Changes

Jump to navigation Jump to search
25 bytes added ,  17:04, 29 March 2013
no edit summary
Line 1: Line 1:  
==Tim's IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==
 
==Tim's IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==
   −
The home of ipscan, an opensource IPv6 firewall tester supporting ICMPv6 pings, UDP/IP and TCP/IP port scans.
+
The home of ipscan, an opensource IPv6 firewall tester supporting ICMPv6 pings as well as UDP and TCP port scans.
    
<analytics uacct="UA-27654202-1" ></analytics>
 
<analytics uacct="UA-27654202-1" ></analytics>
Line 35: Line 35:  
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   
 
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   
 
   
 
   
The test continues by scanning a set of IPv6 UDP/IP ports. The test sets its' UDP socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as 'administratively prohibited' will resolve as PHBTD in much less than the allowed 2 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).
+
The test continues by scanning a set of IPv6 UDP ports. The IPv6 UDP port test sets its' socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as 'administratively prohibited' will resolve as PHBTD in much less than the allowed 2 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).
   −
The test finishes by scanning the user-selected IPv6 TCP/IP ports. The IPv6 TCP test sets its' socket tx/rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as 'administratively prohibited' will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).
+
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its' socket tx/rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as 'administratively prohibited' will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).
      Line 47: Line 47:       −
<font color="red">'''IMPORTANT:''' this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.</font>
+
<font color="red">'''IMPORTANT:''' this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.</font>
     

Navigation menu