Recently Viewed Topics
In a web browser, navigate to
https://<ip address or hostname>:8835.
- Enter the the default username and password, which are both
- Click Sign In To Continue.
The Change Default Password screen of the Quick Setup window appears, where you can change the default password. The new password must meet the following minimum requirements:
- Minimum 5 characters long
- One capital letter
- One lowercase letter
- One numeric digit
- One special character from the following list:
Click Next Step.
The Set Activation Code screen appears.
In the Activation Code box, enter the appropriate text based on your setup:
- If NNM is acting as a standalone device, enter an Activation Code.
If NNM is managed by Tenable.io, enter the text Cloud.
Four configuration options appear: Cloud Host, Cloud Port, Cloud Key, and NNM Name. Refer to the Cloud Settings section for more information.
- If NNM is managed by Tenable.sc, enter the text SecurityCenter.
To register NNM offline, select the Register Offline check box and follow the Register NNM Offline instructions.
Click Next Step.
The Monitoring Configuration screen appears.
The Monitored Network Interfaces box displays the monitored interfaces identified by NNM. You can select one or more of the defined interfaces. The caret icon displays additional information about each interface.
The Monitored Network IP Addresses and Ranges box displays the IP address ranges NNM monitors.
The Excluded Network IP Addresses and Ranges box displays the IP address ranges NNM does not monitor.
The Monitored Network IP Addresses and Ranges and Excluded Network IP Addresses and Ranges boxes accept both IPv4 and IPv6 CIDR address definitions. When using multiple addresses, separate the entries using commas or new lines.
Note: Tenable Network Security does not recommend entering large ranges such as 0.0.0.0/0. Because this indicates to NNM that any and all network addresses belong in the network, performance may be severely impacted. Please only include addresses in your network, as each address undergoes in-depth processing.
The Monitoring page appears. Once NNM starts monitoring traffic, the page displays various high-level charts about the vulnerabilities, assets, connections, and bandwidth usage that NNM has detected, as well as real-time events that NNM has triggered.