[lug] Firewall / Lockdown questions

Nate Duehr nate at natetech.com
Wed Aug 1 00:43:58 MDT 2007


On Jul 31, 2007, at 11:56 PM, dio2002 at indra.com wrote:

>> dio2002 at indra.com wrote:
>>> PORT    STATE    SERVICE
>>> 623/tcp filtered unknown
>>> 664/tcp filtered unknown
>>>
>>> How do i decipher that?
>>
>> Most likely a network provider between where you ran nmap and your
>> webserver box is filtering those ports and nmap is reporting it.
>
> right now i'm testing on a private nw.  the only hop between one  
> box and
> the server box is via a linksys router.  if what you're saying is  
> true,
> the linksys would have to be spitting that out.

Since it's TCP, just start up a tcp session to it (telnet) and then  
look at netstat -an on the targethost box to see if you really  
connected to it, or if you're connecting to something "upstream".

--
Nate Duehr
nate at natetech.com






More information about the LUG mailing list