try disable "ping the remote host" and enable "nmap" do port scan -- Open WebMail Project (http://openwebmail.org)
---------- Original Message ----------- From: [EMAIL PROTECTED] To: Nessus List <[email protected]> Sent: Wed, 13 Sep 2006 17:44:56 +0200 Subject: Port scanner > Hello > > Until now, I was happy and confident in the use of Nessus's TCP > scanner. Today, I had to scan a new machine, behind a FW / router ( > I already scanned machines in this configuration ) The route is > open full IP from the scanner to the target during the scan ( And > as the network admin is 2 desks from mine, I am SURE it has been > done ) > > Nessus TCP scanner reported 0 open ports > Nmap reported correctly 22 80 443 .. as opened and if I use the > "grepable" output of nmap, nessus correctly returned its findings > on the ports. > > My question is : What can I do in order to be sure that the nessus > TCP scanner gives me the right results? Is there parameters I can > play with? > > Cordialement / Mit freundlichen [UTF-8?]Gr羹?en / Best regards, > _____________________________________________ > Patrice Arnal > ISS - DataCenter – E&S > Mailto: [EMAIL PROTECTED] > _____________________________________________ ------- End of Original Message ------- _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
