[c-nsp] Port 1720 & 1863
abs
abhishake00 at yahoo.com
Wed Dec 23 15:14:20 EST 2009
doesn't look like it's being intercepted... the traffic goes from my host to the router to my ip address...
--- On Wed, 12/23/09, Jared Mauch <jared at puck.nether.net> wrote:
From: Jared Mauch <jared at puck.nether.net>
Subject: Re: [c-nsp] Port 1720 & 1863
To: "abs" <abhishake00 at yahoo.com>
Cc: "Steve Bertrand" <steve at ibctech.ca>, cisco-nsp at puck.nether.net
Date: Wednesday, December 23, 2009, 2:38 PM
Have you done a tcptraceroute to see if someone is intercepting your tcp/1720?
- Jared
On Dec 23, 2009, at 2:34 PM, abs wrote:
> that makes a lot more sense now..
>
> the box i'm running nmap from is from a remote location. i am able to telnet into port 1720 and the connection is established (as per netstat -na)
>
> i also added deny tcp any any eq 1720 at the top of the acl but that still didn't help. i'm still able to connect to that port using telnet...
>
> i even tried removing the established rule but that didn't change anything as well.
>
> --- On Wed, 12/23/09, Steve Bertrand <steve at ibctech.ca> wrote:
>
> From: Steve Bertrand <steve at ibctech.ca>
> Subject: Re: [c-nsp] Port 1720 & 1863
> To: "abs" <abhishake00 at yahoo.com>
> Cc: "Adam Strawson" <adam at thepub.cx>, cisco-nsp at puck.nether.net
> Date: Wednesday, December 23, 2009, 2:20 PM
>
> abs wrote:
>> that is what i was thinking as well so i removed that line but that caused all responses to internal traffic to be blocked. What do you exactly mean by specific? Wouldn't I have to put a rule for each type of traffic?
>
> On an inbound ACL, allowing established TCP sessions means that a TCP
> connection must be made from the 'internal' side of the interface, and
> only inbound TCP traffic that is associated with that session can
> ingress the interface.
>
> Your 'deny ip any any' at the end would block ALL inbound TCP, other
> than SSH and pre-established (by an internal device) sessions.
>
> Reviewing your other email (that hasn't hit the list yet), do you happen
> to have an H.323 session established to your nmap box when you see the
> port as open?
>
> What do you see when you (while on your nmap box):
>
> % telnet <ip addr> 1720
> % netstat -na | grep 1720
> % netstat -na | grep <ip of remote>
>
> If you want, provide me with the IP of the box off-list, and I'll scan
> it from one of my hosts.
>
> Steve
>
>
>
>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
More information about the cisco-nsp
mailing list