- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-19-2007 07:19 PM
A nessus scan was ran on our 6500 that has 2 ssl modules and the followig ports showed open. Can these be disabled, are there any vulnerablilities? What are they used for?
dc (2001/tcp)
dynamid (9002/tcp)
etlservicemgr (9001/tcp)
globe (2002/tcp)
newoak (4001/tcp)
pxc-splr-ft (4003/tcp)
pxc-spvr-ft (4002/tcp)
X11:1 (6001/tcp)
X11:2 (6002/tcp)
X11:3 (6003/tcp)
Solved! Go to Solution.
- Labels:
-
Application Networking
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-20-2007 11:18 AM
2001,2002 and 2003 are used to display debug messages.
The other ports also have a use to display engineering data.
You can't really attack the SSLM on those ports, but you should normally block all traffic going to the SSLM management interfaces except SSH/Telnet.
Gilles.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-20-2007 11:18 AM
2001,2002 and 2003 are used to display debug messages.
The other ports also have a use to display engineering data.
You can't really attack the SSLM on those ports, but you should normally block all traffic going to the SSLM management interfaces except SSH/Telnet.
Gilles.
