<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nessus scanning in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nessus-scanning/m-p/1516821#M605226</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure what ports Nessus uses to call home.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But .you should only allow ports going to your server from the outside (outside ACL) that you want (for example web if the server is using web). Then all inbound traffic (initiated from outside) will be blocked unless the services you want. Inside initiated conns from Nessus will still work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps and makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 07 Dec 2010 18:24:37 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-12-07T18:24:37Z</dc:date>
    <item>
      <title>Nessus scanning</title>
      <link>https://community.cisco.com/t5/network-security/nessus-scanning/m-p/1516820#M605225</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We recently acquired the Virtual Nessus scanner and have it sitting on a server "inside" our ASA firewall. I want to verify what port(s) that the Nessus needs to go "outside" our firewall to scan other locations. Just curious if it will need a certain TCP or UDP port to reach out or do I have to open the firewall up completely. I do not want to open up the firewall to everything just to allow the scanner to run. Any input would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nessus-scanning/m-p/1516820#M605225</guid>
      <dc:creator>onslaught99</dc:creator>
      <dc:date>2019-03-11T19:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Nessus scanning</title>
      <link>https://community.cisco.com/t5/network-security/nessus-scanning/m-p/1516821#M605226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure what ports Nessus uses to call home.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But .you should only allow ports going to your server from the outside (outside ACL) that you want (for example web if the server is using web). Then all inbound traffic (initiated from outside) will be blocked unless the services you want. Inside initiated conns from Nessus will still work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps and makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Dec 2010 18:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nessus-scanning/m-p/1516821#M605226</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-12-07T18:24:37Z</dc:date>
    </item>
  </channel>
</rss>

