<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nexus 9300 security issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790535#M1098536</link>
    <description>&lt;P&gt;Thanks for your reply. I can see local port 22, 161, and 179 via command show sockets connection tcp, but i cannot see port 449 which is relative with tls&lt;/P&gt;&lt;P&gt;As the above mentioned, show ssh/show ip ssh, show run | in http, all of these do not show any result, but see below&lt;/P&gt;&lt;P&gt;SW01# show nxapi&lt;BR /&gt;nxapi enabled&lt;BR /&gt;HTTP Listen on port 80&lt;BR /&gt;HTTPS Listen on port 443&lt;/P&gt;&lt;P&gt;Do we have a command to disable the ports?&amp;nbsp;&lt;/P&gt;&lt;P&gt;no feature http-server cannot work&lt;/P&gt;</description>
    <pubDate>Thu, 09 Mar 2023 16:30:00 GMT</pubDate>
    <dc:creator>Leftz</dc:creator>
    <dc:date>2023-03-09T16:30:00Z</dc:date>
    <item>
      <title>Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4789835#M1098511</link>
      <description>&lt;P&gt;Hi Nexus 9300 has security vulnerability issue as Qualys report as below. The configuration use default ssh without http and https configuration. and also I cannot see any tls configuration via the below command. The report looks like to tell some issue relative with tls. but i cannot see any issue relative with tls via some command below. Anyone can share some experience? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SW01# show run | include "line"&lt;BR /&gt;line console&lt;BR /&gt;line vty&lt;/P&gt;&lt;P&gt;SW01# show run | include tls&lt;/P&gt;&lt;P&gt;SW01# show run | include TLS&lt;/P&gt;&lt;P&gt;(show no result)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----- Qualys info as below -------&lt;/P&gt;&lt;P&gt;192.168.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco Nexus Switch&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host scanned, found vuln&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 38739&amp;nbsp;&amp;nbsp;&amp;nbsp; Deprecated SSH Cryptographic Settings&amp;nbsp; Active&amp;nbsp;&amp;nbsp; Vuln&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; over ssl&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 44878.88163&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 44920.90683&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Deprecating TLS 1.0 and TLS 1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.2 (E:U/RL:U/RC:C)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Asset Group: Network Devices - US Network Devices - Seattle, Collateral Damage Potential:&amp;nbsp; Not Defined, Target Distribution: Not Defined, Confidentiality Requirement: Not Defined, Integrity Requirement: Not Defined, Availability Requirement: Not Defined&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.4 (E:U/RL:U/RC:C)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "Disable the use of TLSv1.1 protocol in favor of a cryptographically stronger protocol such as TLSv1.2.&lt;/P&gt;&lt;P&gt;The following openssl commands can be used to do a manual test:&lt;/P&gt;&lt;P&gt;openssl s_client -connect ip:port -tls1_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the test is successful, then the target support TLSv1.1"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TLSv1.1 is supported#&amp;nbsp;&amp;nbsp;&amp;nbsp; no&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; General remote services&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 338&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 19:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4789835#M1098511</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-03-08T19:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4789961#M1098519</link>
      <description>&lt;P&gt;check show run | in http&lt;/P&gt;
&lt;P&gt;show ssh (also check any older ssh running)&lt;/P&gt;
&lt;P&gt;also if you enable API, default TLS 1.1 - &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;show nxapi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;#nxapi ssl-protocols {TLSv1.0 TLSv1.1 TLSv1.2}&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;you can issue and see what ports are listening :&lt;/P&gt;
&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;PRE&gt;# show sockets connection tcp&lt;/PRE&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 02:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4789961#M1098519</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-03-09T02:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790535#M1098536</link>
      <description>&lt;P&gt;Thanks for your reply. I can see local port 22, 161, and 179 via command show sockets connection tcp, but i cannot see port 449 which is relative with tls&lt;/P&gt;&lt;P&gt;As the above mentioned, show ssh/show ip ssh, show run | in http, all of these do not show any result, but see below&lt;/P&gt;&lt;P&gt;SW01# show nxapi&lt;BR /&gt;nxapi enabled&lt;BR /&gt;HTTP Listen on port 80&lt;BR /&gt;HTTPS Listen on port 443&lt;/P&gt;&lt;P&gt;Do we have a command to disable the ports?&amp;nbsp;&lt;/P&gt;&lt;P&gt;no feature http-server cannot work&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 16:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790535#M1098536</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-03-09T16:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790597#M1098539</link>
      <description>&lt;P&gt;if you are not using nexus api you can remove :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="ariaid-title9" class="title topictitle3"&gt;NX-API Management Commands&lt;/H3&gt;
&lt;SECTION class="body conbody"&gt;
&lt;P class="p"&gt;You can enable and manage NX-API with the CLI commands listed in the following table.&lt;/P&gt;
&lt;DIV class="tableContainer"&gt;
&lt;TABLE id="concept_1BB6AE2F8269406D9D0B7656F65CF316__table_8E3211B5A7FC4582993BD0662BF65141" class="table" border="1" width="100%"&gt;&lt;CAPTION&gt;&lt;SPAN class="table--title-label tabletitle"&gt;Table 1.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="tabletitle"&gt;NX-API Management Commands&lt;/SPAN&gt;&lt;/CAPTION&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;
&lt;THEAD class="thead"&gt;
&lt;TR class="row"&gt;
&lt;TH id="concept_1BB6AE2F8269406D9D0B7656F65CF316__table_8E3211B5A7FC4582993BD0662BF65141__entry__1" class="entry"&gt;NX-API Management Command&lt;/TH&gt;
&lt;TH id="concept_1BB6AE2F8269406D9D0B7656F65CF316__table_8E3211B5A7FC4582993BD0662BF65141__entry__2" class="entry"&gt;Description&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY class="tbody"&gt;
&lt;TR class="row"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;feature nxapi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Enables NX-API.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="row"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;no feature nxapi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Disables NX-API.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="row"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;nxapi&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;{&lt;SPAN class="keyword kwd"&gt;http&lt;/SPAN&gt;|&lt;SPAN class="keyword kwd"&gt;https&lt;/SPAN&gt;}&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="keyword kwd"&gt;port&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;VAR&gt;port&lt;/VAR&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Specifies a port.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="row"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;no nxapi&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;{&lt;SPAN class="keyword kwd"&gt;http&lt;/SPAN&gt;|&lt;SPAN class="keyword kwd"&gt;https&lt;/SPAN&gt;}&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Disables HTTP/HTTPS.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="row"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;show nxapi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Displays port information.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="row"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;nxapi certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;{&lt;VAR&gt;httpscrt&lt;/VAR&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;|&lt;VAR&gt;httpskey&lt;/VAR&gt;}&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Specifies the upload of the following:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI id="concept_1BB6AE2F8269406D9D0B7656F65CF316__li_47A85CBBCA1948A0A62CF694A5CA7017" class="li"&gt;
&lt;P class="p"&gt;HTTPS certificate when&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph synph"&gt;&lt;VAR&gt;httpscrt&lt;/VAR&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;is specified.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_1BB6AE2F8269406D9D0B7656F65CF316__li_D7BF075127D6425AB0BE9AF659E1F270" class="li"&gt;
&lt;P class="p"&gt;HTTPS key when&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph synph"&gt;&lt;VAR&gt;httpskey&lt;/VAR&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;is specified.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="row"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;nxapi certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;VAR&gt;enable&lt;/VAR&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Enables a certificate.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if above message not visible use below guide :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/programmability/guide/b_Cisco_Nexus_9000_Series_NX-OS_Programmability_Guide/b_Cisco_Nexus_9000_Series_NX-OS_Programmability_Guide_chapter_011.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/programmability/guide/b_Cisco_Nexus_9000_Series_NX-OS_Programmability_Guide/b_Cisco_Nexus_9000_Series_NX-OS_Programmability_Guide_chapter_011.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 17:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790597#M1098539</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-03-09T17:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790654#M1098542</link>
      <description>&lt;P&gt;Great! no nxapi http/https can be entered. it should work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 19:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790654#M1098542</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-03-09T19:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790669#M1098544</link>
      <description>&lt;P&gt;the command "&amp;nbsp;&lt;SPAN&gt;nxapi ssl-protocols {TLSv1.0 TLSv1.1 TLSv1.2}" cannot be run in this sw. Do not know why&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please see the below:&lt;/P&gt;&lt;P&gt;SW01(config)# nxapi ?&lt;BR /&gt;certificate Https certificate configuration&lt;BR /&gt;http Http configuration&lt;BR /&gt;https Https configuration&lt;BR /&gt;use-vrf Vrf to be used for nxapi communication&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 20:09:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790669#M1098544</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-03-09T20:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790730#M1098546</link>
      <description>&lt;P&gt;depends on the nexus code you use. check the version command reference for more.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 21:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790730#M1098546</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-03-09T21:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: Nexus 9300 security issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790746#M1098548</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 22:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9300-security-issue/m-p/4790746#M1098548</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-03-09T22:00:11Z</dc:date>
    </item>
  </channel>
</rss>

