1
Intrusion Detection and Prevention / Re: Nessus scans overloading state tables
« on: March 01, 2023, 03:04:54 am »
I changed all my block rules to reject and am still seeing this issue, I have throttled my Nessus scan down to a single host and TCP scans but it still grows the state table alarmingly.
Interestingly, if I scan from one subnet to another where there are no drop rules (only allows) it doesn't fill the table.
I was wondering, would it be worth setting either State Type to None or Max source states to a value (it says Maximum state entries per host which I think sounds like a great idea) on my drop rules?
Interestingly, if I scan from one subnet to another where there are no drop rules (only allows) it doesn't fill the table.
I was wondering, would it be worth setting either State Type to None or Max source states to a value (it says Maximum state entries per host which I think sounds like a great idea) on my drop rules?