Advertisement
Guest User

JunOS FW default wan config

a guest
May 12th, 2018
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.25 KB | None | 0 0
  1. Starting Nmap 7.60 ( https://nmap.org ) at 2018-05-12 11:57 CEST
  2. Nmap scan report for xxxxxxxxxxxx (yyy.yyy.yyy.yyy)
  3. Host is up (0.036s latency).
  4. rDNS record for yyy.yyy.yyy.yyy: xxxxxxxxxxxxxxxxxxxx
  5. Not shown: 923 filtered ports
  6. PORT STATE SERVICE VERSION
  7. 9/tcp open tcpwrapped
  8. 17/tcp open tcpwrapped
  9. 22/tcp open ssh OpenSSH 6.9 (protocol 2.0)
  10. 37/tcp open tcpwrapped
  11. 100/tcp open tcpwrapped
  12. 146/tcp open tcpwrapped
  13. 163/tcp open tcpwrapped
  14. 255/tcp open tcpwrapped
  15. 406/tcp open tcpwrapped
  16. 481/tcp open tcpwrapped
  17. 500/tcp open tcpwrapped
  18. 543/tcp open tcpwrapped
  19. 563/tcp open tcpwrapped
  20. 873/tcp open tcpwrapped
  21. 1010/tcp open tcpwrapped
  22. 1044/tcp open tcpwrapped
  23. 1045/tcp open tcpwrapped
  24. 1065/tcp open tcpwrapped
  25. 1083/tcp open tcpwrapped
  26. 1097/tcp open tcpwrapped
  27. 1151/tcp open tcpwrapped
  28. 1218/tcp open tcpwrapped
  29. 1247/tcp open tcpwrapped
  30. 1272/tcp open tcpwrapped
  31. 1322/tcp open tcpwrapped
  32. 1455/tcp open tcpwrapped
  33. 1556/tcp open tcpwrapped
  34. 1875/tcp open tcpwrapped
  35. 1971/tcp open tcpwrapped
  36. 2001/tcp open tcpwrapped
  37. 2049/tcp open tcpwrapped
  38. 2170/tcp open tcpwrapped
  39. 2190/tcp open tcpwrapped
  40. 2809/tcp open tcpwrapped
  41. 3005/tcp open tcpwrapped
  42. 3011/tcp open tcpwrapped
  43. 3013/tcp open tcpwrapped
  44. 3351/tcp open tcpwrapped
  45. 3580/tcp open tcpwrapped
  46. 3659/tcp open tcpwrapped
  47. 3690/tcp open tcpwrapped
  48. 3814/tcp open tcpwrapped
  49. 3878/tcp open tcpwrapped
  50. 4001/tcp open tcpwrapped
  51. 4125/tcp open tcpwrapped
  52. 4446/tcp open tcpwrapped
  53. 5009/tcp open tcpwrapped
  54. 5054/tcp open tcpwrapped
  55. 5802/tcp open tcpwrapped
  56. 5903/tcp open tcpwrapped
  57. 6004/tcp open tcpwrapped
  58. 6881/tcp open tcpwrapped
  59. 6969/tcp open tcpwrapped
  60. 7200/tcp open tcpwrapped
  61. 7402/tcp open tcpwrapped
  62. 7512/tcp open tcpwrapped
  63. 8181/tcp open tcpwrapped
  64. 8651/tcp open tcpwrapped
  65. 9009/tcp open tcpwrapped
  66. 9081/tcp open tcpwrapped
  67. 9503/tcp open tcpwrapped
  68. 9929/tcp open tcpwrapped
  69. 10000/tcp open tcpwrapped
  70. 10004/tcp open tcpwrapped
  71. 14441/tcp open tcpwrapped
  72. 16992/tcp open tcpwrapped
  73. 16993/tcp open tcpwrapped
  74. 19350/tcp open tcpwrapped
  75. 22939/tcp open tcpwrapped
  76. 26214/tcp open tcpwrapped
  77. 27355/tcp open tcpwrapped
  78. 27715/tcp open tcpwrapped
  79. 32775/tcp open tcpwrapped
  80. 35500/tcp open tcpwrapped
  81. 49176/tcp open tcpwrapped
  82. 50800/tcp open tcpwrapped
  83. 55056/tcp open tcpwrapped
  84. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  85. Device type: general purpose|firewall
  86. Running (JUST GUESSING): FreeBSD 6.X (98%), Juniper JUNOS 12.X|10.X (89%), m0n0wall FreeBSD (89%), Netasq embedded (89%)
  87. OS CPE: cpe:/o:freebsd:freebsd:6.2 cpe:/o:juniper:junos:12 cpe:/o:m0n0wall:freebsd cpe:/o:juniper:junos:10 cpe:/h:netasq:u70
  88. Aggressive OS guesses: FreeBSD 6.2-RELEASE (98%), Juniper SRX-series firewall (JunOS 12.1) (89%), m0n0wall 1.3b11 - 1.3b15 FreeBSD-based firewall (89%), Juniper SRX100-series or SRX200-series firewall (JUNOS 10.4 - 12.1) (89%), Netasq U70 firewall (89%)
  89. No exact OS matches for host (test conditions non-ideal).
  90.  
  91. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  92. Nmap done: 1 IP address (1 host up) scanned in 104.01 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement