| Description | This article describes the process for installing the Nmap tool on a Linux operating system and provides examples of its use for troubleshooting connectivity and service availability on a FortiSIEM appliance. | ||||||||||||
| Scope | Linux operating systems, Nmap, and network connectivity troubleshooting with a FortiSIEM appliance. | ||||||||||||
| Solution |
Nmap (Network Mapper) is an open-source utility for network exploration and security auditing. Its installation varies slightly depending on the Linux distribution used.
Debian-based distributions (Ubuntu, Mint, etc.). Open a terminal and run the following commands to update the package list and install Nmap:
# sudo apt update # sudo apt install nmap
Red Hat-based distributions (CentOS, Fedora, RHEL, etc.). Open a terminal and run the following command to install Nmap using the dnf or yum package manager:
# sudo dnf install nmap
Or, if using yum:
# sudo yum install nmap
The primary use of Nmap in diagnosing a FortiSIEM appliance is to verify accessibility and the availability of necessary services (ports) for its correct operation, such as log reception, web interface access, or communications between its components. Replace X.X.X.X with the IP address of the FortiSIEM to be diagnosed.
A basic ping can be performed to confirm that the FortiSIEM appliance responds at the network level (layer 3).
# nmap -sn X.X.X.X
The -sn (scan no-port) option performs a ping to verify if the host is up without scanning ports.
Specific ports that are critical for FortiSIEM operation can be scanned. Below are common ports used by FortiSIEM for the web interface, inter-component communication, or event/log reception. Example of scanning key ports:
# nmap -p 443,8443,514,22,5432 X.X.X.X
Interpreting Results:
For a more comprehensive diagnosis, a range of ports or the 1000 most common ports can be scanned:
# nmap X.X.X.X
Running nmap [IP] without port options scans the 1000 most common TCP ports by default.
The argument -sV can be used to attempt to determine the version of the service listening on the open ports. This can be useful to verify if the reported service is indeed the expected one (e.g., a web server).
# nmap -p 8443 -sV X.X.X.X
The output should indicate the service (e.g., https) and its version if detectable.
Considerations:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.