OpenVAS Connector

OpenVAS is the scanner component of Greenbone Vulnerability Manager, a software framework of several services and tools offering vulnerability scanning and vulnerability management. All Greenbone Vulnerability Manager products are free software, and most components are licensed under the GNU General Public License.

To import your data to Cisco Vulnerability Management, you will need to leverage the OpenVas Connector under ‘Vulnerability Management’ tools. The OpenVAS connector is a file-based connector. To learn more about the difference in connectors (API vs File-based) click here.

Configuring your Connector in Cisco Vulnerability Management

To set up the Connector, navigate to the Connectors tab in your Cisco Vulnerability Management deployment (you must be a Cisco Vulnerability Management Administrator to do so). On the Connectors page, select OpenVAS.




Once you select the OpenVas Connector a secondary screen will appear in which you may:

  • Enter a name for the connector, or leave it as “OpenVas” if you wish.

  • Click Save and Verify.

  • If you’d like to set a connector level asset inactivity limit, you can do that at this time, or later. (We recommend 2-3x the scan cadence of your <scanner name> Scans).

What OpenVas Items does Cisco Vulnerability Management Import?

openVAS Field

Cisco Vulnerability Management Field





source_vulnerability > identifier

Identifier (Vulnerability)







Not Imported



Vulnerability status is by default ‘Open’ as it is reported in the Scan Report. Once it is no longer present in the Scan Report (scanner no longer finds the vuln) we will auto-close the vulnerability.




host_detail > host_ip



host_detail > OS + best_OS_test + os_detection

Operating System


host_detail > ports + tcp_ports





Date the vuln was first imported to Cisco Vulnerability Management. Not mapped to a OpenVAS field.


The Connector does not pull in the following:

  • Custom Fields

  • Tags

Optional Settings

The following settings can be enabled on the backend for <Scanner Name> Connectors. To have these settings enabled, or for more information, please contact Support, or your Customer Success Engineer.

  • Exclude Informationals

    • When this option is enabled, Cisco Vulnerability Management will not import vulnerabilities that do not include a CVE, CWE, or WASC ID.

  • Ignore Scanner Last Seen Time

    • If you do not want the asset last seen time in Cisco Vulnerability Management to be the scanner reported last seen time.

  • Custom Ordered Locators

    • Locators (IP, Netbios, FQDN, etc) can be reordered to better deduplicate vulnerabilities on the Connector level or the entire Platform level. For more information see the help article here.

Common Reasons forOpenVas Connector Run Failures

  • Unexpected data returned

    • If Cisco Vulnerability Management receives data that is not in the expected format and we are unable to process it, the connector will fail.

  • If more than 1% of connector payloads fail to import cleanly, Cisco Vulnerability Management will auto-fail the Connector Run

Additional Assistance:

Please contact Support should you require any additional assistance with the OpenVas Connector(s).

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request



Please sign in to leave a comment.