Interesting. I have now removed the access-list that was applied inbound to
the port in question.
FYI the access-list was access-list 101 permit tcp any host 64.220.150.9 eq
telnet
Said list would most definitely have denied your trace. And all the pings
folks told me failed.
The access-list, at the time of removal, indicated 1200 hits or so, Might
want to try again.
I tested telnet access from here, but of course I'm on the inside. :->
Sorry for the problem.
Chuck
-----Original Message-----
From: Kane [mailto:[EMAIL PROTECTED]]
Sent: Friday, August 04, 2000 11:23 PM
To: Chuck Larrieu
Subject: Re: Friday Follies Extended Through Saturday
I 've taken up your challenge , but after a number of unsuccessful attempts
, I traced it (output below)
Could it be that many more are also attempting to retrieve the Gauntlet ?
Rgrds
E:\>tracert 64.220.150.9
Tracing route to w009.z064220150.sjc-ca.dsl.cnc.net [64.220.150.9]
over a maximum of 30 hops:
1 <10 ms 10 ms <10 ms pump.jpnz.com [192.168.0.1]
2 161 ms 160 ms 160 ms apx1.akl.ihug.co.nz [203.29.165.110]
3 160 ms 160 ms 160 ms fa-0-1-tig-nz-akl-1.ihug.net [203.29.165.1]
4 180 ms 160 ms 161 ms atm-5-0-0-2-netgate-akl.ihug.net
[202.49.88.42]
5 140 ms 201 ms 180 ms a0-0-0-2.tkbr1.netgate.net.nz
[202.37.246.121]
6 330 ms 301 ms 300 ms s1-1-4.labr1.netgate.net.nz [202.37.245.166]
7 660 ms 822 ms 641 ms s4-0-1.lsanca1-cr1.bbnplanet.net [4.24.24.5]
8 481 ms 500 ms 481 ms p2-1.lsanca1-ba1.bbnplanet.net [4.24.4.5]
9 481 ms 501 ms 481 ms p7-0.lsanca1-br1.bbnplanet.net [4.24.4.2]
10 471 ms 480 ms 481 ms p2-0.lsanca1-br2.bbnplanet.net [4.24.4.14]
11 500 ms 521 ms 521 ms p1-0.crtntx1-ba1.bbnplanet.net [4.24.6.78]
12 511 ms 541 ms 521 ms p1-0.crtntx1-ba2.bbnplanet.net [4.24.4.242]
13 531 ms 561 ms 540 ms mae-dallas-atm-gtei.concentric.net
[4.24.147.14]
14 521 ms 530 ms 541 ms
us-il-chi-core1-a1-0-0d218.rtr.concentric.net [2
07.88.0.61]
15 541 ms 560 ms 571 ms 207.88.48.98
16 531 ms 551 ms 530 ms 206.83.91.26
17 531 ms 561 ms 561 ms 192.168.136.5
18 621 ms 561 ms 561 ms 206.83.66.150
19 * * * Request timed out.
----- Original Message -----
From: "Chuck Larrieu" <[EMAIL PROTECTED]>
To: "Cisco Mail List" <[EMAIL PROTECTED]>
Sent: Saturday, August 05, 2000 4:58 PM
Subject: Friday Follies Extended Through Saturday
> Again I extend the invitation.
>
> Telnet to 64.220.150.9 password "yahoudi" ( no quotes )
>
> See if you can answer the following questions:
>
> 1) what version of IOS is running?
> 2) What is the name of the IOS image?
> 3) What routing protocols are running?
> 4) Are there any other routers connected? If so, on what ports?
> 5) If there are other routers connected, what IOS versions are they
running?
> What are the names of the flash images on those routers, if there are
> routers?
> 6) Provide every detail you can about any WAN protocols running
> 7) What is the privilege level password?
> 8) What model number router are you telneted into?
> 9) What model number routers are connected, if there are any connected?
> 10) Who played the Cisco Kid? ( extra credit - how did you find that
> answer? )
> 11) Extra Extra credit - identify all security enabled on the router
>
> Hint: book answers don't count. All that matters is what you can determine
> through your telnet session. I guarantee that you cannot answer at least
> four of the questions without looking.
>
> So come on in!
>
> Chuck
> ----------------------
> I am Locutus, a CCIE Lab Proctor. Xx-Brain_dumps-xX are futile. Your life
as
> it has been is over ( if you hope to pass ) From this time forward, you
will
> study US!
> ( apologies to the folks at Star Trek TNG )
>
> ___________________________________
> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
> FAQ, list archives, and subscription info: http://www.groupstudy.com
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
___________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]