Line 16: |
Line 16: |
| | | |
| | | |
− | The tester is made available in two versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version (right-hand figures) can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version (left-hand figures) supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. | + | The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version (right-hand figures) can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version (left-hand figures) supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some OS and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you're unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting. |
| | | |
| | | |
Line 47: |
Line 47: |
| <font color="red">'''IMPORTANT:''' this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.</font> | | <font color="red">'''IMPORTANT:''' this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.</font> |
| | | |
| + | Tests performed from my www6.ipv6.chappell-family.co.uk host will be sourced from IPv6 address: '''2001:470:1f08:185c::2'''. |
| | | |
| '''If you wish to test your host now then please point your browser towards [http://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]''' | | '''If you wish to test your host now then please point your browser towards [http://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]''' |
| | | |
| + | Note: during periods of planned server maintenance, a reduced service supporting only TCP testing will be offered, which will be sourced from IPv6 address: '''2001:8d8:1000:5070:b524:ef6f:fe50:81e'''. |
| | | |
| === Raspberry Pi Powered IPv6 Firewall Tester === | | === Raspberry Pi Powered IPv6 Firewall Tester === |
Line 55: |
Line 57: |
| Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. | | Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. |
| | | |
− | | + | Tests performed from my Raspberry Pi host will be sourced from IPv6 address: '''2001:470:971f:3:ba27:ebff:fecc:dc7c'''. |
| | | |
| === Issues - Debugging === | | === Issues - Debugging === |