Hello Until now, I was happy and confident in the use of Nessus's TCP scanner. Today, I had to scan a new machine, behind a FW / router ( I already scanned machines in this configuration ) The route is open full IP from the scanner to the target during the scan ( And as the network admin is 2 desks from mine, I am SURE it has been done )
Nessus TCP scanner reported 0 open ports Nmap reported correctly 22 80 443 .. as opened and if I use the "grepable" output of nmap, nessus correctly returned its findings on the ports. My question is : What can I do in order to be sure that the nessus TCP scanner gives me the right results? Is there parameters I can play with? Cordialement / Mit freundlichen Grüßen / Best regards, _____________________________________________ Patrice Arnal ISS - DataCenter – E&S Mailto: [EMAIL PROTECTED] _____________________________________________
_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
