nmap port scanner shows open ports when destination is to a VS on the front end
Our security team run scans for vlunerability and he doesn't them from the public internet.
It was noticed that based on the image the Big-IP does respond differently but for all images the nmap scan returns all ports scanned as open.
I've see responses about similar scans but from the inside but I noticed that on our most recent image, the packets from Scans doesn't reach the front end interface of the Big-IP for this specific VS. Instead it receives only an ACK then on the next packet it receives a RST.
Trying to figure out why did the responses change from earlier image and why the latest image upgrade recommended by F5 shows the same issue when open ports are scanned from the public Internet.