<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Typically no, but it also in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075967#M908274</link>
    <description>&lt;P&gt;Typically no, but it also depends on what Supervisor you are running. Some include a CoPP policy and some have a CMP. I assume your testing against the admin VDC?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Apr 2017 16:59:36 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2017-04-21T16:59:36Z</dc:date>
    <item>
      <title>NX7K Mgmt Interface Security</title>
      <link>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075966#M908267</link>
      <description>&lt;P&gt;&lt;BR /&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We ran a vulnerability test against the mgmt interface on the NX7K and the results came back showing that a number of services, such as SSH, DHCPs, NTP, BGP, and SNMP that are open. Are these services/ports listening to these services by default?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best, ~zK&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075966#M908267</guid>
      <dc:creator>zekebashi</dc:creator>
      <dc:date>2020-02-21T14:02:50Z</dc:date>
    </item>
    <item>
      <title>Typically no, but it also</title>
      <link>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075967#M908274</link>
      <description>&lt;P&gt;Typically no, but it also depends on what Supervisor you are running. Some include a CoPP policy and some have a CMP. I assume your testing against the admin VDC?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 16:59:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075967#M908274</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2017-04-21T16:59:36Z</dc:date>
    </item>
    <item>
      <title>We have dual N7K-SUP2. We don</title>
      <link>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075968#M908281</link>
      <description>&lt;P&gt;We have dual N7K-SUP2. We don't have CoPP enabled/configured. I am planning on implementing iACLs on the ingress interfaces that connect the VDC to our ISP. Are there any other suggestions to disable/deny ssh and other services to access the mgmt interface?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks, ~zK &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 18:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075968#M908281</guid>
      <dc:creator>zekebashi</dc:creator>
      <dc:date>2017-04-25T18:13:02Z</dc:date>
    </item>
    <item>
      <title>The easiest way is to disable</title>
      <link>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075969#M908285</link>
      <description>&lt;P&gt;The easiest way is to disable the service(s).&lt;/P&gt;
&lt;P&gt;no feature [ssh,telnet,etc]&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 19:21:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075969#M908285</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2017-04-25T19:21:26Z</dc:date>
    </item>
    <item>
      <title>How would one ssh into the</title>
      <link>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075970#M908291</link>
      <description>&lt;P&gt;How would one ssh into the vdc/switch if the ssh feature is disabled?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 20:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075970#M908291</guid>
      <dc:creator>zekebashi</dc:creator>
      <dc:date>2017-04-25T20:01:31Z</dc:date>
    </item>
    <item>
      <title>The way I set them up is to</title>
      <link>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075971#M908296</link>
      <description>&lt;P&gt;The way I set them up is to only enable services on the Admin VDC and from there I can jump to the other VDC's.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 13:07:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nx7k-mgmt-interface-security/m-p/3075971#M908296</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2017-04-26T13:07:06Z</dc:date>
    </item>
  </channel>
</rss>

