1 個回答
- 最新
- 最多得票
- 最多評論
1
Hi,
This page details the rules that you have to include in the security group of your VPC to allow / block ICMP / ping traffic traffic: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html#sg-rules-ping
All details re. ICMP and ping: https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
This page is also interesting: https://www.ionos.com/digitalguide/server/know-how/what-is-icmp-protocol-and-how-does-it-work/
Best,
Didier
相關內容
- 已提問 6 個月前
- AWS 官方已更新 1 年前
- AWS 官方已更新 2 年前
I checked the urls and block the ICMP on private ip by creating the security group also denied on from network ACL but still i can able to trace the route from public ip and looking to block it. Also checked it with unused public ip i can able to traceroute the IP which make me suspecious.
What is the OS ?
As per the Wikipedia page that @Didier_Durand advised reading:
See this Red Hat document as well (even if you may not be running RHEL it is still useful) https://www.redhat.com/sysadmin/ping-traceroute-netstat
Hi, as emphasized by Steve_M, traceroute is UDP while ping is ICMP: UDP & ICPM are different IP protocoles authorized by different rules in a secgroup. So, traceroute working doesn't mean ping will work.