<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking a specific IP in traceroute on IOS-XR in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/5309236#M1121821</link>
    <description>&lt;P&gt;You will need to block 172.16.11.114 as the source and apply it as an egress ipv4 access-group on the interface in question.&lt;/P&gt;</description>
    <pubDate>Mon, 14 Jul 2025 17:03:47 GMT</pubDate>
    <dc:creator>NetAdmin-WGELD</dc:creator>
    <dc:date>2025-07-14T17:03:47Z</dc:date>
    <item>
      <title>Blocking a specific IP in traceroute on IOS-XR</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279491#M1077664</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am faced with a very strange problem. My internal network contains IPs from 172.16.X.X subnet. I want to block a certain IP from appearing in traceroute(this IP belongs to an uplink hosted in my own AS) and I can easily do things anyone suggests. Any leads to achieve this task will be highly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 05:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279491#M1077664</guid>
      <dc:creator>network_geek</dc:creator>
      <dc:date>2021-01-26T05:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a specific IP in traceroute on IOS-XR</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279517#M1077665</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If it's an MPLS cloud, disable TTL propagation as below.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching-mpls/mpls/26585-mpls-traceroute.html#no_mpls" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching-mpls/mpls/26585-mpls-traceroute.html#no_mpls&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If its not an MPLS, you can use a combination of NAT, Loopback and local&lt;BR /&gt;policy route-maps to use dummy IPs on your loopbacks to appear in&lt;BR /&gt;traceroute instead of your LAN IPs.&lt;BR /&gt;&lt;BR /&gt;Finally, I suggest posting this in routing forum to get more detailed&lt;BR /&gt;answers.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Tue, 26 Jan 2021 06:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279517#M1077665</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-01-26T06:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a specific IP in traceroute on IOS-XR</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279531#M1077667</link>
      <description>&lt;P&gt;When traceroute operates it uses icmp time-exceeded and icmp unreachable messages as the mechanism that reports the intermediate hops in the path to the ultimate host. We normally allow those messages inbound but if you deny them for the particular host you want to exclude it will have the effect of removing it from traceroute (the * denoting a hop not reporting its address will still show up).&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 07:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279531#M1077667</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-26T07:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a specific IP in traceroute on IOS-XR</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279566#M1077668</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your update. I made an ACL in which I am denying ICMP time-exceeded, traceroute and echo-reply but I am unable to block this IP in traceroute. Can you kindly help me in pointing out the exact point? The ACL on ingress interface is pasted below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ipv4 access-list ICMP-BLOCK&lt;/P&gt;&lt;P&gt;1 deny icmp any 172.16.11.112 0.0.0.3 ttl lt 255&lt;BR /&gt;2 deny icmp any 172.16.11.112 0.0.0.3 time-exceeded&lt;BR /&gt;5 deny icmp any 172.16.11.112 0.0.0.3 fragments&lt;BR /&gt;6 deny icmp any 172.16.11.112 0.0.0.3 traceroute&lt;BR /&gt;7 deny tcp any 172.16.11.112 0.0.0.3 icmp-off&lt;BR /&gt;8 deny udp any 172.16.11.112 0.0.0.3 icmp-off&lt;BR /&gt;10 deny icmp any 172.16.11.112 0.0.0.3 echo&lt;BR /&gt;15 deny icmp any 172.16.11.112 0.0.0.3 echo-reply icmp-off&lt;BR /&gt;20 deny icmp any 172.16.11.112 0.0.0.3 echo-reply&lt;BR /&gt;25 deny udp any 172.16.11.112 0.0.0.3 range 33434 33534&lt;BR /&gt;26 deny tcp any 172.16.11.112 0.0.0.3 range 33434 33534&lt;BR /&gt;30 deny icmp any 172.16.11.112 0.0.0.3 time-exceeded&lt;BR /&gt;40 permit ipv4 any any&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 08:58:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279566#M1077668</guid>
      <dc:creator>network_geek</dc:creator>
      <dc:date>2021-01-26T08:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a specific IP in traceroute on IOS-XR</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279675#M1077671</link>
      <description>&lt;P&gt;Your ACL is denying from "any" to the subnet 172.16.11.112/30. If your intention is to mask the hosts in that subnet from appearing, then they must be the SOURCE address and the ACL must be applied between where that subnet lives and your client PCs.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 11:50:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279675#M1077671</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-26T11:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a specific IP in traceroute on IOS-XR</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279808#M1077675</link>
      <description>&lt;P&gt;The IP I intend to block is 172.16.11.114/32 and this ACL is applied where the same IP on an interface(/30) is configured. I am yet to yield any fruitful outcome on this.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 15:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/4279808#M1077675</guid>
      <dc:creator>network_geek</dc:creator>
      <dc:date>2021-01-26T15:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a specific IP in traceroute on IOS-XR</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/5309236#M1121821</link>
      <description>&lt;P&gt;You will need to block 172.16.11.114 as the source and apply it as an egress ipv4 access-group on the interface in question.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jul 2025 17:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-specific-ip-in-traceroute-on-ios-xr/m-p/5309236#M1121821</guid>
      <dc:creator>NetAdmin-WGELD</dc:creator>
      <dc:date>2025-07-14T17:03:47Z</dc:date>
    </item>
  </channel>
</rss>

