SRX security
=================
protect
set
CONFIGURATION
system
interfaces
system
host-name
root-authentication
services
ntp
zones
root-authentication
server
fe-0/0/3
security-zone
ssh
web-management
TESTBED-NMAP-SRX6
127.0.0.1
unit 0 family
encrypted-password
UNTRUST
httpinetinterfaces
https
system-generated-certificate
address"**masked**"
192.168.37.123/24
fe-0/0/3.0 host-inbound-traf
fic security
set
system-services
zones security-zone
traceroute TRUST interfaces fe-0/0/3.0 host-inbound-traffi
c system-services ping
================================================================================
NMAP CONFIGURATION
===========================================
===============================
Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-29 12:31 India Standard
Time
NSE: Loaded 122 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 12:31
Completed NSE at 12:31, 0.00s elapsed
Initiating NSE at 12:31
Completed NSE at 12:31, 0.00s elapsed
Initiating ARP Ping Scan at 12:31
Scanning 192.168.37.123 [1 port]
Completed ARP Ping Scan at 12:31, 0.12s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 12:31
Completed Parallel DNS resolution of 1 host. at 12:32, 13.00s elapsed
Initiating SYN Stealth Scan at 12:32
Scanning 192.168.37.123 [1000 ports]
Completed SYN Stealth Scan at 12:32, 17.13s elapsed (1000 total ports)
Initiating Service scan at 12:32
Initiating OS detection (try #1) against 192.168.37.123
NSE: Script scanning 192.168.37.123.
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Nmap scan report for 192.168.37.123
Host is up (0.0018s latency).
Not shown: 999 filtered ports
PORT
STATE SERVICE VERSION
33899/tcp closed unknown
MAC Address: 84:B5:9C:A5:C6:C3 (Juniper networks)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
TRACEROUTE
HOP RTT
ADDRESS
1 1.79 ms 192.168.37.123
NSE: Script Post-scanning.
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https
://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 34.38 seconds
Raw packets sent: 2015 (90.162KB) | Rcvd: 5 (434B)