cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
939
Views
3
Helpful
3
Replies

FTD vulnerability scanning?

Knassi
Level 1
Level 1

Do Cisco FTDs do vulnerability scan on the the devices on the  network?

1 Accepted Solution

Accepted Solutions

Marvin Rhoads
Hall of Fame
Hall of Fame

Not a true vulnerability scan, but you can use the built-in nmap to do more thorough network/host discovery which informs the IPS (Snort) rules for greater efficacy.

Details here: https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/host_identity_sources.html#ID-2219-00000532

FMC does work with third party vulnerability scanners via the host input API and can be configured using correlation rules to take action on a host identified to have vulnerabilities.

View solution in original post

3 Replies 3

check NMAP are it what you looking for ?

Marvin Rhoads
Hall of Fame
Hall of Fame

Not a true vulnerability scan, but you can use the built-in nmap to do more thorough network/host discovery which informs the IPS (Snort) rules for greater efficacy.

Details here: https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/host_identity_sources.html#ID-2219-00000532

FMC does work with third party vulnerability scanners via the host input API and can be configured using correlation rules to take action on a host identified to have vulnerabilities.

Knassi
Level 1
Level 1

Thank you so much Marvin

 

Review Cisco Networking for a $25 gift card