Submit a ticketCall us

Webinar: Web Help Desk for HR, Facilities and Accounting Departments
This webinar will focus on use cases for HR, Facilities and Accounting.

Having a unified ticketing and asset management system for all the departments in your company can provide end-users with a seamless experience and make things easier for your IT team. Yet, with different business tasks and objectives, many departments don’t fully understand the capabilities of Web Help Desk and how the software can be customized for effective use in their departments.
Register Now.

Home > Success Center > Network Configuration Manager (NCM) > Running firmware vulnerability reports through a proxy

Running firmware vulnerability reports through a proxy

Overview

The Firmware Vulnerability resource cannot connect to the National Vulnerability Database, and the resource is empty.

 

Environment

  • NCM 7.4
  • server that connects to the Internet through a proxy

 

Cause

Firmware vulnerability reporting uses a separate configuration file than the SolarWinds Webconsole, so proxy access must be enabled in both locations.

 

Resolution

  1. Use the following procedure to set up proxy access to the National Vulnerability Database.
  2. On your NCM server, navigate to C:\Program Files (x86)\SolarWinds\Orion\NCM.
  3. Backup the SolarWinds.NCM.VulnLib.dll.config file.
  4. Open the SolarWinds.NCM.VulnLib.dll.config file in a text editor.
  5. Add the following between <appsettings> and </appsettings>, and enter the appropriate entries for the values.
    <add key="proxyAvailable" value="true" />
    <add key="username" value="username" />
    <add key="password" value="password " />
    <add key="proxyAddress" value="IP of the proxy server" />
    <add key="proxyPort" value="port of the proxy server" />
    
  6. Save the file.
  7. Restart the SolarWinds Orion Module Engine service.

 

Outcome

You can now access the National Vulnerability Database.

  1. Open the SolarWinds Orion Web Console.
  2. Click Settings > NCM Settings > Firmware Vulnerability Settings.
  3. Click Run Now.

NCM tries to match your devices to entries in the database, and the Firmware Vulnerability resource is not empty.

Last modified
21:29, 22 Jun 2016

Tags

Classifications

Public