cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
555
Views
0
Helpful
1
Replies

Third party vulnerability scanner

Greg.Howley
Level 1
Level 1

Hello all,

 

We are embarking on a plan to perform vulnerability scans on all of our appliances, including our ESAs (C370s), using credentialed scans.

Any warnings, caveats or horror stories for doing this?  

 

Thanks

1 Reply 1

I have nothing ESA specific other than, go slowly, don't scan everything all at once until you know how they react to it (within reason of course).

 

For example, back in the day, I know Nessus was blowing up the gui on our Brocade switches, they'd pass traffic, but couldn't be configed until a reboot...   This taught us caution... do one, then check it all out before you scan all of them....