Submit a ticketCall us

Solarwinds & Cisco Live! Barcelona
Join us from the 29th of January to the 2nd of February at Cisco Live 2018 in Barcelona, where we will continue to show how monitoring the network with SolarWinds will keep you ahead of the game. At our booth (WEP 1A), we will demonstrate how SolarWinds network solutions can help. As a bonus, we are also hosting a pre-event webinar - Blame the Network, Hybrid IT Edition with our SolarWinds Head Geek™, Patrick Hubbard on January 24th - GMT (UTC+0): 10:00 a.m. to 11:00 a.m. There's still time to RSVP.

Home > Success Center > Network Configuration Manager (NCM) > Running firmware vulnerability reports through a proxy

Running firmware vulnerability reports through a proxy

Overview

The Firmware Vulnerability resource cannot connect to the National Vulnerability Database, and the resource is empty.

 

Environment

  • NCM 7.4
  • server that connects to the Internet through a proxy

 

Cause

Firmware vulnerability reporting uses a separate configuration file than the SolarWinds Webconsole, so proxy access must be enabled in both locations.

 

Resolution

  1. Use the following procedure to set up proxy access to the National Vulnerability Database.
  2. On your NCM server, navigate to C:\Program Files (x86)\SolarWinds\Orion\NCM.
  3. Backup the SolarWinds.NCM.VulnLib.dll.config file.
  4. Open the SolarWinds.NCM.VulnLib.dll.config file in a text editor.
  5. Add the following between <appsettings> and </appsettings>, and enter the appropriate entries for the values.
    <add key="proxyAvailable" value="true" />
    <add key="username" value="username" />
    <add key="password" value="password " />
    <add key="proxyAddress" value="IP of the proxy server" />
    <add key="proxyPort" value="port of the proxy server" />
    
  6. Save the file.
  7. Restart the SolarWinds Orion Module Engine service.

 

Outcome

You can now access the National Vulnerability Database.

  1. Open the SolarWinds Orion Web Console.
  2. Click Settings > NCM Settings > Firmware Vulnerability Settings.
  3. Click Run Now.

NCM tries to match your devices to entries in the database, and the Firmware Vulnerability resource is not empty.

Last modified

Tags

Classifications

Public