The question mark above is due to the likelihood that this is a dead brain
cell problem on my part, but anyway .. 

I just ran 1.3.3 against four IP addresses.  One linux box, one SonicWall,
and two that did not exist.

The linux box responds to pings and the security checks flew by pretty fast.

The SonicWall does not respond to pings.  It took slightly longer for the
security checks to begin, but they did indeed start.  The only informational
item on the SonicWall was that it was indeed a "SonicWall/10" which is
correct.

The two bogus IP addresses just sat there in the scanning screen, I assume
while they were being brute force port scanned and waiting for timeouts. 

I seem to recall with earlier versions of Nessus I would have to disable
"Ping Remote Host" to get a full port scan and vulnerability check against
non-responsive hosts?  In this case, it's enabled, so I'm not sure why the
dead hosts are being scanned.

My "Port Scanner" options set are:

NMAP
Scan for LaBrea
Ping Remote Host

Thanks for the help!

Mark

Reply via email to