Vulnerability scans of networking equipment (extreme / brocade)

I’m looking for advice on how organizations are performing vulnerability checks of network hardware such as brocade or extreme networks gear. I’m not getting any useful info out of scans from IVM and wondering if others have had success in determining if network gear (switches, routers, etc) have known vulnerabilities that remain unpatched.