I use this mod of the Untangle UTM with the Nessus Security Scanner to check systems on the DMZ and on the LAN
ONLY SCAN THE NETWORKS AND HOSTS THAT YOU HAVE THE RIGHT TO SCAN! SCANNING SYSTEMS CAN BE INTERPRETED AS HOSTILE ACTIVITY.
Prior to any other actions go to the following Tenable address and get a Nessus activation code
In your Untangle UTM create a new packet filter rule:
On the Untangle UTM Firewall
Config > Networking > Advanced > Packet Filter
Create new user rule: Nessus LAN access (Pass, TCP, Port 1241)
This will allow the Nessus Client Software to access the Nessus Server
Login via ssh
Enable Debian Repositories:
As of this posting you will have to add the current Debian Lenny repositories to the file /etc/apt/sources.list since they have been moved.
apt-get install -y nessusd
Disable the Debian Repositories
When the install finishes run these two commands:
Add a new nessusd user
Login : "UserName"
Authentication (pass/cert) [pass] :
Login password :
Login password (again) :
With the Activation Code recieved from Tenable run the command:
nessus-fetch --register XXXX-XXXX-XXXX-XXXX-XXXX
Where "XXXX-XXXX-XXXX-XXXX-XXXX" represents the activation code sent to you by Tenable.
This will download the most current Nessus Plugins.
Using the Nessus Client Software on a LAN workstation login to the Nessus Server on your Untangle UTM, using the login and password you created.
When you are not actually running the Nessus server shut the service down!
Login over ssh and run the command: