Firewall Rules

If Tenable Nessus Network Monitor is placed immediately behind a firewall such that all of the traffic presented to Tenable Nessus Network Monitor flows through the firewall, then the list of served ports, client-side ports, and the respective IP addresses of the users are readily available.

Tools such as the Tenable Security Center Vulnerability Analysis page allow information about these ports (both client and server) to be browsed, sorted, and reported on. You can also view lists of IP addresses and networks using these client and server ports.