<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitor or Span port Vulnerablility in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/monitor-or-span-port-vulnerablility/m-p/742057#M86702</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's very unlikely, but not impossible. Snort's had a few and the general concept is applicable to any IDS.  If you suck in data off the network and process it, there's the potential for vulnerabilities.  If you're worried about it, put the management interface in a management dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.infoworld.com/article/03/03/04/HNsnort_1.html" target="_blank"&gt;http://www.infoworld.com/article/03/03/04/HNsnort_1.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 May 2007 12:18:25 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2007-05-18T12:18:25Z</dc:date>
    <item>
      <title>Monitor or Span port Vulnerablility</title>
      <link>https://community.cisco.com/t5/network-security/monitor-or-span-port-vulnerablility/m-p/742056#M86701</link>
      <description>&lt;P&gt;Is the CISCO IDS/IPS device connecting to Monitor or SPAN port Vulnerable? Is there a document which I can refer to ?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitor-or-span-port-vulnerablility/m-p/742056#M86701</guid>
      <dc:creator>sagittarius</dc:creator>
      <dc:date>2019-03-10T10:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor or Span port Vulnerablility</title>
      <link>https://community.cisco.com/t5/network-security/monitor-or-span-port-vulnerablility/m-p/742057#M86702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's very unlikely, but not impossible. Snort's had a few and the general concept is applicable to any IDS.  If you suck in data off the network and process it, there's the potential for vulnerabilities.  If you're worried about it, put the management interface in a management dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.infoworld.com/article/03/03/04/HNsnort_1.html" target="_blank"&gt;http://www.infoworld.com/article/03/03/04/HNsnort_1.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2007 12:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitor-or-span-port-vulnerablility/m-p/742057#M86702</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-05-18T12:18:25Z</dc:date>
    </item>
  </channel>
</rss>

