Girish wrote:
> Hello Ron,
> 
> That was an excellent link.
> Please tell me one more thing, like if I have to scan all the protocols
> over
> TCP of a host behind the firewall from external world, should I have a
> policy for allowing all TCP traffic in my firewall?
> I hope am correct. Please correct me if I am wrong. I can proceed soon.
> 

Typically, you should perform a full scan from outside your firewall to
 an internal system and analyze the results. Performing a full port scan
should find allowed access to the internal systems.

Although out of scope for this mailing list, things you should consider:

- the firewall might allow access to a port closed on your target host.
If this is against policy, you might not find this with a basic scan.

- you should audit what is logged by the firewall. If your policy is to
log all blocked connections, you should see logs for your scan.

- don't forget to consider filtering that may be in place by the host, a
network device and the firewall.

Ron

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to