[lug] Firewall / Lockdown questions
Nate Duehr
nate at natetech.com
Wed Aug 1 00:43:58 MDT 2007
On Jul 31, 2007, at 11:56 PM, dio2002 at indra.com wrote:
>> dio2002 at indra.com wrote:
>>> PORT STATE SERVICE
>>> 623/tcp filtered unknown
>>> 664/tcp filtered unknown
>>>
>>> How do i decipher that?
>>
>> Most likely a network provider between where you ran nmap and your
>> webserver box is filtering those ports and nmap is reporting it.
>
> right now i'm testing on a private nw. the only hop between one
> box and
> the server box is via a linksys router. if what you're saying is
> true,
> the linksys would have to be spitting that out.
Since it's TCP, just start up a tcp session to it (telnet) and then
look at netstat -an on the targethost box to see if you really
connected to it, or if you're connecting to something "upstream".
--
Nate Duehr
nate at natetech.com
More information about the LUG
mailing list