• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 549
  • Last Modified:

Port scan firewall with NMAP

When auditing the public-facing side of a firewall, is there an appropriate/recommended range of ports to scan? We're using NMAP. By default, an intense scan only scans the first 1000 ports. Seems pretty limited. Does anyone have a strong opinion or some professional experience regarding this? Should we scan UDP and TCP? Any example NMAP lines?

Thanks!
0
meade470
Asked:
meade470
2 Solutions
 
gheistCommented:
You should scan all ports if you are at it. Just make sure you disable rate-limiting and/or port scan detection for your scanning IP.
Normally you allow just few public-facing services, so nothing more should appear.
0
 
vpnttgCommented:
TCP: nmap -sS -p 0-65535 <IP address>
UDP: nmap -sU -p 0-65535 <IP address>
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Tackle projects and never again get stuck behind a technical roadblock.
Join Now