CDRouter Security Test Summaries (Full)

Test Case Descriptions

  • Modules: 6
  • Test Cases: 78

Below is a full description of the testcases in each module


internet-schedule.tcl

Internet schedule parental controls tests

Test Name Synopsis
Verify internet access schedule for Sunday internet_schedule_sunday Verify internet access schedule for Sunday


    step 1. Set NTP start time to the start of the next Sunday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Sunday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Sunday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Sunday internet access schedule is defined
    by the testvars internetScheduleSundayMode and
    internetScheduleSundayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Monday internet_schedule_monday Verify internet access schedule for Monday


    step 1. Set NTP start time to the start of the next Monday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Monday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Monday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Monday internet access schedule is defined
    by the testvars internetScheduleMondayMode and
    internetScheduleMondayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Tuesday internet_schedule_tuesday Verify internet access schedule for Tuesday


    step 1. Set NTP start time to the start of the next Tuesday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Tuesday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Tuesday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Tuesday internet access schedule is defined
    by the testvars internetScheduleTuesdayMode and
    internetScheduleTuesdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Wednesday internet_schedule_wednesday Verify internet access schedule for Wednesday


    step 1. Set NTP start time to the start of the next Wednesday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Wednesday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Wednesday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Wednesday internet access schedule is defined
    by the testvars internetScheduleWednesdayMode and
    internetScheduleWednesdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Thursday internet_schedule_thursday Verify internet access schedule for Thursday


    step 1. Set NTP start time to the start of the next Thursday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Thursday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Thursday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Thursday internet access schedule is defined
    by the testvars internetScheduleThursdayMode and
    internetScheduleThursdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Friday internet_schedule_friday Verify internet access schedule for Friday


    step 1. Set NTP start time to the start of the next Friday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Friday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Friday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Friday internet access schedule is defined
    by the testvars internetScheduleFridayMode and
    internetScheduleFridayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Saturday internet_schedule_saturday Verify internet access schedule for Saturday


    step 1. Set NTP start time to the start of the next Saturday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Saturday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Saturday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Saturday internet access schedule is defined
    by the testvars internetScheduleSaturdayMode and
    internetScheduleSaturdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.

internet-schedule-v6.tcl

Internet schedule parental controls tests (IPv6)

Test Name Synopsis
Verify internet access schedule for Sunday (IPv6) ipv6_internet_schedule_sunday Verify internet access schedule for Sunday (IPv6)


    step 1. Set NTP start time to the start of the next Sunday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request over IPv6 from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Sunday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS over IPv6

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Sunday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Sunday internet access schedule is defined
    by the testvars internetScheduleSundayMode and
    internetScheduleSundayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Monday (IPv6) ipv6_internet_schedule_monday Verify internet access schedule for Monday (IPv6)


    step 1. Set NTP start time to the start of the next Monday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request over IPv6 from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Monday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS over IPv6

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Monday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Monday internet access schedule is defined
    by the testvars internetScheduleMondayMode and
    internetScheduleMondayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Tuesday (IPv6) ipv6_internet_schedule_tuesday Verify internet access schedule for Tuesday (IPv6)


    step 1. Set NTP start time to the start of the next Tuesday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request over IPv6 from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Tuesday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS over IPv6

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Tuesday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Tuesday internet access schedule is defined
    by the testvars internetScheduleTuesdayMode and
    internetScheduleTuesdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Wednesday (IPv6) ipv6_internet_schedule_wednesday Verify internet access schedule for Wednesday (IPv6)


    step 1. Set NTP start time to the start of the next Wednesday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request over IPv6 from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Wednesday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS over IPv6

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Wednesday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Wednesday internet access schedule is defined
    by the testvars internetScheduleWednesdayMode and
    internetScheduleWednesdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Thursday (IPv6) ipv6_internet_schedule_thursday Verify internet access schedule for Thursday (IPv6)


    step 1. Set NTP start time to the start of the next Thursday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request over IPv6 from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Thursday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS over IPv6

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Thursday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Thursday internet access schedule is defined
    by the testvars internetScheduleThursdayMode and
    internetScheduleThursdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Friday (IPv6) ipv6_internet_schedule_friday Verify internet access schedule for Friday (IPv6)


    step 1. Set NTP start time to the start of the next Friday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request over IPv6 from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Friday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS over IPv6

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Friday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Friday internet access schedule is defined
    by the testvars internetScheduleFridayMode and
    internetScheduleFridayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.
Test Name Synopsis
Verify internet access schedule for Saturday (IPv6) ipv6_internet_schedule_saturday Verify internet access schedule for Saturday (IPv6)


    step 1. Set NTP start time to the start of the next Saturday

    step 2. Restart DUT to force NTP request

    step 3. Send an HTTP GET request over IPv6 from the LAN client to
            a remote host on the internet

    step 4. Verify that the HTTP request succeeds or fails as expected
            based on the LAN client's Saturday internet access schedule

    step 5. Repeat steps 3 and 4 using HTTPS over IPv6

    step 6. Repeat steps 1 through 5, advancing the NTP start time set
            in step 1 to test the LAN client's internet access at
            various points throughout the day

    NOTE: The base time used to calculate the next Saturday in the first
    iteration of step 1 is defined by the testvar
    internetScheduleBase.  The time zone configured on the DUT must
    match that defined by the testvar internetScheduleTimeZone.

    NOTE: The LAN client's Saturday internet access schedule is defined
    by the testvars internetScheduleSaturdayMode and
    internetScheduleSaturdayTimes.

    NOTE: This test allows the DUT to prevent a LAN client's internet
    access by filtering the DNS query for the remote host, by
    preventing establishment of the TCP connection, by using a proxy
    to return a non-200 HTTP status code or by using a proxy to return
    a 200 HTTP status code with alternate web page text indicating
    that the page was administratively blocked.  The testvar
    internetScheduleBlockedText should be configured with a portion of
    the expected text returned when a page is blocked by the DUT.

    NOTE: If the testvar cpeRebootMode is set to "skip", this test
    will not be run.  If the testvar cpeRebootMode is set to "reboot",
    the CPE will be restarted during the test, either using the
    testvar RestartDut or by prompting the user.

nmap.tcl

Nmap based IPv4 portscan tests from the LAN side of the device

Test Name Synopsis
Nmap IPv4 TCP Connect scan v4_lan_tcp_connect_info Nmap IPv4 TCP Connect scan


    step 1. Initiate a Nmap IPv4 TCP Connect scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Syn scan v4_lan_tcp_syn_info Nmap IPv4 TCP Syn scan


    step 1. Initiate a Nmap IPv4 TCP Syn scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Fin scan v4_lan_tcp_fin_info Nmap IPv4 TCP Fin scan


    step 1. Initiate a Nmap IPv4 TCP Fin scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Null scan v4_lan_tcp_null_info Nmap IPv4 TCP Null scan


    step 1. Initiate a Nmap IPv4 TCP Null scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP XMAS scan v4_lan_tcp_xmas_info Nmap IPv4 TCP XMAS scan


    step 1. Initiate a Nmap IPv4 TCP XMAS scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP PSH scan v4_lan_tcp_psh_info Nmap IPv4 TCP PSH scan


    step 1. Initiate a Nmap IPv4 TCP PSH scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP URG scan v4_lan_tcp_urg_info Nmap IPv4 TCP URG scan


    step 1. Initiate a Nmap IPv4 TCP URG scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP FIN+URG scan v4_lan_tcp_finurg_info Nmap IPv4 TCP FIN+URG scan


    step 1. Initiate a Nmap IPv4 TCP FIN+URG scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP FIN+PSH scan v4_lan_tcp_finpsh_info Nmap IPv4 TCP FIN+PSH scan


    step 1. Initiate a Nmap IPv4 TCP FIN+PSH scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Maimon scan v4_lan_tcp_maimon_info Nmap IPv4 TCP Maimon scan


    step 1. Initiate a Nmap IPv4 TCP Maimon scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP ACK scan v4_lan_tcp_ack_info Nmap IPv4 TCP ACK scan


    step 1. Initiate a Nmap IPv4 TCP ACK scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 UDP scan v4_lan_udp_info Nmap IPv4 UDP scan


    step 1. Initiate a Nmap IPv4 UDP scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 SCTP Init scan v4_lan_sctp_init_info Nmap IPv4 SCTP Init scan


    step 1. Initiate a Nmap IPv4 SCTP Init scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 SCTP Cookie scan v4_lan_sctp_cookie_info Nmap IPv4 SCTP Cookie scan


    step 1. Initiate a Nmap IPv4 SCTP Cookie scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 OS Detection from LAN side of device v4_lan_os_detection Nmap IPv4 OS Detection from LAN side of device


    step 1. Initiate a Nmap IPv4 scan for OS detection from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 OS Detection with version detection from LAN side of device v4_lan_os_detection_version Nmap IPv4 OS Detection with version detection from LAN side of device


    step 1. Initiate a Nmap IPv4 scan for OS detection with version detection from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html

nmap-wan.tcl

Nmap based IPv4 portscan tests from the WAN side of the device

Test Name Synopsis
Nmap IPv4 TCP Connect scan v4_wan_tcp_connect_info Nmap IPv4 TCP Connect scan


    step 1. Initiate a Nmap IPv4 TCP Connect scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Syn scan v4_wan_tcp_syn_info Nmap IPv4 TCP Syn scan


    step 1. Initiate a Nmap IPv4 TCP Syn scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Fin scan v4_wan_tcp_fin_info Nmap IPv4 TCP Fin scan


    step 1. Initiate a Nmap IPv4 TCP Fin scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Null scan v4_wan_tcp_null_info Nmap IPv4 TCP Null scan


    step 1. Initiate a Nmap IPv4 TCP Null scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP XMAS scan v4_wan_tcp_xmas_info Nmap IPv4 TCP XMAS scan


    step 1. Initiate a Nmap IPv4 TCP XMAS scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP PSH scan v4_wan_tcp_psh_info Nmap IPv4 TCP PSH scan


    step 1. Initiate a Nmap IPv4 TCP PSH scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP URG scan v4_wan_tcp_urg_info Nmap IPv4 TCP URG scan


    step 1. Initiate a Nmap IPv4 TCP URG scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP FIN+URG scan v4_wan_tcp_finurg_info Nmap IPv4 TCP FIN+URG scan


    step 1. Initiate a Nmap IPv4 TCP FIN+URG scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP FIN+PSH scan v4_wan_tcp_finpsh_info Nmap IPv4 TCP FIN+PSH scan


    step 1. Initiate a Nmap IPv4 TCP FIN+PSH scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP Maimon scan v4_wan_tcp_maimon_info Nmap IPv4 TCP Maimon scan


    step 1. Initiate a Nmap IPv4 TCP Maimon scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 TCP ACK scan v4_wan_tcp_ack_info Nmap IPv4 TCP ACK scan


    step 1. Initiate a Nmap IPv4 TCP ACK scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 UDP scan v4_wan_udp_info Nmap IPv4 UDP scan


    step 1. Initiate a Nmap IPv4 UDP scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 SCTP Init scan v4_wan_sctp_init_info Nmap IPv4 SCTP Init scan


    step 1. Initiate a Nmap IPv4 SCTP Init scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 SCTP Cookie scan v4_wan_sctp_cookie_info Nmap IPv4 SCTP Cookie scan


    step 1. Initiate a Nmap IPv4 SCTP Cookie scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 OS Detection from WAN side of device v4_wan_os_detection Nmap IPv4 OS Detection from WAN side of device


    step 1. Initiate a Nmap IPv4 scan for OS detection from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv4 OS Detection with version detection from WAN side of device v4_wan_os_detection_version Nmap IPv4 OS Detection with version detection from WAN side of device


    step 1. Initiate a Nmap IPv4 scan for OS detection with version detection from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html

nmap-v6.tcl

Nmap based IPv6 portscan tests from the LAN side of the device

Test Name Synopsis
Nmap IPv6 TCP Connect scan v6_lan_tcp_connect_info Nmap IPv6 TCP Connect scan


    step 1. Initiate a Nmap IPv6 TCP Connect scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Syn scan v6_lan_tcp_syn_info Nmap IPv6 TCP Syn scan


    step 1. Initiate a Nmap IPv6 TCP Syn scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Fin scan v6_lan_tcp_fin_info Nmap IPv6 TCP Fin scan


    step 1. Initiate a Nmap IPv6 TCP Fin scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Null scan v6_lan_tcp_null_info Nmap IPv6 TCP Null scan


    step 1. Initiate a Nmap IPv6 TCP Null scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP XMAS scan v6_lan_tcp_xmas_info Nmap IPv6 TCP XMAS scan


    step 1. Initiate a Nmap IPv6 TCP XMAS scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP PSH scan v6_lan_tcp_psh_info Nmap IPv6 TCP PSH scan


    step 1. Initiate a Nmap IPv6 TCP PSH scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP URG scan v6_lan_tcp_urg_info Nmap IPv6 TCP URG scan


    step 1. Initiate a Nmap IPv6 TCP URG scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP FIN+URG scan v6_lan_tcp_finurg_info Nmap IPv6 TCP FIN+URG scan


    step 1. Initiate a Nmap IPv6 TCP FIN+URG scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP FIN+PSH scan v6_lan_tcp_finpsh_info Nmap IPv6 TCP FIN+PSH scan


    step 1. Initiate a Nmap IPv6 TCP FIN+PSH scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Maimon scan v6_lan_tcp_maimon_info Nmap IPv6 TCP Maimon scan


    step 1. Initiate a Nmap IPv6 TCP Maimon scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP ACK scan v6_lan_tcp_ack_info Nmap IPv6 TCP ACK scan


    step 1. Initiate a Nmap IPv6 TCP ACK scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 UDP scan v6_lan_udp_info Nmap IPv6 UDP scan


    step 1. Initiate a Nmap IPv6 UDP scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 SCTP Init scan v6_lan_sctp_init_info Nmap IPv6 SCTP Init scan


    step 1. Initiate a Nmap IPv6 SCTP Init scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 SCTP Cookie scan v6_lan_sctp_cookie_info Nmap IPv6 SCTP Cookie scan


    step 1. Initiate a Nmap IPv6 SCTP Cookie scan from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 OS Detection from LAN side of device v6_lan_os_detection Nmap IPv6 OS Detection from LAN side of device


    step 1. Initiate a Nmap IPv6 scan for OS detection from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 OS Detection with version detection from LAN side of device v6_lan_os_detection_version Nmap IPv6 OS Detection with version detection from LAN side of device


    step 1. Initiate a Nmap IPv6 scan for OS detection with version detection from the LAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html

nmap-wan-v6.tcl

Nmap based IPv6 portscan tests from the WAN side of the device

Test Name Synopsis
Nmap IPv6 TCP Connect scan v6_wan_tcp_connect_info Nmap IPv6 TCP Connect scan


    step 1. Initiate a Nmap IPv6 TCP Connect scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Syn scan v6_wan_tcp_syn_info Nmap IPv6 TCP Syn scan


    step 1. Initiate a Nmap IPv6 TCP Syn scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Fin scan v6_wan_tcp_fin_info Nmap IPv6 TCP Fin scan


    step 1. Initiate a Nmap IPv6 TCP Fin scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Null scan v6_wan_tcp_null_info Nmap IPv6 TCP Null scan


    step 1. Initiate a Nmap IPv6 TCP Null scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP XMAS scan v6_wan_tcp_xmas_info Nmap IPv6 TCP XMAS scan


    step 1. Initiate a Nmap IPv6 TCP XMAS scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP PSH scan v6_wan_tcp_psh_info Nmap IPv6 TCP PSH scan


    step 1. Initiate a Nmap IPv6 TCP PSH scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP URG scan v6_wan_tcp_urg_info Nmap IPv6 TCP URG scan


    step 1. Initiate a Nmap IPv6 TCP URG scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP FIN+URG scan v6_wan_tcp_finurg_info Nmap IPv6 TCP FIN+URG scan


    step 1. Initiate a Nmap IPv6 TCP FIN+URG scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP FIN+PSH scan v6_wan_tcp_finpsh_info Nmap IPv6 TCP FIN+PSH scan


    step 1. Initiate a Nmap IPv6 TCP FIN+PSH scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP Maimon scan v6_wan_tcp_maimon_info Nmap IPv6 TCP Maimon scan


    step 1. Initiate a Nmap IPv6 TCP Maimon scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 TCP ACK scan v6_wan_tcp_ack_info Nmap IPv6 TCP ACK scan


    step 1. Initiate a Nmap IPv6 TCP ACK scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 UDP scan v6_wan_udp_info Nmap IPv6 UDP scan


    step 1. Initiate a Nmap IPv6 UDP scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 SCTP Init scan v6_wan_sctp_init_info Nmap IPv6 SCTP Init scan


    step 1. Initiate a Nmap IPv6 SCTP Init scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 SCTP Cookie scan v6_wan_sctp_cookie_info Nmap IPv6 SCTP Cookie scan


    step 1. Initiate a Nmap IPv6 SCTP Cookie scan from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 OS Detection from WAN side of device v6_wan_os_detection Nmap IPv6 OS Detection from WAN side of device


    step 1. Initiate a Nmap IPv6 scan for OS detection from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html
Test Name Synopsis
Nmap IPv6 OS Detection with version detection from WAN side of device v6_wan_os_detection_version Nmap IPv6 OS Detection with version detection from WAN side of device


    step 1. Initiate a Nmap IPv6 scan for OS detection with version detection from the WAN
    step 2. Display the final Nmap report

    References:

    Nmap Network Scanning "The Official Nmap Project Guide to Network Discovery and Security Scanning"

    https://nmap.org/book/toc.html