A bit more clarification:

Cisco's routers may or may not show Connected state in "sh ip bgp
sum". On dynamips it does, on CCIE R&S troubleshooting section it
won't ;-) .

On 21 February 2011 01:17, Jason Maynard <[email protected]> wrote:
> Fair enough – I just looked it up and it came back as a site that has been
> identified as malware – I was just giving heads up to Vladimir and hit
> “reply all” by accident,  I had to continue the thread
>
>
>
> BTW – viewing a jpeg or other from a website can compromise a system –
> (multiple vulnerabilities in the past have been identified and compromised)
>
>
>
> As I mentioned I meant to send it straight to Vladimir to let him know -
>
>
>
> My Bad but the intention was good.
>
>
>
>
>
>
>
> From: Marko Milivojevic [mailto:[email protected]]
> Sent: February-20-11 4:30 PM
> To: Jason Maynard
> Cc: Vladimir Osipenko; [email protected]
> Subject: Re: [OSL | CCIE_RS] BGP peer and TCP state correspondence
>
>
>
>
>
> Jason - link was to a JPEG file. It's perfectly harmless - I don't see the
> point of posting this information on the list?
>
>
>
> --
>
> Marko Milivojevic - CCIE #18427
>
> Senior Technical Instructor - IPexpert
>
>
>
> FREE CCIE training: http://bit.ly/vLecture
>
>
>
> Mailto: [email protected]
>
> Telephone: +1.810.326.1444
>
> Web: http://www.ipexpert.com/
>
>
>
> On Sun, Feb 20, 2011 at 19:00, Jason Maynard <[email protected]>
> wrote:
>
> Not sure Vladimir but I scanned the URL and received the following result:
>
>
> 1 VT Community user(s) with a total of 1 reputation credit(s) say(s) this
> URL is benign. 1 VT Community user(s) with a total of 4184 reputation
> credit(s) say(s) this URL is malicious.
> Submission date: 2011-02-20 18:57:37 (UTC)
> Current status: finished
> Antivirus report: Not available
> Webscan result: 1 /6 (16.7%)
> VT Community
>
> malicious
>  Safety score: 0.0%
> Compact
> Print results
> URL analysis tool       Result
> Firefox Clean site
> G-Data  Clean site
> Google Safebrowsing     Clean site
> Opera   Clean site
> ParetoLogic     Malware site
> Phishtank       Clean site
> Additional informationShow all
> Normalized URL: http://dl.dropbox.com/
> URL MD5: c65dab23caf66263aa546845bcda79b3
> Content-Type: text/plain
> VT Community
>
> User:EP_X0FF
> Reputation: 4184 credits
> Comment date: 2010-12-15 15:05:50 (UTC)
> Malware distribution site, payload various trojans including TDL4 rootkit
> Tags:
>
>
> ########
>
> -----Original Message-----
> From: [email protected]
> [mailto:[email protected]] On Behalf Of Vladimir Osipenko
> Sent: February-20-11 12:55 PM
> To: [email protected]
> Subject: [OSL | CCIE_RS] BGP peer and TCP state correspondence
>
> Hi, Guys!
>
> I did some research to identify how state of TCP connection
> corresponds to BGP peer state. I configured one neighbour as Active,
> and the other as Passive and started to play with debug & ACL.  I
> managed (by blocking ACK packets, OPEN packets)  to identify that
> correspondence. You wont find this info in CCIE books, actually they
> have either incorrect info, or not based on Cisco implementation.
>
> So here it is:
>
> http://dl.dropbox.com/u/7208038/BGPandTCP.png
>
> BTW, Cisco does not show "Connect" state in output of the "sh ip bgp
> sum" but shows it in the "debug bgp all" output =) .
>
> You questions and feedback are highly welcome! I am ready to proof my
> research =).
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to