments Check non-initial fragments
> general-parameter-problem Parameter problem
> host-isolated Host isolated
> host-precedence-unreachable Host unreachable for precedence
> host-redirect Host redirect
> host-tos-redirect Host redirect for TOS
> host-tos-unreachable Host unreachable for TOS
> host-unknown Host unknown
> host-unreachable Host unreachable
> information-reply Information replies
> information-request Information requests
> log Log matches against this entry
> log-input Log matches against this entry,
including
> input
> interface
> mask-reply Mask replies
> mask-request Mask requests
> mobile-redirect Mobile host redirect
> net-redirect Network redirect
> net-tos-redirect Net redirect for TOS
> net-tos-unreachable Network unreachable for TOS
> net-unreachable Net unreachable
> network-unknown Network unknown
> no-room-for-option Parameter required but no room
> option-missing Parameter required but not present
> packet-too-big Fragmentation needed and DF set
> parameter-problem All parameter problems
> port-unreachable Port unreachable
> precedence Match packets with given precedence
value
> precedence-unreachable Precedence cutoff
> protocol-unreachable Protocol unreachable
> reassembly-timeout Reassembly timeout
> redirect All redirects
> router-advertisement Router discovery advertisements
> router-solicitation Router discovery solicitations
> source-quench Source quenches
> source-route-failed Source route failed
>
>
> time-exceeded All time exceededs <-----
> **************
>
>
> time-range Specify a time-range
> timestamp-reply Timestamp replies
> timestamp-request Timestamp requests
> tos Match packets with given TOS value
>
>
> traceroute Traceroute
> <-----------#############
>
>
> ttl-exceeded TTL exceeded
> <-------------*****************
>
>
>
> unreachable All unreachables
> <cr>
>
>
> Notice how similar the 2 "starred" options look. What's the
difference
> between these 2 options?
>
> Also, if I need to allow Traceroute back-in, why wouldn't I use the
> traceroute option?
>
> TIA, Tim
>
>



This archive was generated by hypermail 2.1.4 : Wed Jul 06 2005 - 14:43:42 GMT-3