New
#11
Below is my attempt to clarify nmap's usage somewhat. I hope it helps.
My suggestion was to use nmap to find out what network ports are active on both computers and to find out if the computers' firewalls might be blocking any of those ports.
nmap itself is a command-line program. It should have been accompanied by the GUI interface program Zenmap. Zenmap's visual interface might be easier for you to use than nmap's command line interface. I used Zenmap for the examples below.
I'll assume your Win10 computer is at 192.168.0.10 and your XP computer is at 192.168.0.6.
To see the open ports of the WinXP computer, when you run Zenmap on either computer, you'd specify a "Target" of 192.168.0.6 (step 1 in the first attached picture), specify a "Profile" of "General Scan" (step 2), then click on the button "Scan" (step 3). Wait patiently for Zenmap's display to update. Sometimes it can be slow.
To see the open ports of the Win10 computer, you'd specify a target of 192.168.0.10.
On the computer where you run Zenmap, if you specify its own IP address as the Target, you'll see all of its active network ports. If you specify the IP address of the other computer, you'll only see the ports which are being let through the other computer's firewall. You can find out the intended use of each port by doing a Web search for
network port ####
where you replace #### by the actual port number.
Below are examples, showing what I see on a client (x) and on a media server (y). Both are running Win10.
Access to all of the client's ports are blocked by its local firewall. Its ports are visible only to itself and not to any other computer. None of the media server's active ports are blocked by the server's local firewall. Its ports are visible both to itself and to any other computer connected to the same local network.
ETA: Note that I accidentally wrote "services" instead of "ports" in the second pair of screengrabs.