James Pifer wrote:
I'm hoping someone can help me here. I've added an additional network address to a nic with alias 1 (eth0:1). This is to be used for an additional web server on port 80. iptables is open:
# iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination
Chain FORWARD (policy ACCEPT) target prot opt source destination
Chain OUTPUT (policy ACCEPT) target prot opt source destination
When I scan the ip address with nmap:
nmap -p80 -sV 192.168.1.95
Starting Nmap 4.75 ( http://nmap.org ) at 2013-10-03 08:15 CDT Interesting ports on server.domain.com (192.168.1.95): PORT STATE SERVICE VERSION 80/tcp filtered http
Anyone know why this port is filtered instead of open?
"filtered" in nmap-speak means: Nmap cannot determine whether the port is open because packet filtering prevents its probes from reaching the port. The filtering could be from a dedicated firewall device, router rules, or host-based firewall software. Do you have anything actually listening on port 80? -- Per Jessen, Zürich (15.5°C) http://www.hostsuisse.com/ - dedicated server rental in Switzerland. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org