Dear Robert, >nmap -sV ^^^ Have you tried to pin down the actualy requests that bring the service down ? As the nmap service probes are easy to read _ Have you tried reproducing the behaviour by sending the requests listed in the nmap service probe file ? RS> Starting Nmap 4.20 ( http://insecure.org ) at 2007-07-09 14:56 CEST RS> Interesting ports on xxx.xxx.xxx.xxx: RS> Not shown: 1693 closed ports RS> PORT STATE SERVICE VERSION RS> 22/tcp filtered ssh RS> 80/tcp open http Dell Embedded Remote Access card webserver 1.0 RS> 443/tcp open ssl/http Dell Remote Access Controller http interface 2.0 RS> 5900/tcp open vnc? RS> Service Info: Devices: terminal server, remote management -- http://secdev.zoller.lu Thierry Zoller Fingerprint : 5D84 BFDC CD36 A951 2C45 2E57 28B3 75DD 0AC6 F1C7