<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: nmap inconsistent results through AnyConnect VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nmap-inconsistent-results-through-anyconnect-vpn/m-p/3715407#M12061</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I would guess the ASAs are messing with your scans. I wouldn't do a scan through a firewall especially with the ASA inspection/threat-detection policies are turned on.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;You can run scans over anyconnect if the intent is to see what the vpn clients can access. For most scans, it wouldn't be recommended to&amp;nbsp; scan from a vpn client because firewall inspection and ips would interfere with the scans.I would recommend you use a host on the network for your scans&lt;/LI&gt;
&lt;LI&gt;The firewall rules, inspection and ips wold need to be evaluated before you can consider doing scans from vpn&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
    <pubDate>Sat, 29 Sep 2018 03:34:16 GMT</pubDate>
    <dc:creator>johnd2310</dc:creator>
    <dc:date>2018-09-29T03:34:16Z</dc:date>
    <item>
      <title>nmap inconsistent results through AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/nmap-inconsistent-results-through-anyconnect-vpn/m-p/3714538#M12059</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to run some nmap scans to inside subnets over AnyConnect VPN, but the results are very incosistent. Meaning: sometimes even just a basic portscan will report 0 hosts as up. 5 seconds later the same scan shows the right hosts as up, and the output seems correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First every IP within every subnet was reporting as up, but then i disabled "Send Reset Reply for denied inbound TCP connections". But even after that the results are still not as i expect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my questions:&lt;BR /&gt;1. Is it even recommended/possible to run nmap scans through a (AnyConnect) VPN tunnel?&lt;/P&gt;
&lt;P&gt;2. The traffic flows through 2 ASA's (1 for the AnyConnect entry, the other one for the actual routing/firewalling of our production traffic). Are there any specific settings i have to think of to get this to work?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nmap-inconsistent-results-through-anyconnect-vpn/m-p/3714538#M12059</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-02-21T16:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: nmap inconsistent results through AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/nmap-inconsistent-results-through-anyconnect-vpn/m-p/3715407#M12061</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I would guess the ASAs are messing with your scans. I wouldn't do a scan through a firewall especially with the ASA inspection/threat-detection policies are turned on.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;You can run scans over anyconnect if the intent is to see what the vpn clients can access. For most scans, it wouldn't be recommended to&amp;nbsp; scan from a vpn client because firewall inspection and ips would interfere with the scans.I would recommend you use a host on the network for your scans&lt;/LI&gt;
&lt;LI&gt;The firewall rules, inspection and ips wold need to be evaluated before you can consider doing scans from vpn&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Sat, 29 Sep 2018 03:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nmap-inconsistent-results-through-anyconnect-vpn/m-p/3715407#M12061</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-09-29T03:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: nmap inconsistent results through AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/nmap-inconsistent-results-through-anyconnect-vpn/m-p/3715455#M12062</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, thank you for your help. Really appreciate it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To clarify some things:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;In this case we want to scan through AnyConnect VPN.&lt;/LI&gt;
&lt;LI&gt;We have about 15-20 VLAN's, and we want to scan all of them. ACL's on the Firewalls are already updated to allow all connections coming from the nmap-machine.&lt;/LI&gt;
&lt;LI&gt;Threat Detection has been disabled on all the Firewalls.&lt;/LI&gt;
&lt;LI&gt;Traffic is flowing through at least 2 firewalls. If i have to change something regarding the inspection policy, i guess i should apply that to every firewall the traffic flows through, right?&lt;/LI&gt;
&lt;LI&gt;If i need to modify antyhing to the inspection policy, what would i have to change?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically, i just want all my firewalls to not mess with anything coming from the nmap-machine, but specifically want to scan our endpoints (VM's).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance and have a nice day!&lt;/P&gt;</description>
      <pubDate>Sat, 29 Sep 2018 07:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nmap-inconsistent-results-through-anyconnect-vpn/m-p/3715455#M12062</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2018-09-29T07:54:54Z</dc:date>
    </item>
  </channel>
</rss>

