Ce qui nous donne les éléments suivants :
Pour l'IP 192.168.4.1
Starting Nmap 4.20 ( http://insecure.org ) at 2007-09-11 14:30 Paris, Madrid
Insufficient responses for TCP sequencing (1), OS detection may be less accurate
Insufficient responses for TCP sequencing (0), OS detection may be less accurate
Interesting ports on 192.168.4.1:
Not shown: 1694 closed ports
PORT STATE SERVICE VERSION
25/tcp filtered smtp
1720/tcp open H.323/Q.931?
5060/tcp open sip?
Device type: router|WAP|switch
Running (JUST GUESSING) : Cisco IOS 12.X (88%)
Aggressive OS guesses: Cisco Catalyst 4506 switch running IOS 12.2 (88%), Cisco 820-series router running IOS 12.3 (87%), Cisco AIR-AP1232AG-E-K9 WAP (IOS 12.3(7)) (86%), Cisco Catalyst 3750 switch, IOS 12.2 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops
OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 177.875 seconds
Et sur l'ip suivante 192.168.4.129
Starting Nmap 4.20 ( http://insecure.org ) at 2007-09-11 14:42 Paris, Madrid
Interesting ports on 192.168.4.129:
Not shown: 1694 closed ports
PORT STATE SERVICE VERSION
25/tcp filtered smtp
1720/tcp open H.323/Q.931?
5060/tcp open tcpwrapped
No exact OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=4.20%D=9/11%OT=1720%CT=1%CU=33903%PV=Y%DS=9%G=Y%TM=46E68DEF%P=i68
OS:6-pc-windows-windows)SEQ(SP=F7%GCD=1%ISR=101%TI=Z%II=RI%TS=U)OPS(O1=%O2=
OS:%O3=%O4=%O5=%O6=)SEQ(SP=F9%GCD=1%ISR=101%TI=Z%TS=U)OPS(O1=M218%O2=M218%O
OS:3=M218%O4=M218%O5=M218%O6=M109)OPS(O1=%O2=%O3=%O4=%O5=%O6=)WIN(W1=1020%W
OS:2=1020%W3=1020%W4=1020%W5=1020%W6=1020)OPS(O1=%O2=%O3=%O4=%O5=%O6=)WIN(W
OS:1=1020%W2=1020%W3=1020%W4=1020%W5=1020%W6=1020)ECN(R=Y%DF=N%T=100%W=1020
OS:%O=%CC=N%Q=)WIN(W1=1020%W2=1020%W3=1020%W4=1020%W5=1020%W6=1020)ECN(R=Y%
OS:DF=N%T=100%W=1020%O=M218%CC=N%Q=)T1(R=Y%DF=N%T=100%S=O%A=O%F=A%RD=0%Q=)E
OS:CN(R=Y%DF=N%T=100%W=1020%O=%CC=N%Q=)T1(R=Y%DF=N%T=100%S=O%A=S+%F=AS%RD=0
OS:%Q=)T1(R=Y%DF=N%T=100%S=O%A=O%F=AS%RD=0%Q=)T1(R=Y%DF=N%T=100%S=O%A=O%F=A
OS:%RD=0%Q=)T2(R=N)T1(R=Y%DF=N%T=100%S=O%A=O%F=A%RD=0%Q=)T2(R=N)T3(R=N)T2(R
OS:=N)T3(R=N)T4(R=Y%DF=N%T=100%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T3(R=N)T4(R=Y%DF=
OS:N%T=100%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=N%T=100%W=0%S=A%A=S+%F=AR%O
OS:=%RD=0%Q=)T4(R=Y%DF=N%T=100%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=N%T=100
OS:%W=0%S=A%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N%T=100%W=0%S=A%A=Z%F=R%O=%RD=0%
OS:Q=)T5(R=Y%DF=N%T=100%W=0%S=A%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N%T=100%W=0%
OS:S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)T6(R=Y%DF=N%T=100%W=0%S=A%A=Z%F=R%O=%RD=0%
OS:Q=)T7(R=N)U1(R=Y%DF=N%T=100%TOS=0%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=
OS:G%RUL=G%RUD=G)T7(R=N)U1(R=Y%DF=N%T=100%TOS=0%IPL=38%UN=0%RIPL=G%RID=G%RI
OS:PCK=G%RUCK=G%RUL=G%RUD=G)IE(R=Y%DFI=S%T=100%TOSI=Z%CD=S%SI=S%DLI=S)U1(R=
OS:Y%DF=N%T=100%TOS=0%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUL=G%RUD=G)I
OS:E(R=Y%DFI=S%T=100%TOSI=Z%CD=S%SI=S%DLI=S)IE(R=Y%DFI=S%T=100%TOSI=Z%CD=S%
OS:SI=S%DLI=S)
Network Distance: 9 hops
OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 160.516 seconds
Et sur l'ip suivante 192.168.9.1
Starting Nmap 4.20 ( http://insecure.org ) at 2007-09-11 14:42 Paris, Madrid
Insufficient responses for TCP sequencing (0), OS detection may be less accurate
Interesting ports on 192.168.9.129:
Not shown: 1694 closed ports
PORT STATE SERVICE VERSION
25/tcp filtered smtp
1720/tcp open H.323/Q.931?
5060/tcp open tcpwrapped
Device type: router|WAP|switch
Running (JUST GUESSING) : Cisco IOS 12.X (88%)
Aggressive OS guesses: Cisco Catalyst 4506 switch running IOS 12.2 (88%), Cisco 820-series router running IOS 12.3 (86%), Cisco AIR-AP1232AG-E-K9 WAP (IOS 12.3(7)) (86%), Cisco Catalyst 3750 switch, IOS 12.2 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops
OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 149.031 seconds
Je te laisse me dire ce que tu pense de mes logs. Par ailleurs, que pense tu de cette histoire de passerelles dédiées ?