Mapping Third-Party Products
If you import data from a third party, you must map the Cisco product to the third-party name to assign vulnerabilities and perform impact correlation using that data. Mapping the product associates Cisco vulnerability information with the third-party product name, which allows the system to perform impact correlation using that data.
If you import data using the host input import feature, you can also use the AddScanResult function to map third-party products to operating system and application vulnerabilities during the import.
For example, if you import data from a third party that lists Apache Tomcat as an application and you know it is version 6 of that product, you could add a third-party map where:
-
Vendor Name is set to
Apache
. -
Product Name is set to
Tomcat
. -
Apache is chosen from the Vendor drop-down list.
-
Tomcat is chosen from the Product drop-down list.
-
6 is chosen from the Version drop-down list
This mapping would cause any vulnerabilities for Apache Tomcat 6 to be assigned to hosts with an application listing for Apache Tomcat.
Note that for versionless or vendorless applications, you must map vulnerabilities for the application types in the Secure Firewall Management Center configuration. Although many clients have associated vulnerabilities, and clients are used for impact assessment, you cannot import and map third-party client vulnerabilities.
Tip | If you have already created a third-party mapping on another Secure Firewall Management Center, you can export it and then import it onto this management center. You can then edit the imported mapping to suit your needs. |
Procedure
Step 1 | Choose . |
Step 2 | Click User Third-Party Mappings. |
Step 3 | You have two choices:
|
Step 4 | Enter a Mapping Set Name. |
Step 5 | Enter a Description. |
Step 6 | You have two choices:
|
Step 7 | Enter the Vendor String used by the third-party product. |
Step 8 | Enter the Product String used by the third-party product. |
Step 9 | Enter the Version String used by the third-party product. |
Step 10 | In the Product Mappings section, choose the operating system, product, and versions you want to use for vulnerability mapping from the Vendor, Product, Major Version, Minor Version, Revision Version, Build, Patch, and Extension fields. Example: |
Step 11 | Click Save. |