<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Does view iso weaken security? in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/does-view-iso-weaken-security/m-p/351601#M22711</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you are concerend about SNMP security you can tie SNMP gets/sets etc down to a specific IP address of your NMS server. Plus you can specify which IP addresses traps will be sent from your AP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;myap(config)#snmp-server community mystring ro ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &amp;lt;1-99&amp;gt;       Std IP accesslist allowing access with this community string&lt;/P&gt;&lt;P&gt;  &amp;lt;1300-1999&amp;gt;  Expanded IP accesslist allowing access with this community&lt;/P&gt;&lt;P&gt;               string&lt;/P&gt;&lt;P&gt;  &lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;PD&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Jan 2005 12:50:10 GMT</pubDate>
    <dc:creator>paddyxdoyle</dc:creator>
    <dc:date>2005-01-31T12:50:10Z</dc:date>
    <item>
      <title>Does view iso weaken security?</title>
      <link>https://community.cisco.com/t5/wireless/does-view-iso-weaken-security/m-p/351600#M22710</link>
      <description>&lt;P&gt;snmp-server view iso iso included&lt;/P&gt;&lt;P&gt;snmp-server community comm_ro view iso RO&lt;/P&gt;&lt;P&gt;snmp-server community comm_rw view iso RW&lt;/P&gt;&lt;P&gt;Does the view iso create a weak spot in the security of the wireless network since hackers know the view exists on all AP's? If the snmp community is entered in WLSE for each access point would that allow for radio management or does the iso view have to exist? Can view iso be exploited? I do not know how to test for an snmp exploit. My instinct tells me that any common item included in a device configuration weakens the security for that device.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 17:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/does-view-iso-weaken-security/m-p/351600#M22710</guid>
      <dc:creator>gwcrook</dc:creator>
      <dc:date>2021-07-04T17:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: Does view iso weaken security?</title>
      <link>https://community.cisco.com/t5/wireless/does-view-iso-weaken-security/m-p/351601#M22711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you are concerend about SNMP security you can tie SNMP gets/sets etc down to a specific IP address of your NMS server. Plus you can specify which IP addresses traps will be sent from your AP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;myap(config)#snmp-server community mystring ro ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &amp;lt;1-99&amp;gt;       Std IP accesslist allowing access with this community string&lt;/P&gt;&lt;P&gt;  &amp;lt;1300-1999&amp;gt;  Expanded IP accesslist allowing access with this community&lt;/P&gt;&lt;P&gt;               string&lt;/P&gt;&lt;P&gt;  &lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;PD&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2005 12:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/does-view-iso-weaken-security/m-p/351601#M22711</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2005-01-31T12:50:10Z</dc:date>
    </item>
  </channel>
</rss>

