Custom port mapping isn't really anything more than obscurity. You're not really highlighting anything more than a pretty basic nmap scan and considering how noisy -A is. It's pretty obvious that any 'decent' IDS should be blocking that kind of noisy traffic. T4 is ridiculously fast and incredibly aggressive. This is basically a default scan which is making no attempt to be 'stealthy' - You should try using more custom scanning commands and see how solid that IDS really is.
"Hey there server, can you let me establish a connection with every port I can and can I also get the banner information so I can see what port, version you're running. Could you also engage the NSE so I can get all this juicy information".
1 could literally be the result of an IDS/firewall rules, the other could be out of the box as default as it gets.
"Hey there server, can you let me establish a connection with every port I can and can I also get the banner information so I can see what port, version you're running. Could you also engage the NSE so I can get all this juicy information".
1 could literally be the result of an IDS/firewall rules, the other could be out of the box as default as it gets.