make zeroshell "invisable"

Home Page Forums Network Management ZeroShell make zeroshell "invisable"

This topic contains 1 reply, has 0 voices, and was last updated by  VeFeh 8 years, 1 month ago.

Viewing 1 post (of 1 total)
  • Author
    Posts
  • #42812

    VeFeh
    Member

    Just got zeroshell working..

    When I scanned my WAN ip from another network I get:


    Starting Nmap 4.62 ( http://nmap.org ) at 2011-01-13 02:48 CET
    Interesting ports on :
    Not shown: 1703 closed ports
    PORT STATE SERVICE
    22/tcp filtered ssh
    25/tcp filtered smtp
    80/tcp filtered http
    135/tcp filtered msrpc
    136/tcp filtered profile
    137/tcp filtered netbios-ns
    138/tcp filtered netbios-dgm
    139/tcp filtered netbios-ssn
    443/tcp filtered https
    445/tcp filtered microsoft-ds
    593/tcp filtered http-rpc-epmap
    749/tcp open kerberos-adm

    In default config zeroshell “rejects” packets on these ports?
    How can I drop packets on these ports so there would be no replay at all from ZS?

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.