Hi,
Whenever I implement an iptables firewall (default policy DROP), I can't
seem to scan the system's ports through nmap using just the default
command ("nmap host"). What's the correct nmap commandline to be able
to portscan an iptables-enabled box?
Also, what's the explanation behind this? No need for very specific
details, just a bit of a summry will suffice.
TIA!
--
Joon Guillen
================================
So computers are tools of the Devil? thought Newt. He had no problem
believing it. Computers had to be the tools of _somebody_, and he knew
for certain that it definitely wasn't him.
from "Good Omens", Neil Gaiman & Terry Pratchett
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]
To subscribe to the Linux Newbies' List: send "subscribe" in the body to
[EMAIL PROTECTED]