The gateway of the the target router and the pc are both set to 192.168.1.1 but there is no actual hardware with that ip in this construct. NMAP is set to scan the wan ip of the target router, 192.168.1.15. various scans were tried including options, -O, - p -, -sA. each option was tried individually.
To understand better what I am trying to communicate, consider the following common real world construct. Internet->cable/dsl modem->router with DMZ set to a.b.c.d->devices. Router with DMZ set is called the 'outside router'. The devices include various servers and another router whose wan ip is the DMZ ip.
So to test the DMZ-ness function, I took the outside router offline (off the internet) , assigned it a WAN ip in the same subnet of my pc (shouldn't really matter anyway), aimed nmap at it, and fired away.
this is a testing scenario , there is no outside router. Effectively, the the pc and the wan port of the target router are connected on the same net. I could put them on a switch but to simplify matters, The pc is wired directly to the wan side of the router. I am using my pc to probe and test my router so effectively, the pc is behaving like someone on the 'raw internet' might be.