nmap -p 80 1.2.3.4 -PnPORT STATE SERVICE80/tcp filtered http
nmap -p 25 1.2.3.5 -PnStarting Nmap 6.47 ( http://nmap.org ) at 2018-05-11 09:38 CESTsendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 1.2.3.5, 16) => Operation not permittedOffending packet: TCP 192.168.6.38:39478 > 1.2.3.5:25 S ttl=59 id=47236 iplen=44 seq=707988922 win=1024 <mss 1460>sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 1.2.3.5, 16) => Operation not permittedOffending packet: TCP 192.168.6.38:39479 > 1.2.3.5:25 S ttl=40 id=38922 iplen=44 seq=707923387 win=1024 <mss 1460>Nmap scan report for server.domain.com (1.2.3.5)Host is up.PORT STATE SERVICE25/tcp filtered smtp
I've been adding 2 rule on LAN interface: from 192.168.2.0/24 to 192.168.6.0/24 Pass from 192.168.3.0/24 to 192.168.6.0/24 Pass
The local computer (192.168.1.100) sends the packet as coming from 192.168.1.100, but the server (192.168.1.2) receives it as coming from 203.0.113.1