This paper contains a step by step detailed walk-through of
different nmap scanning techniques and how the nmap traffic looks
like in wireshark for each scan. The objective of documenting the
paper is to get a better understanding of packets while initiating
any nmap scan so that it can help in bypassing firewalls or
debugging what went wrong between the source and destination. It
can also help in writing basic firewall rules.
Read more https://packetstormsecurity.com/files/163710/demystifying-nmap.pdf