Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 538
  • Last Modified:

Port scan firewall with NMAP

When auditing the public-facing side of a firewall, is there an appropriate/recommended range of ports to scan? We're using NMAP. By default, an intense scan only scans the first 1000 ports. Seems pretty limited. Does anyone have a strong opinion or some professional experience regarding this? Should we scan UDP and TCP? Any example NMAP lines?

Thanks!
0
meade470
Asked:
meade470
2 Solutions
 
gheistCommented:
You should scan all ports if you are at it. Just make sure you disable rate-limiting and/or port scan detection for your scanning IP.
Normally you allow just few public-facing services, so nothing more should appear.
0
 
vpnttgCommented:
TCP: nmap -sS -p 0-65535 <IP address>
UDP: nmap -sU -p 0-65535 <IP address>
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now