01-11-2024 05:47 PM
Actually deploying a new UCS X-Series Domain in IMM mode, but before to provide internet access for Interisght connectivity, cibersecutity team is doing a vulnerability test to the management IP of Fabric Interconnects.
Finding some help about questions:
- Changing SSH default port
- Disable SNMP ports that actually shows enabled
- Disable TCP/8080 port
I didnt found any specific guide to make changes like this to the Fabric Interconnects in IMM mode.
01-11-2024 08:10 PM
- Changing SSH default port - Intersight SSH Policy is applicable only for UCS Servers (Standalone). No option at present in policies for Fabric Interconnects. Kindly submit a feedback in Intersight to request this feature.
- Disable SNMP ports that actually shows enabled - Apply Domain Profile with SNMP policy to disable SNMP.
- Disable TCP/8080 port - My understanding is, this should be disabled. Kindly open a TAC case to investigate this further.
01-12-2024 06:56 AM
Thanks @Sandeep Kumar, the basic nmap test shows: 22/tcp, 161/tcp, 161/udp, 443/tcp and 9876/tcp opened and 8080/tcp filtered.
Is possible to disable the SNMP port from Fabric Interconnect CLI or Device Connector, because customer is asking to close that ports before to provide internet access, so the Fabrics are not claimed yet from Intersight.
01-12-2024 11:50 AM
Kindly check with TAC to see if they can help you to add Iptable rules to block SNMP traffic on the FI's till a Domain profile is applied.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide