![]() ![]() So performing vulnerability scans in this sort of environment involves knowing the security policy and being able to work with it. For example, port 80 traffic could be denied from the 10.10.0.0/16 subnet heading out to the Internet. In some cases, this is a device that prevents certain types of network traffic from flowing between different network segments. ![]() This post will discuss several issues with scanning hosts behind firewalls and strategies Nessus users can use to overcome this.īefore we get started, the term "firewall" is often used loosely. Regardless if you are running Nessus for the first time, or deploying distributed Nessus scanners managed by Tenable.sc or Tenable.io, knowing how to scan systems protected by firewalls is vital. Additional resources can be found at the bottom of this page.įor first-time (and even veteran) Nessus users, Tenable support often gets questions about how to access the security of a host that is behind a firewall. Note: This guide was updated in January 2021 to reflect Tenable's latest product coverage. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |