11.05.2013 Views

Guía de instalación y configuración - Tenable Network Security

Guía de instalación y configuración - Tenable Network Security

Guía de instalación y configuración - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Índice<br />

Introducción .............................................................................................................................. 5<br />

Estándares y convenciones ....................................................................................................... 5<br />

Organización .............................................................................................................................. 5<br />

Nuevo en Nessus 5 .................................................................................................................... 6<br />

Actualizaciones <strong>de</strong> funciones importantes ............................................................................. 6<br />

Navegación ........................................................................................................................................ 6<br />

Análisis ............................................................................................................................................... 6<br />

Informes ............................................................................................................................................. 6<br />

Nueva GUI <strong>de</strong> servidor ....................................................................................................................... 6<br />

Compatibilidad <strong>de</strong>l sistema operativo ......................................................................................... 7<br />

Información general .................................................................................................................. 7<br />

Requisitos previos .................................................................................................................... 9<br />

Nessus Unix ............................................................................................................................... 9<br />

Nessus Windows ......................................................................................................................10<br />

Opciones <strong>de</strong> implementación ..................................................................................................10<br />

Firewalls basados en hosts .......................................................................................................10<br />

Suscripciones <strong>de</strong> plugins <strong>de</strong> vulnerabilida<strong>de</strong>s ...................................................................... 11<br />

Tipos <strong>de</strong> suscripción .................................................................................................................11<br />

Compatibilidad con IPv6 ..........................................................................................................12<br />

Unix/Linux .................................................................................................................................12<br />

Actualización .............................................................................................................................12<br />

Instalación .................................................................................................................................17<br />

Inicio <strong>de</strong>l <strong>de</strong>monio <strong>de</strong> Nessus ...................................................................................................20<br />

Detención <strong>de</strong>l <strong>de</strong>monio <strong>de</strong> Nessus ............................................................................................21<br />

Cómo quitar Nessus..................................................................................................................21<br />

Windows ...................................................................................................................................25<br />

Actualización .............................................................................................................................25<br />

Actualización <strong>de</strong>s<strong>de</strong> Nessus 4.x ...........................................................................................25<br />

Actualización <strong>de</strong>s<strong>de</strong> Nessus 3.x ...........................................................................................26<br />

Instalación .................................................................................................................................26<br />

Descarga <strong>de</strong> Nessus ............................................................................................................26<br />

Instalación ............................................................................................................................26<br />

Preguntas sobre <strong>instalación</strong> ..................................................................................................27<br />

Inicio y <strong>de</strong>tención <strong>de</strong>l <strong>de</strong>monio <strong>de</strong> Nessus ................................................................................30<br />

Cómo quitar Nessus..................................................................................................................31<br />

Copyright © 2002-2012 <strong>Tenable</strong> <strong>Network</strong> <strong>Security</strong>, Inc.<br />

2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!