
Copyright © 2002-2012 Tenable Network Security, Inc.
Table of Contents
Introduction ............................................................................................................................... 5
Standards and Conventions ....................................................................................................... 5
Passive Vulnerability Scanner Background and Theory ............................................................. 5
Pre-Installation .......................................................................................................................... 6
Hardware requirements .............................................................................................................. 6
Software and Licensing .............................................................................................................. 7
Download or Obtain the Software .......................................................................................... 7
Obtain a Demo or Commercial Key ....................................................................................... 7
Move the Key and Software to the Server .............................................................................. 7
Installation and Operations ...................................................................................................... 8
Upgrading from PVS 3.x ............................................................................................................ 8
Red Hat ................................................................................................................................. 8
Initial Installation ........................................................................................................................ 8
Run the Installation Script ...................................................................................................... 9
Post Installation ....................................................................................................................13
File Locations .......................................................................................................................13
Operations ................................................................................................................................13
Starting the Passive Vulnerability Scanner with the SecurityCenter ......................................13
Stopping the Passive Vulnerability Scanner ..........................................................................14
Starting the Passive Vulnerability Scanner Manually ............................................................14
Starting the Passive Vulnerability Scanner Manually as a Background Process ...................16
The PVS Watchdog ..............................................................................................................17
Using the Passive Vulnerability Scanner to Analyze TCPDUMP Capture Files .....................17
Generating a Report .............................................................................................................17
Downloading New Vulnerability Plugins ................................................................................18
Configuration ............................................................................................................................18
pvs.conf File Format .............................................................................................................18
Specifying Focus Networks ...................................................................................................23
Using Multiple Interfaces ......................................................................................................23
Removing PVS..........................................................................................................................24
Red Hat ................................................................................................................................24
PVS Real-Time Traffic Analysis Configuration Theory ..........................................................24
Focus Network ..........................................................................................................................24
Detecting Server and Client Ports .............................................................................................25
Detecting Specific Server and Client Port Usage ......................................................................26
What this Means for Firewall Rules ...........................................................................................27
Working with the SecurityCenter ...............................................................................................27
Selecting Rule Libraries and Filtering Rules ..............................................................................27
Detecting Encrypted and Interactive Sessions ..........................................................................27
Routes and Hop Distance .........................................................................................................28
Alerting .....................................................................................................................................28
New Host Alerting .....................................................................................................................28
Internal Passive Vulnerability Scanner IDs .............................................................................29
Comentarios a estos manuales