A bit more clarification: Cisco's routers may or may not show Connected state in "sh ip bgp sum". On dynamips it does, on CCIE R&S troubleshooting section it won't ;-) .
On 21 February 2011 01:17, Jason Maynard <[email protected]> wrote: > Fair enough – I just looked it up and it came back as a site that has been > identified as malware – I was just giving heads up to Vladimir and hit > “reply all” by accident, I had to continue the thread > > > > BTW – viewing a jpeg or other from a website can compromise a system – > (multiple vulnerabilities in the past have been identified and compromised) > > > > As I mentioned I meant to send it straight to Vladimir to let him know - > > > > My Bad but the intention was good. > > > > > > > > From: Marko Milivojevic [mailto:[email protected]] > Sent: February-20-11 4:30 PM > To: Jason Maynard > Cc: Vladimir Osipenko; [email protected] > Subject: Re: [OSL | CCIE_RS] BGP peer and TCP state correspondence > > > > > > Jason - link was to a JPEG file. It's perfectly harmless - I don't see the > point of posting this information on the list? > > > > -- > > Marko Milivojevic - CCIE #18427 > > Senior Technical Instructor - IPexpert > > > > FREE CCIE training: http://bit.ly/vLecture > > > > Mailto: [email protected] > > Telephone: +1.810.326.1444 > > Web: http://www.ipexpert.com/ > > > > On Sun, Feb 20, 2011 at 19:00, Jason Maynard <[email protected]> > wrote: > > Not sure Vladimir but I scanned the URL and received the following result: > > > 1 VT Community user(s) with a total of 1 reputation credit(s) say(s) this > URL is benign. 1 VT Community user(s) with a total of 4184 reputation > credit(s) say(s) this URL is malicious. > Submission date: 2011-02-20 18:57:37 (UTC) > Current status: finished > Antivirus report: Not available > Webscan result: 1 /6 (16.7%) > VT Community > > malicious > Safety score: 0.0% > Compact > Print results > URL analysis tool Result > Firefox Clean site > G-Data Clean site > Google Safebrowsing Clean site > Opera Clean site > ParetoLogic Malware site > Phishtank Clean site > Additional informationShow all > Normalized URL: http://dl.dropbox.com/ > URL MD5: c65dab23caf66263aa546845bcda79b3 > Content-Type: text/plain > VT Community > > User:EP_X0FF > Reputation: 4184 credits > Comment date: 2010-12-15 15:05:50 (UTC) > Malware distribution site, payload various trojans including TDL4 rootkit > Tags: > > > ######## > > -----Original Message----- > From: [email protected] > [mailto:[email protected]] On Behalf Of Vladimir Osipenko > Sent: February-20-11 12:55 PM > To: [email protected] > Subject: [OSL | CCIE_RS] BGP peer and TCP state correspondence > > Hi, Guys! > > I did some research to identify how state of TCP connection > corresponds to BGP peer state. I configured one neighbour as Active, > and the other as Passive and started to play with debug & ACL. I > managed (by blocking ACK packets, OPEN packets) to identify that > correspondence. You wont find this info in CCIE books, actually they > have either incorrect info, or not based on Cisco implementation. > > So here it is: > > http://dl.dropbox.com/u/7208038/BGPandTCP.png > > BTW, Cisco does not show "Connect" state in output of the "sh ip bgp > sum" but shows it in the "debug bgp all" output =) . > > You questions and feedback are highly welcome! I am ready to proof my > research =). > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > _______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
