Togan Muftuoglu wrote:
I told you:)
any log that is letting in ports in ipv6 that you don't want them in so based on your first message showing the results of your scan, I am guessing you only want 22 and 993. everything else that is accepted is the problem area
I started a fresh firewall log file and captured the time that nmap was running. I then grepped on the IPv6 address of the computer running nmap to get only the relevant lines. It's still over 1 MB! Lots to sort through. BTW, you earlier mentioned running nmap from outside the network. Yes, I'm doing that. My firewall is connected to my cable modem. The notebook running nmap is tethered to my smart phone and so has a completely separate internet connection. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org