The question mark above is due to the likelihood that this is a dead brain cell problem on my part, but anyway ..
I just ran 1.3.3 against four IP addresses. One linux box, one SonicWall, and two that did not exist. The linux box responds to pings and the security checks flew by pretty fast. The SonicWall does not respond to pings. It took slightly longer for the security checks to begin, but they did indeed start. The only informational item on the SonicWall was that it was indeed a "SonicWall/10" which is correct. The two bogus IP addresses just sat there in the scanning screen, I assume while they were being brute force port scanned and waiting for timeouts. I seem to recall with earlier versions of Nessus I would have to disable "Ping Remote Host" to get a full port scan and vulnerability check against non-responsive hosts? In this case, it's enabled, so I'm not sure why the dead hosts are being scanned. My "Port Scanner" options set are: NMAP Scan for LaBrea Ping Remote Host Thanks for the help! Mark
