Views:

You can refer to the Nmap website for the installation binaries for different platforms.

Below are the Nmap commands that can be used to simulate the Reconnaissance Scan.

TypeDescriptionNmap commandExample
Computer OS
Fingerprint Probe
The Agents/Appliances will recognize and react to active TCP stack OS fingerprinting attemptsNmap -v -O target_IP-
Network or Port ScanThe Agents/Appliances will recognize and react to port scans.Nmap -v -sS target_IPNmap -v -sS 192.168.x.x
Nmap -p port_range target_IPNmap -p 1-5000 192.168.x.x
TCP Null ScanThe Agents/Appliances will refuse packets with no flags set.Nmap -v -sN target_IP-
TCP SYNFIN ScanThe Agents/Appliances will refuse packets with only the SYN and FIN flags set.Nmap -v —scanflags SYNFIN target_IP-
TCP Xmas ScanThe Agents/Appliances will refuse packets with only the FIN, URG, and PSH flags set or a value of 0xFF (every possible flag set).Nmap -v -sX target_IP-

For more information about the Reconnaissance Scan feature, refer to the Deep Security Help Center.