{% extends "base.html" %} {% block title %}Setup - Hermetic Suite{% endblock %} {% block content %}

Step 1: Network Ranges

Enter the CIDR ranges for your internal network. These will be used for host discovery.

Examples: 10.0.0.0/16 covers 10.0.0.0-10.0.255.255, 172.30.0.0/24 covers 172.30.0.0-172.30.0.255

Step 2: SSH Key (Optional)

Add an SSH key to enable authenticated scanning. This allows Hermetic Suite to:

  • Get server hostnames instead of DNS names
  • Check actual installed package versions
  • Detect which vulnerabilities are already patched
Select your .pem private key file
The username used to connect to your servers

What's Next?

After setup, you can:

  • Discovery - Scan your network to find servers
  • Scan - Run vulnerability scans on discovered servers
  • Settings - Manage SSH keys, users, and scan profiles

You can always change these settings later from the Settings page.

{% endblock %}