try disable "ping the remote host" and enable "nmap" do port scan
--
Open WebMail Project (http://openwebmail.org)


---------- Original Message -----------
From: [EMAIL PROTECTED]
To: Nessus List <[email protected]>
Sent: Wed, 13 Sep 2006 17:44:56 +0200
Subject: Port scanner

> Hello
> 
> Until now, I was happy and confident in the use of Nessus's TCP 
> scanner.
 Today, I had to scan a new machine, behind a FW / router ( 
> I already 
 scanned machines in this configuration ) 
 The route is 
> open full IP from the scanner to the target during the scan ( 
 And 
> as the network admin is 2 desks from mine, I am SURE
 it has been 
> done )
> 
> Nessus TCP scanner reported 0 open ports
> Nmap reported correctly 22 80 443 .. as opened and if I use the 
> "grepable" 
 output of nmap, nessus correctly returned its
 findings 
> on the ports.
> 
> My question is : What can I do in order to be sure that the nessus 
> TCP 
 scanner gives me the right results?
 Is there parameters I can 
> play with?
> 
> Cordialement / Mit freundlichen [UTF-8?]Gr羹?en / Best regards, 
> _____________________________________________
> Patrice Arnal
> ISS - DataCenter – E&S 
> Mailto: [EMAIL PROTECTED] 
> _____________________________________________
------- End of Original Message -------

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to