Hello everybody,

PF offers a great OS-Detection wich enable me to block all Packets from
NMAP (OS: NMAP).

But I thought about another problem.
How can I drop the IP of an nmap-scanning computer into a table?

Such an overload-option (like for max-src-conn) would be very neat
because a host which tried to scan could try e.g. a brute-force either
(or simply use other tools not detectable by ospf).

So does somebody know how to handle such situations?

Kind regards,
Sebastian

Reply via email to