Firewall Rules

If NNM is placed immediately behind a firewall such that all of the traffic presented to NNM flows through the firewall, then the list of served ports, client side ports, and the respective IP addresses of the users are readily available.

Tools such as the Vulnerability Analysis page allow information about these ports (both client and server) to be browsed, sorted, and reported on. You can also view lists of IP addresses and networks using these client and server ports.