TOC & Recently Viewed

Recently Viewed Topics

Firewall Rules

If NNM is placed immediately behind a firewall such that all of the traffic presented to NNM flows through the firewall, then the list of served ports, client side ports, and the respective IP addresses of the users are readily available.

Tools such as the Vulnerability Analysis page allow information about these ports (both client and server) to be browsed, sorted, and reported on. You can also view lists of IP addresses and networks using these client and server ports.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.