12-17-2021 02:13 AM
I know Cisco have confirmed IOS and IOS-XE are not vulnerable to Log4J but there is now an increased security concern around anything apache or http related.
We have onboarded most of our network switches to DNA Center to take advantage of telemetry and software image manager. During the onboarding DNA enables the below configuration as part of the provision process:
ip http server
ip http authentication local
ip http secure-server
ip http max-connections 16
ip http client source-interface xxxx
I'll need to justify to my security department why we need to enable these commands. Can anyone explain why the above is required or point me in the direction of some documentation?
Again, I know the above has no relationship to Log4J but still need to know why the commands are required.
12-19-2021 06:10 PM
Hi
You need HTTP enable if you have Wireless Lan Controller on the Switch with Guest access. Otherwise, you dont need. DNAC does not enable it by default, I´m assuming that someone added this lines on the template. You can run a template disabling it with "no ip http server" if you dont need HTTP on the switch.
12-22-2021 05:53 AM
Good Morning Flavio,
I experience the same issue as Steve. I deploy switches fully configured with both options disabled. When I add them into DNAC it pushes the config out to them to re-enable.
12-22-2021 05:51 AM
I've always been curious why DNAC does this as well. We have always disabled both by default as there always seem to be a critical bug in their switch software for HTTP(s).
06-12-2022 01:07 AM
Hi All,
I'm in the same boat, anyone got any update on this?
10-24-2024 02:28 AM
Im also having this issue.
We deploy a day-n template when provisioning switches that disable http(s) server, but this causes the device to be "non-compliant". Is there a way around this now? Or is there another way to secure the webserver - because using access-class does not stop the http server from responding, it still responds with http 403 unauthorized if the source doesnt match the acl. We are looking for guidance on this before we go ahead and re-enable it.
It is annoying that all our switches are non-compliant because of this, so we can't spot switches that are genuinely out of compliance.
10-24-2024 08:24 AM
@81001 Which compliance test is failing? Perhaps it's the Security Advisory?
10-24-2024 08:42 AM
No, Network settings. Violation is :
HTTP NR Settings | Is HTTP Server Enabled | Changed | true | false |
expects this condition to be true, but our day-n has issues a "no ip http server" command
10-24-2024 09:00 AM
You should have the option to "Acknowledge" the violation when you click on the Network Settings tile of the Compliance summary page in Inventory. Did you already try this?
10-24-2024 09:22 AM
Yes there is an option - but we have 400+ switches. Is there an API to do this with latest catalyst center release? We are on 2.3.5.5 now
10-24-2024 10:16 AM
Ya, that is a pain to do in bulk. There is no way to day to acknowledge in bulk, but I think it's something that needs to be added. You (and anyone else reading this) could do us all a favor by submitting a Make a Wish from the Cat Center help menu to deliver this request directly to Product Management.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide