Hi,

Whenever I implement an iptables firewall (default policy DROP), I can't
seem to scan the system's ports through nmap using just the default
command ("nmap host").  What's the correct nmap commandline to be able
to portscan an iptables-enabled box?

Also, what's the explanation behind this?  No need for very specific
details, just a bit of a summry will suffice.

TIA!

-- 
Joon Guillen


================================
So computers are tools of the Devil? thought Newt.  He had no problem
believing it.  Computers had to be the tools of _somebody_, and he knew
for certain that it definitely wasn't him.

from "Good Omens", Neil Gaiman & Terry Pratchett

_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to