TOC & Recently Viewed

Recently Viewed Topics

Command Line Examples

This section provides some examples of common audits used for Cisco IOS compliance checks. The nasl command line binary is used as a quick means of testing audits on the fly. Each of the .audit files demonstrated below can easily be dropped into your Nessus scan policies. For quick audits of one system, however, command-line tests are more efficient. The command will be executed each time from the /opt/nessus/bin directory as follows:

# ./nasl -t <IP> /opt/nessus/lib/nessus/plugins/cisco_compliance_check.nbin

Where <IP> is the IP address of the system to be audited.

The “enable” password is requested:

Which file contains your security policy ? cisco_test.audit

SSH login to connect with : admin

How do you want to authenticate ? (key or password) [password]

SSH password :

Enter the 'enable' password to use :

Consult your Cisco administrator for the correct “enable” login parameters.

This section includes the following information:

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.