I am in the process of scanning our network for vulnerabilities. In the process I came across our Core switch, Cisco 3700 with a physical stack, with some vulnerabilities. I would like your help on mitigating these risks and any possible road bloks I may encounter. Attached is the actual summary.
1. SSH Protocol Version 1 Supported
2. Management Interfaces Accessible on Cisco Device Vulnerabilitiy
3. SSH Weak Cipher used
4. UDP Contant IP Identifiaction Field Fingerprinting
5. NTP Information Disclosure
Any step in the righ direction would be most beneficial and very much appreciated.
I am installing IDE using Firepower. I have set up firepower on the management port. I gave it a .190 address (last quad). The Firepower management center .189 is on a different subnet. That subnet can ping the interface .189 but not the management port ....
Hello,We have a SDA network with DNAC and ISE.In this network we have different teams with different AD domain and PKI. (domains do not trust each other)Users are only sharing same switches in the fabric. We want to authenticate the endpoints with EA...
Questionhello all , i have a issue about the ise 2.6 redirect url, when i finish ise configuration and try to web auth, what i got shown as below:Redirect URL : https://ip:port/portal/gateway?mac=ClientMacValue&portal=27041710-2e58-11e9-98fb 005...
Community Live video- How to optimize your Cisco Security investments with Threat Response
(Live event - formerly known as Webcast- Tuesday February 18, 2020 at 10 am Pacific/ 1 pm Eastern / 7 pm Paris)
This event had place on Tuesday 18th, Februa...
Join us live from the RSAC show floor on Tuesday, February 25 at 12:30 pm PT (and on demand after) for a livestreaming event that captures the excitement of RSAC and shares the latest from Cisco Security. Host Jason Wright will be joined by Cisco exe...