Security
--
Questions
--
Followers
Top Experts
I have confirmed that the server has started:
Every time I connect, I get the message "It was not possible to connect to the remote host - make sure the host IP and port are correct and that the Nessus Server is running".
Does anyone have any ideas for resolving this? Â Thanks.
root@flagship:~# /etc/init.d/nessusd restart
$Shutting down Nessus : .
$Starting Nessus : .
root@flagship:~#
nessusd.conf:
# Port to listen to (old NTP protocol). Used for pre 4.2 NessusClient connections :
listen_port = 1241
# Port for the Nessus Web Server to listen to (new XMLRPC protocol) :
xmlrpc_listen_port = 8834
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Try an nmap scan from the client machine (apt-get install nmap):
nmap -p1241,8834 -PN -n -sV <nessus_server_IP_address>
I have attached the results of the nmap scan.
Starting Nmap 5.00 ( http://nmap.org ) at 2010-01-30 08:57 EST
Interesting ports on 192.168.0.143:
PORT STATE SERVICE VERSION
1241/tcp closed nessus
8834/tcp open ssl/tcpwrapped
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 23.76 seconds
http://www.nessus.org/plugins/?view=homefeed






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
So, are you up and running then?

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Security
--
Questions
--
Followers
Top Experts
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.