09-27-2018 12:04 PM - edited 02-21-2020 08:17 AM
Hi All,
I'm trying to run some nmap scans to inside subnets over AnyConnect VPN, but the results are very incosistent. Meaning: sometimes even just a basic portscan will report 0 hosts as up. 5 seconds later the same scan shows the right hosts as up, and the output seems correct.
First every IP within every subnet was reporting as up, but then i disabled "Send Reset Reply for denied inbound TCP connections". But even after that the results are still not as i expect.
So my questions:
1. Is it even recommended/possible to run nmap scans through a (AnyConnect) VPN tunnel?
2. The traffic flows through 2 ASA's (1 for the AnyConnect entry, the other one for the actual routing/firewalling of our production traffic). Are there any specific settings i have to think of to get this to work?
09-28-2018 08:34 PM
Hi,
I would guess the ASAs are messing with your scans. I wouldn't do a scan through a firewall especially with the ASA inspection/threat-detection policies are turned on.
Thanks
John
09-29-2018 12:54 AM
Hi John,
First of all, thank you for your help. Really appreciate it.
To clarify some things:
Basically, i just want all my firewalls to not mess with anything coming from the nmap-machine, but specifically want to scan our endpoints (VM's).
Thanks in advance and have a nice day!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide