<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic A human being. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/best-network-vulnerability-scanner-solution-for-cisco/m-p/2827303#M915733</link>
    <description>&lt;P&gt;A human being.&lt;/P&gt;
&lt;P&gt;Vulnerability scanners generally look for open tcp and udp ports. Say a Cisco switch only allows ssh (tcp/22) and restricts that via ACL on the vty line.&lt;/P&gt;
&lt;P&gt;A typical vulnerability scanner may say that device is very secure. Never mind that your IOS is subject to lots of security-related bugs that may manifest if you enable any other services in the future (ntp, snmp, https etc.), Never mind that you aren't sending sylogs anywhere and if you are you have no people actually analyzing the received data. Never mind that you don't have any network access control (a la 802.1x and/or ISE) and there your switch is just an open invitation for intruders to connect to your network.&lt;/P&gt;
&lt;P&gt;Get my point?&lt;/P&gt;</description>
    <pubDate>Fri, 11 Dec 2015 03:56:54 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-12-11T03:56:54Z</dc:date>
    <item>
      <title>best network vulnerability scanner solution for Cisco environment !?</title>
      <link>https://community.cisco.com/t5/network-security/best-network-vulnerability-scanner-solution-for-cisco/m-p/2827302#M915728</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would like to know from your experiance what is the best&amp;nbsp;vulnerability assesment scanner solution for the network appliances specially for Cisco devices !?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-network-vulnerability-scanner-solution-for-cisco/m-p/2827302#M915728</guid>
      <dc:creator>mohammed hashim</dc:creator>
      <dc:date>2020-02-21T13:38:15Z</dc:date>
    </item>
    <item>
      <title>A human being.</title>
      <link>https://community.cisco.com/t5/network-security/best-network-vulnerability-scanner-solution-for-cisco/m-p/2827303#M915733</link>
      <description>&lt;P&gt;A human being.&lt;/P&gt;
&lt;P&gt;Vulnerability scanners generally look for open tcp and udp ports. Say a Cisco switch only allows ssh (tcp/22) and restricts that via ACL on the vty line.&lt;/P&gt;
&lt;P&gt;A typical vulnerability scanner may say that device is very secure. Never mind that your IOS is subject to lots of security-related bugs that may manifest if you enable any other services in the future (ntp, snmp, https etc.), Never mind that you aren't sending sylogs anywhere and if you are you have no people actually analyzing the received data. Never mind that you don't have any network access control (a la 802.1x and/or ISE) and there your switch is just an open invitation for intruders to connect to your network.&lt;/P&gt;
&lt;P&gt;Get my point?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 03:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-network-vulnerability-scanner-solution-for-cisco/m-p/2827303#M915733</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-11T03:56:54Z</dc:date>
    </item>
  </channel>
</rss>

