12-07-2015 01:59 PM - edited 03-12-2019 12:00 AM
Hi,
We recently purchased the Qualys Vulnerability scanner for scanning both our internal and external IPs. By the link below it suggests that trying to scan IPs from the inside interface to the outside may have serious impact on the ASA performance. I have to scan few IPs at our branch office and the scanner is at the inside of out HQ.
https://community.qualys.com/docs/DOC-1391
Is there any way of doing this? Should I creat a DMZ on the ASA. Will that lessen the impact? Anyone have experince with this?
Any insight is appreciated.
Solved! Go to Solution.
12-16-2015 04:10 AM
I've had many clients get independent penetration tests done (which include vulnerability scans) and never had it create any noticeable load on their ASA's.
12-07-2015 03:24 PM
You wont notice any performance impact on the ASA.
12-15-2015 08:06 AM
Thanks for the reply. Is your answer based on your personal experience or are you confident the ASA performance won't be impacted. Just want to clarify.
Sorry for the late response.
12-16-2015 04:10 AM
I've had many clients get independent penetration tests done (which include vulnerability scans) and never had it create any noticeable load on their ASA's.
12-17-2015 10:52 AM
Thanks! :)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide