<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I am very glad the supporting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880942#M1030748</link>
    <description>&lt;P&gt;I am very glad the supporting documentation is written so well for this.... It states exactly where I need to upload the file to get this to run, and what options I need to add to get them connection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sarcasm aside I could not get this to work in our environment. Any other tips or suggestions?&lt;/P&gt;</description>
    <pubDate>Tue, 19 Jul 2016 20:56:47 GMT</pubDate>
    <dc:creator>nathig001</dc:creator>
    <dc:date>2016-07-19T20:56:47Z</dc:date>
    <item>
      <title>Tenable Security Center to Sourcefire Firesight vulnerability connector</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880940#M1030746</link>
      <description>&lt;P&gt;I am looking for a guide on how to connect Sourcefire to Nessus Security Center to pull in vulnerability data and then change our recommended IPS signatures based on the data imported. I see there were some old connectors in the forums and also a Perl script that seems to not work anymore. Any help on this would be fantastic!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880940#M1030746</guid>
      <dc:creator>nathig001</dc:creator>
      <dc:date>2019-03-12T13:01:11Z</dc:date>
    </item>
    <item>
      <title>sorry if this is a dumb</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880941#M1030747</link>
      <description>&lt;P&gt;sorry if this is a dumb question but did you look at this connector?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;https://supportforums.cisco.com/document/12261131/tenable-connector-and-docs-v30&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2016 16:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880941#M1030747</guid>
      <dc:creator>dohurd</dc:creator>
      <dc:date>2016-05-20T16:34:36Z</dc:date>
    </item>
    <item>
      <title>I am very glad the supporting</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880942#M1030748</link>
      <description>&lt;P&gt;I am very glad the supporting documentation is written so well for this.... It states exactly where I need to upload the file to get this to run, and what options I need to add to get them connection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sarcasm aside I could not get this to work in our environment. Any other tips or suggestions?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 20:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880942#M1030748</guid>
      <dc:creator>nathig001</dc:creator>
      <dc:date>2016-07-19T20:56:47Z</dc:date>
    </item>
    <item>
      <title>I'm assuming you're talking</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880943#M1030749</link>
      <description>&lt;P&gt;I'm assuming you're talking about the readme file in the .zip with the connector. &amp;nbsp;I do not have any other documentation. &amp;nbsp;Tell me exactly where you get stuck and I can have a few sales engineers comment. &amp;nbsp;We're usually able to get this stuff working.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 22:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880943#M1030749</guid>
      <dc:creator>dohurd</dc:creator>
      <dc:date>2016-07-19T22:02:50Z</dc:date>
    </item>
    <item>
      <title>I am trying to create a third</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880944#M1030750</link>
      <description>&lt;P&gt;I am trying to create a third-party mapping that will import Nesses scan results to help cut down on the number of signatures that we use in or environment based on Firesight so we can reduce false positives. How do I import the Nessus Scan Database results to help correlate the signatures that can be removed from our environment based on the systems we have. Is this possible to do. Where do I go to connect the systems together? Does Firesight log into Tenable Security Center with a username and password to pull the data? Do I connect it to a repository of Nessus? I have been told to go to policy&amp;gt;application detectors&amp;gt;third-party mappings by a Cisco engineer, but I don't see where to input credentials to pull in the found vulnerabilities in the environment based on ip address, DNS&amp;nbsp;name, etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I see the connector tool is here with the .zip file and you rename it to tar.gz, but trying to import that data does not work and am getting a wrong file type error. Is the link of the connector what I need to pull in the Tenable Security Center results?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 22:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880944#M1030750</guid>
      <dc:creator>nathig001</dc:creator>
      <dc:date>2016-07-19T22:26:53Z</dc:date>
    </item>
    <item>
      <title>First let me help you through</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880945#M1030751</link>
      <description>&lt;P&gt;First let me help you through some of your questions. The systems are connected together through the included perl script in the zip file. It's done through a shell script in the CLI. The actual script is what logs into both. It uses HTTPS Restful API on the Tenable Side and we provide a client/server authentication through certificates. The engineer was referring to preferring of third party scans over the internal database.&lt;/P&gt;
&lt;P&gt;Yes, in the link that dohurd provided it does come with one of the better README files I have seen on the host input option. There a few things to think about when you do this.&lt;/P&gt;
&lt;P&gt;Second&amp;nbsp;is, we do have a setting in the Firepower Manager that is a preference on using the third party scans for Firesight or to use the built in passive vulnerability database. The reason you may want to use the passive vulnerability database and err on being too exact is that if you leverage an active scan option and the scan report is dated you could find systems that had been hardened and are now vulnerable. Maybe that system was put into production without the patch having been implemented. Just something to think about as you work within the system.&lt;/P&gt;
&lt;P&gt;Lastly, installation guidance. In order to get a 6.X version to work I'll give you the walk through, the 5.X version menu structure is slightly different but the submenus are more or less the same.&lt;/P&gt;
&lt;P&gt;In 6.X you would navigate over to System -&amp;gt; Integration -&amp;gt; Host Input Client and generate a new certificate for your host input client. Keep this and if you did it with a password keep both, you will need it.&lt;/P&gt;
&lt;P&gt;Next take this tarball and extract it, depending on your system you could maybe choose to do this on your security center system. If you do you will need to read through the requirements of the various perl modules that you will need. If you are using ubuntu, this should help:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;# sudo apt-get install&amp;nbsp;liblwp-protocol-https-perl&amp;nbsp;libio-socket-ssl-perl&amp;nbsp;libhttp-cookies-perl&amp;nbsp;libnet-ip-perl&amp;nbsp;libyaml-libyaml-perl&amp;nbsp;libnet-ssleay-perl&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now I recommend copying everything (zip file, pkcs12 file which is your host input certificate) and all into a directory on a host.&lt;/P&gt;
&lt;P&gt;Once it is all there, extract the zip file. You will need to edit the included .yml file. Use a text editor an edit InputPlugins/SecurityCenter.yaml, the instructions are pretty clear on this in the README file.&lt;/P&gt;
&lt;P&gt;If you want to test if the connector is working for your build of security center run the following command:&lt;/P&gt;
&lt;P&gt;perl ./SecurityCenter.pl -c test.csv&lt;/P&gt;
&lt;P&gt;If the csv file is build correctly then you should have a good dataset. From this point it is probably recommended to use crontab -e to set a job to execute this file on a semi regular basis to keep the system fresh.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you do this go over to the Firepower Manager under Analysis -&amp;gt; Third Party Vulnerabilities and should see data filled in correlating CVE information.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Happy to help,&amp;nbsp;&lt;BR /&gt;Moses&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 19:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880945#M1030751</guid>
      <dc:creator>Moses Hernandez</dc:creator>
      <dc:date>2016-07-20T19:33:08Z</dc:date>
    </item>
    <item>
      <title>Here is the error I am</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880946#M1030752</link>
      <description>&lt;P&gt;Here is the error I am getting when trying to run the script.&lt;/P&gt;
&lt;P&gt;:~/SecurityCenter$ ./SecurityCenter.pl -c=Output.csv -pl=InputPlugins/SecurityCenter.yaml&lt;BR /&gt;keys on reference is experimental at InputPlugins/SecurityCenter.pm line 384.&lt;BR /&gt;keys on reference is experimental at InputPlugins/SecurityCenter.pm line 385.&lt;BR /&gt;keys on reference is experimental at InputPlugins/SecurityCenter.pm line 386.&lt;BR /&gt;Use of uninitialized value in lc at SFHostInputAgent.pm line 203.&lt;BR /&gt;Thu Jul 28 15:16:02 2016 [INFO] SecurityCenter JSON Vulnerability Processing Starting&lt;BR /&gt;Thu Jul 28 15:16:02 2016 [INFO] Server: infoseccenter&lt;BR /&gt;Thu Jul 28 15:16:02 2016 [ERROR] SecurityCenter Vulnerability Request Failed 500 Can't connect to infoseccenter:443 (certificate verify failed)&lt;/P&gt;
&lt;P&gt;Request failed!!&lt;BR /&gt;500 Can't connect to infoseccenter:443 (certificate verify failed)&lt;BR /&gt;Error : Can't use string ("1") as a SCALAR ref while "strict refs" in use at SFHostInputAgent.pm line 318.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 22:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880946#M1030752</guid>
      <dc:creator>nathig001</dc:creator>
      <dc:date>2016-08-02T22:46:45Z</dc:date>
    </item>
    <item>
      <title>What if we don't have the</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880947#M1030753</link>
      <description>&lt;P&gt;This item has been deleted by the supreme commander.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 22:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880947#M1030753</guid>
      <dc:creator>nathig001</dc:creator>
      <dc:date>2016-08-02T22:47:19Z</dc:date>
    </item>
    <item>
      <title>Did you ever find a solution</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880948#M1030754</link>
      <description>&lt;P&gt;Did you ever find a solution to your problem?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2016 19:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880948#M1030754</guid>
      <dc:creator>DHCBT</dc:creator>
      <dc:date>2016-11-03T19:17:49Z</dc:date>
    </item>
    <item>
      <title>Hi - was there ever a</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880949#M1030755</link>
      <description>&lt;P&gt;Hi - was there ever a resolution to this? &amp;nbsp;I'm essentially trying to do the same thing, but there isn't a whole lot of documentation on this.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 13:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880949#M1030755</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2017-03-27T13:49:11Z</dc:date>
    </item>
    <item>
      <title>The connector only works with</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880950#M1030756</link>
      <description>&lt;P&gt;The connector only works with older versions of both Security Center and Firesight. unless something has changed recently that I am not aware of on the new Tenable.io it will not work. This would be a feature that is nice to have, but since it doesn't work and both Cisco and Tenable have poor documentation, I don't think it will be going anywhere anytime soon.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 14:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880950#M1030756</guid>
      <dc:creator>nathig001</dc:creator>
      <dc:date>2017-03-27T14:17:20Z</dc:date>
    </item>
    <item>
      <title>This was a feature pitched to</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880951#M1030757</link>
      <description>&lt;P&gt;This was a feature pitched to us when purchasing both Tenable Security Center and Cisco's SourceFire solution so I will be sorely disappointed if it's not working.&amp;nbsp; Tenable actually has a public marketing doc pitching this solution as viable.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://www.tenable.com/sites/drupal.dmz.tenablesecurity.com/files/alliance-partner-pdf/Tenable-Sourcefire%20Solution%20Brief.pdf&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Like you, I'm frustrated.&amp;nbsp; Whenever I contact either company directly for support I'm pointed back to the other one.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 14:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880951#M1030757</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2017-03-27T14:20:17Z</dc:date>
    </item>
    <item>
      <title>We purchased both products</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880952#M1030758</link>
      <description>&lt;P&gt;We purchased both products before knowing they were advertised as being able to share data. I had the same experience and it took over two months and a lot of wasted time to find out that they are not really supported &lt;G class="gr_ gr_179 gr-alert gr_gramm gr_run_anim Grammar multiReplace" id="179" data-gr-id="179"&gt;from&lt;/G&gt; either company. If you were sold that both could connect and share data it is unfortunate both parties were not up front in telling you the correct information. They went so far as to the main programmers of the application and came back with it is not supported anymore. I also showed Cisco and Tenable the same document saying that they are being advertised as sharing data, but both parties seemed flabbergasted that it was possible.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 14:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880952#M1030758</guid>
      <dc:creator>nathig001</dc:creator>
      <dc:date>2017-03-27T14:25:09Z</dc:date>
    </item>
    <item>
      <title>Christopher, let me at least</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880953#M1030759</link>
      <description>&lt;P&gt;Christopher, let me at least end the finger-pointing stuff.&lt;/P&gt;
&lt;P&gt;You're correct that this is supposed to work. &amp;nbsp;It has worked for over 10 years. &amp;nbsp;I'm not the definitive technical authority on this feature but I can tell you that similar issues have recently been reported by two other parties that I am aware and with different vulnerability technologies being used. &amp;nbsp;It points to a bug in the code that leverages the 3rd party vuln set. &amp;nbsp;I've asked a friend in support to make sure the issue is escalated to development.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I cannot provide any guidance on time frame. &amp;nbsp;I encourage you to keep the SR case number open with TAC and feel free to reach out to me at dohurd@cisco.com&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Doug&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 14:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880953#M1030759</guid>
      <dc:creator>dohurd</dc:creator>
      <dc:date>2017-03-27T14:36:11Z</dc:date>
    </item>
    <item>
      <title>I'm going to give Doug the</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880954#M1030760</link>
      <description>&lt;P&gt;I'm going to give Doug the benefit of the doubt here and see if he can steer me in the right direction.&amp;nbsp; It seems completely ludicrous that the only posture tool that FMC has access to is NMAP.&amp;nbsp; Other than using something like Tenable Security Center (or one of it's competitors) the only other way to get relevant and up to date posture information about resources is to update it manually in FMC - and that's not plausible if you have more than a few forward facing servers.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 19:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880954#M1030760</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2017-03-27T19:08:07Z</dc:date>
    </item>
    <item>
      <title>Hi Doug - sent you an email</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880955#M1030761</link>
      <description>&lt;P&gt;Hi Doug - sent you an email Monday.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 11:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880955#M1030761</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2017-03-29T11:25:40Z</dc:date>
    </item>
    <item>
      <title>Contact with Cisco and</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880956#M1030762</link>
      <description>&lt;P&gt;Contact with Cisco and Tenable resulted in same results as above.&lt;/P&gt;
&lt;P&gt;Cisco...&amp;nbsp;&amp;nbsp; SecurityCenter is using a new API - Restful API( HTTP oriented calls).&amp;nbsp; perl script(creates a CSV file- DIFF file)&amp;nbsp;is for the old version --not Restful API&lt;/P&gt;
&lt;P&gt;Tenable.... We stopped supporting the old API nearly 3 years ago.&lt;/P&gt;
&lt;P&gt;My perception--- SF is more proprietary and the developers are not working on this feature&amp;nbsp;any longer.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco has made no efforts to use the Restful API to address this.&lt;/P&gt;
&lt;P&gt;No one at Cisco Professional services seems to want to tackle this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes even after Cisco had acquired SF the word was yes this is a supported feature.&amp;nbsp; As with most users I see, this is not a supported feature.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If anyone gets this working let the forum know.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2017 00:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880956#M1030762</guid>
      <dc:creator />
      <dc:date>2017-08-08T00:33:05Z</dc:date>
    </item>
    <item>
      <title>Cisco Support is hoping to</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880957#M1030763</link>
      <description>&lt;P&gt;Cisco Support is hoping to have a connector finished by the end of August, I've been pushing really hard on my Tenable and Cisco reps and hopefully there is positive movement now.&amp;nbsp; I would suggest you do the same if you have a horse in this race.&amp;nbsp; Call your Tenable rep and contact your Cisco rep and start aggravating the crap out of them until you start to see progress.&amp;nbsp; I won't name any of mine here, but they are at least talking to each other and me and telling me they have an "August" timeline for completion.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 19:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/2880957#M1030763</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2017-08-09T19:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Support is hoping to</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/3208670#M1030764</link>
      <description>&lt;P&gt;Did they end up making this happen?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 13:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/3208670#M1030764</guid>
      <dc:creator>jbradbury</dc:creator>
      <dc:date>2017-11-01T13:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Christopher, let me at least</title>
      <link>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/3804597#M1030765</link>
      <description>&lt;P&gt;Hello Doug,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to do this integration with FMC 6.2.3. Do you know if there is more info actually or the RESTFUL API is already working?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;James&lt;/P&gt;</description>
      <pubDate>Tue, 19 Feb 2019 05:30:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tenable-security-center-to-sourcefire-firesight-vulnerability/m-p/3804597#M1030765</guid>
      <dc:creator>jaime.pedraza</dc:creator>
      <dc:date>2019-02-19T05:30:47Z</dc:date>
    </item>
  </channel>
</rss>

