Hello

Until now, I was happy and confident in the use of Nessus's TCP scanner.
Today, I had to scan a new machine, behind a FW / router ( I already 
scanned machines in this configuration ) 
The route is open full IP from the scanner to the target during the scan ( 
And as the network admin is 2 desks from mine, I am SURE
it has been done )

Nessus TCP scanner reported 0 open ports
Nmap reported correctly 22 80 443 .. as opened and if I use the "grepable" 
output of nmap, nessus correctly returned its
findings on the ports.

My question is : What can I do in order to be sure that the nessus TCP 
scanner gives me the right results?
Is there parameters I can play with? 


Cordialement / Mit freundlichen Grüßen / Best regards, 
_____________________________________________
Patrice Arnal
ISS - DataCenter – E&S 
Mailto: [EMAIL PROTECTED] 
_____________________________________________
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to