make zeroshell "invisable" Home Page › Forums › Network Management › ZeroShell › make zeroshell "invisable" This topic contains 1 reply, has 0 voices, and was last updated by VeFeh 8 years, 4 months ago. Viewing 1 post (of 1 total) Author Posts January 13, 2011 at 1:51 am #42812 VeFehMember Just got zeroshell working.. When I scanned my WAN ip from another network I get: Starting Nmap 4.62 ( http://nmap.org ) at 2011-01-13 02:48 CET Interesting ports on : Not shown: 1703 closed ports PORT STATE SERVICE 22/tcp filtered ssh 25/tcp filtered smtp 80/tcp filtered http 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 443/tcp filtered https 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 749/tcp open kerberos-adm In default config zeroshell “rejects” packets on these ports? How can I drop packets on these ports so there would be no replay at all from ZS? Author Posts Viewing 1 post (of 1 total) You must be logged in to reply to this topic.