Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-23 19:06 MSK
Nmap scan report for 10.8.0.6
Host is up (0.078s latency).
Not shown: 978 closed ports
PORT STATE SERVICE
21/tcp filtered ftp
22/tcp open ssh
25/tcp filtered smtp
53/tcp filtered domain
80/tcp filtered http
111/tcp filtered rpcbind
113/tcp filtered ident
139/tcp filtered netbios-ssn
143/tcp filtered imap
199/tcp filtered smux
256/tcp filtered fw1-secureremote
443/tcp filtered https
445/tcp filtered microsoft-ds
554/tcp filtered rtsp
995/tcp filtered pop3s
1025/tcp filtered NFS-or-IIS
1720/tcp filtered h323q931
3306/tcp filtered mysql
3389/tcp filtered ms-wbt-server
8000/tcp open http-alt
8080/tcp filtered http-proxy
8888/tcp filtered sun-answerbook
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http
443/tcp open https
554/tcp open rtsp
8000/tcp open http-alt
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
554/tcp filtered rtsp
8000/tcp open http-alt
# Generated by iptables-save v1.4.21 on Sun Oct 22 12:14:17 2017
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A PREROUTING -d 10.8.0.6/32 -p tcp -m tcp --dport 554 -j DNAT --to-destination 192.168.2.108:554
-A PREROUTING -p udp -m multiport --sports 6970:6971,10580:10581 -m recent --rcheck --seconds 60 --name DEFAULT --mask 255.255.255.255 --rsource -j DNAT --to-destination 192.168.2.108
-A POSTROUTING -d 192.168.2.108/32 -p tcp -m tcp --dport 554 -j SNAT --to-source 192.168.2.3
COMMIT
# Completed on Sun Oct 22 12:14:17 2017
# Generated by iptables-save v1.4.21 on Sun Oct 22 12:14:17 2017
*filter
:INPUT ACCEPT [36680:5385958]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [39389:8045051]
-A INPUT -p tcp -m tcp --dport 49500 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 37777 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p udp -m udp --dport 554 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 554 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8000 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 554 -j ACCEPT
-A FORWARD -i tun0 -j ACCEPT
-A FORWARD -o tun0 -j ACCEPT
-A FORWARD -d 192.168.2.108/32 -i eth0 -p udp -m multiport --sports 6970:6971,10580:10581 -m recent --rcheck --seconds 60 --name DEFAULT --mask 255.255.255.255 --rsource -j ACCEPT
COMMIT
# Completed on Sun Oct 22 12:14:17 2017
pi@rpi:~ $
# Generated by iptables-save v1.4.21 on Sat Oct 21 22:22:08 2017
*nat
:PREROUTING ACCEPT [296:19188]
:INPUT ACCEPT [294:19084]
:OUTPUT ACCEPT [14030:842470]
:POSTROUTING ACCEPT [14022:841990]
-A PREROUTING -d 10.8.0.6/32 -p tcp -m tcp --dport 554 -j DNAT --to-destination 192.168.2.108:554
-A PREROUTING -p udp -m multiport --sports 6970:6971,10580:10581 -m recent --rcheck --seconds 60 --name DEFAULT --mask 255.255.255.255 --rsource -j DNAT --to-destination 192.168.2.108
-A POSTROUTING -d 192.168.2.108/32 -p tcp -m tcp --dport 554 -j SNAT --to-source 10.8.0.6
COMMIT
# Completed on Sat Oct 21 22:22:08 2017
# Generated by iptables-save v1.4.21 on Sat Oct 21 22:22:08 2017
*filter
:INPUT ACCEPT [22802:3745844]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [25198:6092447]
-A INPUT -p tcp -m tcp --dport 49500 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 37777 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p udp -m udp --dport 554 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 554 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8000 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 554 -j ACCEPT
-A FORWARD -i tun0 -j ACCEPT
-A FORWARD -o tun0 -j ACCEPT
-A FORWARD -d 192.168.2.108/32 -i eth0 -p udp -m multiport --sports 6970:6971,10580:10581 -m recent --rcheck --seconds 60 --name DEFAULT --mask 255.255.255.255 --rsource -j ACCEPT
COMMIT
# Completed on Sat Oct 21 22:22:08 2017