![netmap explanation netmap explanation](https://laetusinpraesens.org/docs00s/images/netmap_files/netmap_values/values_det_flip.jpg)
In a large IP range, this is useful for identifying only active or interesting hosts, rather than scanning every single port on every single IP in the range (a lot of which may not even be there). Host Discovery performs a check to see if the host is online. A default scan uses 1000 common TCP ports and has Host Discovery enabled. Typing nmap or nmap will initiate a default scan. To get started, download and install Nmap from the website and then launch a command prompt. Nmap can be extremely useful for helping you get to the root of the problem you are investigating, verify firewall rules or validate your routing tables are configured correctly.
#Netmap explanation how to#
This post will focus on how to use Nmap to scan for open ports.
![netmap explanation netmap explanation](http://www.netmaptools.org/Pages/NetMap_Analysis_Types/drex_stream_power_substrate_custom_2.png)
Amongst other things, it allows you to create a network inventory, managing service upgrade schedules, monitor host or service uptime and scan for open ports and services on a host.
![netmap explanation netmap explanation](https://wiki.netcad.com.tr/download/attachments/217385894/banner_netmap_2.2.jpg)
Nmap is a free, open source and multi-platform network security scanner used for network discovery and security auditing. The articles are still relevant today but I also wanted to follow up and discuss using NMAP to check for open ports. In 20, I wrote a couple of articles called Scanning Open Ports in Windows: A Quick Guide and Scanning Open Ports in Windows: A Quick Guide (Part 2) that covered how to use a series of neat little utilities to view open ports and troubleshoot client or server side application network connectivity issues.