communication between hosts in different networks;* Can I use Telnet, HTTP, FTP, or SSH to access services on other hosts;
Traceroute is a routing tool used to track the route through which data packets arrive at the network host;
Traceroute is a gateway tool used to send packets between the host and the target host. The principle of traceroute is to try to send
the location and purpose of the host that conflicts with the vro, we cannot unplugging the host that conflicts with the vro, because we do not know the detailed network IP address configuration, if the IP address of the vro is modified, a new IP address conflict may be introduced. Therefore, the IP address of the vro cannot be modified. Therefore, you can only set ARP ing to locate the problem, in practice, force ARP ing should be avoided. ARP processes, including learning, caching, and invalid
+0Data byteslen= $ip=192.168. 1. 107Ttl= -DfID=841sport=135Flags=sa seq=0win=8192rtt=2.7mslen= $ip=192.168. 1. 107Ttl= -DfID=1121sport=135Flags=sa seq=1win=8192rtt=0.9mslen= $ip=192.168. 1. 107Ttl= -DfID=1374sport=135Flags=sa seq=2win=8192rtt=0.8mslen= $ip=192.168. 1. 107Ttl= -DfID=1777sport=135Flags=sa seq=3win=8192rtt=0.9Ms2) fake source IP to simulate DDoS attacksTwo. Route scanningFunction: The query to one host to another host's hop count and delay.Command:1)
the system that receives the ICMP can associate the error message with a particular user process based on the source port number.PingThe purpose of the PING program is to test whether another host is up to the table. The program sends an ICMP echo request message to the host and waits to return an ICMP echo reply. The ping program can also detect the round-trip
) # access-list 108 deny ip any host 192.168.1.0 log4. ICMP protocol security configuration. For ICMP streams, we want to disable echo, redirect, and maskrequest of ICMP. You also need to disable traceroute command detection. For Outbound ICMP streams, we can allow ECHO, par
-nd115l2tp120uti132sctp)
-Use the PS port list to separate [tcp80 SYN scan]
-The list of PA ports is separated by [Ack Scan] (PS + PA test status package filtering Firewall [non-State PA can pass]) [Default scan Port 1]
-Pu port lists are used to separate [UDP high port scan traversal only filters TCP firewalls]
-PE [ICMP ping types]
-PM mask request.
-Pr [ARP Ping] is directly connected by default.
-PN itself.
-PP time request.
-Send-IP direct connec
$UP_PORTS --dport $UP_PORTS-m state --state ESTABLISHED -j ACCEPTiptables -A OUTPUT -o $IFACE -p tcp --sport $UP_PORTS --dport $UP_PORTS-m state --state ESTABLISHED,RELATED -j ACCEPT## SMTP# Allow smtp outbound.iptables -A INPUT -i $IFACE -p tcp --sport 25 -m state --state ESTABLISHED -j ACCEPTiptables -A OUTPUT -o $IFACE -p tcp --dport 25 -m state --state NEW,ESTABLISHED -j ACCEPT## AUTH server# Reject ident probes with a tcp reset.# I need to do this for a broken mailhost that won't accept my
Ifconfig eth0 down
Ifconfig eth0 hw ether xx: xx
Ifconfig eth0 up
4. Network Services5. Test the network5.1 ping
Send an ICMP Echo Request (ECHO_REQUEST) group program to the network host to send an ICMP echo response using the forced echo request data report of the ICMP protocol. Echo the request datagram (''pings IP address and
of packets that can be transmitted for this network interface. Setting Errors for this value may cause network faults. * RX: reception of data from the start to the present of the Network * TX: transmission of data from the start to the present of the Network * Collisions: Conflict of network signals;
Activate a network device
ifconfig eth0 up
Change network device information
#ifconfig eth0 192.168.1.112 netmask 255.255.255.0
Disable network devices
. notes for traceroute (see the Chinese version of TCPIP): 1. there is no guarantee that the current route is also the route to be used in the future. Even two consecutive I p data packets may use different routes. If the route changes when the program is running, this change is observed because the traceroute program prints a new IP address for a given TTL. Second, it cannot be ensured that the
to avoid such monitoring and achieve the purpose of evaluation, there is a secret scan. This scan method is characterized by the ICMP information returned when the UDP port is disabled, and does not contain any part of the standard TCP three-way handshake protocol, which is concealed, however, the packets used for this scan are easily discarded when they pass through the network, resulting in incorrect detection information.
However, UDP scanning has
type Code 8.
The ping program calculates the interval time and calculates how many packets are delivered. Users can determine the approximate situation of the network. We can see that the ping gives out the data for the time and TTL transmitted. Wu, Traceroute
Traceroute is an important tool to detect the routing between host and destination hosts, and is also the most convenient tool.
, and network application
Most elasticsearch network topologies are created in the network topology. You can also add a subset of elasticsearch network configuration table data.
3. Collect ES network configuration information
Common commands:
1) ping host/ip-address to send and receive ICMP responses and verify network connectivity
2) arp-a; view the MAC-IP ing table for modifying ES (same subnet)
3) telnet host/ip-address; log on to elasticsearch or
packets can contain diagnostic information (Ping, traceroute-note that traceroute in UNIX systems uses UDP packets instead of ICMP ), error message (Network/host/port inaccessible Network/host/port unreachable), Information (timestamp, Address Mask Request, etc .), or control information (source quench, redirect, etc .).You can find the
20, 21 allowed
9. Outgoing traceroute request allowed
1. Unlimited traffic on the loopback interface allowed
2. ICMP traffic allowed
3. DNS Server and Client on port 53 allowed
4. SSH Server and Client on port 22 allowed
5. HTTP Server and Client on port 80 allowed
6. HTTPS Server and Client on port 443 allowed
7. WWW-CACHE Client on port 8080 allowed
8. External POP Client on port 110 allowed
9. External
1.udpThe traditional, ancient method of tracerouting. Used by default.Probe packets is UDP datagrams with so-called "unlikely" destination ports. The "unlikely" Port of the first probe is 33434 and then for each next probe it's incremented by one. Since the ports is expected to be unused, the destination host normally returns "ICMP Unreach port" as a final response. (Nobody knows what happens when some application listens for such ports, though).Send
implemented:Open debug on the R3 test, if the source is 12.1.1.1, the description is to go R1; if the source is 45.1.1.5, the description goes R2R3#debug IP ICMPICMP packet Debugging is onR7 Ping 3.3.3.3来 to test:Pc1#ping 3.3.3.3Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 3.3.3.3, timeout is 2 seconds:!!!!!Success rate is percent (5/5), round-trip Min/avg/max = 24/40/56 msTo view the results on R3:*jun 15:07:00.091:icmp:echo reply
(internet service provider) exists ).
To determine the ISP, you only need to check the previous IP address of the target machine, it should be the ISP's router.
Basically, this is how traceroute works-a TCP/IP packet with a value in its header (in the IP header. If you don't know what it means, it doesn't matter. You can just look down.) TTL is short for Time To Live. When a data packet passes through the router, its TTL value is reduced. This may ca
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.