<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HP Switches Vulnerability Assestment in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6900521#M621</link>
    <description>&lt;P&gt;Hello (again),&lt;/P&gt;&lt;P&gt;Regarding OpenVAS vulnerability scanner, if you have a Linux box that is "docker" capable a Very Nice Man has containerized the OpenVAS application so that you can just do a "docker pull &amp;lt;package&amp;gt;" to install it :-O&lt;/P&gt;&lt;P&gt;I've just run it against my VSR installation so I now need to go and have a look at the SSH version - seems to work a treat&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Sep 2016 23:25:51 GMT</pubDate>
    <dc:creator>Ian Vaughan</dc:creator>
    <dc:date>2016-09-20T23:25:51Z</dc:date>
    <item>
      <title>HP Switches Vulnerability Assestment</title>
      <link>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6900289#M617</link>
      <description>&lt;P&gt;Hi Guys&lt;/P&gt;&lt;P&gt;I'm New in handling HP Switches, we recently deployed new Hp switches. The company required a Vulnerability Assestment on the Network devices. We have nipper scanner 0.12.6 but it seems like this is only for cisco switches.&lt;/P&gt;&lt;P&gt;Can you recommend best and tested Vulnerability Assestment and security Audit tools I can use for HP Switches?&lt;/P&gt;&lt;P&gt;Both Open source and Licensed is Okay.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you help me out on this guys?! Thanks a lot!! :)&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2016 09:19:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6900289#M617</guid>
      <dc:creator>flodnar31</dc:creator>
      <dc:date>2016-09-20T09:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: HP Switches Vulnerability Assestment</title>
      <link>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6900490#M620</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Work through the "hardening" guide for the particular platform - for example, Comware has a "fips-mode enable" configuration macro that turns off the insecure services and the more vulnerable ciphers etc.&lt;/LI&gt;&lt;LI&gt;Load up a linux box with OpenVAS (free) or Nessus (paid), download the latest vulnerability packs, and scan the nodes for security holes.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Nipper seems to be a configuration comparison tool.There isn't a direct equivalent for HPE/Aruba but...&lt;/P&gt;&lt;P&gt;If you need to do a configuration audit on some of the HPE / Aruba switches there are pre-built scripts / tests (such as ones for PCI-DSS compliance) built into the iMC Standard Edition Management Platform. This is a purchasable licensed product but you can get a free trial for 60 or so days and test drive it to see if it does what you need.&lt;/P&gt;&lt;P&gt;Kudos and Solved buttons help others find useful posts - don't be shy - you don't even need to be the original poster - give us a click.&amp;nbsp; :-D&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2016 21:07:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6900490#M620</guid>
      <dc:creator>Ian Vaughan</dc:creator>
      <dc:date>2016-09-20T21:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: HP Switches Vulnerability Assestment</title>
      <link>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6900521#M621</link>
      <description>&lt;P&gt;Hello (again),&lt;/P&gt;&lt;P&gt;Regarding OpenVAS vulnerability scanner, if you have a Linux box that is "docker" capable a Very Nice Man has containerized the OpenVAS application so that you can just do a "docker pull &amp;lt;package&amp;gt;" to install it :-O&lt;/P&gt;&lt;P&gt;I've just run it against my VSR installation so I now need to go and have a look at the SSH version - seems to work a treat&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2016 23:25:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6900521#M621</guid>
      <dc:creator>Ian Vaughan</dc:creator>
      <dc:date>2016-09-20T23:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: HP Switches Vulnerability Assestment</title>
      <link>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6907350#M678</link>
      <description>&lt;P&gt;Thanks Ian. We'll try your recommendations for now&lt;/P&gt;&lt;P&gt;Appreciate the great help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 14:10:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/hp-switches-vulnerability-assestment/m-p/6907350#M678</guid>
      <dc:creator>flodnar31</dc:creator>
      <dc:date>2016-10-13T14:10:56Z</dc:date>
    </item>
  </channel>
</rss>

