Simulating an attack

You can simulate an attack on ports and protocols.

Procedure

  1. Click the Risks tab.
  2. On the navigation menu, select Simulation > Simulations.
  3. From the Actions list box, select New.
  4. Type a name for the simulation.
  5. Select a topology model that you created.
  6. From the Where do you want the simulation to begin list, select an origin for the simulation.
  7. Add the simulation attack, Attack targets one of the following open ports using protocols.
  8. For this simulation, click open ports, and then add port 22.
  9. Click protocols, and then select TCP.
    SSH uses TCP.
  10. Click OK.
  11. Click Save Simulation.
  12. From the Actions list, select Run Simulation.
    The results column contains a list box with the date the simulation was run and a link to view the results.
  13. Click View Results.