All outputs are example outputs, generated on my own local network (mapping a raspberry pi with Raspbian; Linux pi 3.18.0-trunk-rpi #1 PREEMPT Debian 3.18.5-1~exp1+rpi19 (2015-08-08) armv6l GNU/Linux). See exercise3a. # nmap 192.168.84.10 # (for example); basic 1000 TCP ports scan Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:36 CEST Nmap scan report for 192.168.84.75 Host is up (0.0000040s latency). Not shown: 997 closed ports PORT STATE SERVICE 80/tcp open http 111/tcp open rpcbind 443/tcp open https # nmap -sS 192.168.84.10 # TCP SYN scan; only check handshake (doesn't need that many connections) Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:44 CEST Nmap scan report for 192.168.84.75 Host is up (0.000054s latency). Not shown: 997 closed ports PORT STATE SERVICE 80/tcp open http 111/tcp open rpcbind 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 89.55 seconds # nmap -sT 192.168.84.10 # TCP connect scan; if TCP SYN doesn't work Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST Nmap scan report for 192.168.84.75 Host is up (0.00016s latency). Not shown: 997 closed ports PORT STATE SERVICE 80/tcp open http 111/tcp open rpcbind 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds # nmap -sU 192.168.84.10 # UDP Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST Nmap scan report for 192.168.84.75 Host is up (0.000054s latency). Not shown: 995 closed ports PORT STATE SERVICE 68/udp open|filtered dhcpc 111/udp open rpcbind 631/udp open|filtered ipp 1900/udp open|filtered upnp 5353/udp open|filtered zeroconf Nmap done: 1 IP address (1 host up) scanned in 187.41 seconds I would use others from the manual if these fail.