
--config --add
"custom_paramater
name" "parameter
value"
Add a custom configuration parameter for PVS or PVS Proxy. The double quote
characters are required, and single quotes may be used when special characters are
required.
--config "parameter
name" ["parameter
value"]
Displays the defined parameter value. If a value is added at the end of the command,
the parameter is updated with the new setting. The double quote characters are
required, and single quotes may be used when special characters are required.
--config --delete
"custom_parameter
name”
The delete command may be used to remove custom configuration parameters.
--register-offline
<.rc file>
When using PVS in an offline mode, the .rc file obtained from Tenable is used in this
command.
When using PVS in an offline mode, a challenge code is required by Tenable to
generate the proper .rc file. This command provides the required challenge code.
--update-plugins
<plugins tarball>
When using the PVS in an offline mode, updating the plugins requires downloading a
tarball from Tenable. When updating the plugins from the command line, this
command is used to identify the file to use for updating the plugins.
Define Unknown or Customized Ports
Many networks will contain traffic on ports PVS has defined as a different traffic type or on alternate ports. If the port is not
defined at all it will be displayed as “Unknown”. The pvs-services file may be edited to customize or add the port
information to provide accurate reporting for the ports on the network.
For example, there are two lines in the pvs-services file by default that define SMTP traffic. They read “smtp
25/tcp” and “smtp 25/udp”. If the organization routinely sends SMTP data over port 2525 those lines can be
changed to or have lines added to the file that reads “smtp 2525/tcp” and “smtp 2525/udp”.
PVS Real-Time Traffic Analysis Configuration Theory
This section describes how configuration options affect PVS operation and provides details on PVS architecture.
Focus Network
When a focus network is specified via the “networks” keyword, only one side of a session needs to be matched on the list.
For example, if you have a DMZ that is part of the focus network list, the PVS will report on vulnerabilities of the web
server there, but not on web clients visiting from outside the network. However, a web browser within the DMZ visiting the
same web server would be reported.
Kommentare zu diesen Handbüchern