Cisco Catalyst Center Device Discovery

Overview

This feature allows you to discover Cisco Catalyst Center (formerly Cisco DNA Center) devices and run vulnerability scans on them. This will use the Catalyst Center ReST API to connect with your Catalyst Center console and fetch device information including device models and firmware version.

Pre-requisites

Access to the Cisco Catalyst Center ReST API is required through an active subscription and a username / password with the required privileges. Authentication happens over https basic authentication as the supported mechanism. Details are available here.

The API endpoints that are currently accessed by this integration are:

https://<catalyst center IP (hostname)>/dna/system/api/v1/auth/token

https://<catalyst center IP (hostname)>/dna/intent/api/v1/network-device

Please make sure the username / password has access to the above endpoints.

Steps involved

Run the twigs command as follows to connect to Cisco Catalyst Center console and discover the asset inventory:

twigs dna_center --url CATALYST_CENTER_CONSOLE_URLĀ --user AUTHORIZED_USER --password PASSWORD

All command line parameters are mandatory.

Once the discovery is complete, all relevant Meraki managed devices will be visible in the ThreatWorx console and an automated vulnerability scan will be initiated for these devices.