First off, the DMZ is setup with virtual interfaces (PIX v7), and the scanning source is inside. The firewall allows anything IP from this scanner. If I scan most of the DMZ's, I get normal results, with all of the scans.
Using NMAP, If I scan one specific DMZ, I only get results with the SYN scan and TCP window scans, AND it says every port is open (what the firewall allows). Cisco support is not being helpful. Does anyone have any idea why this is? It's weird. Im trying to automate Nessus against the DMZ servers, and its giving too many false positives about open ports.
I have taken packet traces, and the only thing weird is that I am getting an ACK back for eveyr port, but they are Zero Window (TCP Window Scan brings back every port open).
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...