Traceroute uses either ICMP (windows) or UDP (Unix and Unix-like).  In order
to block inbound traceroute you need to block:

icmp echo-request (blocks ping and windows traceroute)

UDP with ports > 30000 (should block most Unix traceroutes)

The problem from a filtering perspective is that although Unix traceroute
usually picks a port in the 30,000 range, some versions are configurable to
pick a different port.  So, someone could, for example, pick port 53, and it
would get through your filter.  One way around this is to just block all UDP
except that which you absolutely need.  (this is called a 'default deny'
stance)

Most sites only need DNS for UDP traffic.  Given this, all you need is to
allow UDP src port 53 to any UDP port >1023 to your internal network from
your external DNS servers.  Block all other UDP traffic and you block all
Unix traceroute activity.

If your only protection from the Internet is a filtering router, you really
should be using a default deny filter and only allowing traffic you know is
legitimate.

These links can help:

http://www.cisco.com/warp/public/707/21.html

http://www.phrack.org/show.php?p=55&a=10

You may also want to investigate using Context Basec Access Control (CBAC)
for stateful filtering capability on your router:

http://www.cisco.com/warp/public/110/36.html

HTH,
Kent

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Sgp YH
Sent: Tuesday, December 04, 2001 12:57 AM
To: [EMAIL PROTECTED]
Subject: Deny trace route using ACL on Cisco router [7:28047]


Hi guys/gals
Can someone share with me the experience in
configuring ACL to deny trace route from the Internet
to the internal network.  I am wondering what ports to
deny as it keeps changing.

Cheers


__________________________________________________
Do You Yahoo!?
Buy the perfect holiday gifts at Yahoo! Shopping.
http://shopping.yahoo.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=28064&t=28047
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to