08-19-2016 11:36 AM - edited 03-10-2019 12:42 AM
Dear All,
We need one workaround or something else.
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr
Could you help
Kind Regards
Solved! Go to Solution.
08-19-2016 12:56 PM
Yeah, that's basically it.
08-19-2016 12:42 PM
The best suggestion I have is to limit SSH access to the device.
08-19-2016 12:44 PM
Sorry, but
Can you help my with more about this.?
Thank you so much.
08-19-2016 12:48 PM
Putting an access-list on the VTY will prevent attackers from connecting: the TCP SYN packet will be rejected, and the TCP connection will not be established; without the TCP connection the attacker will not be able to exploit the vulnerability
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/12-4t/sec-data-acl-12-4t-book/sec-cntrl-acc-vtl.html
08-19-2016 12:55 PM
Ah, that's good.
Something like this?
------------------------------------------
line vty 0 4
session-timeout 30
access-class 30 in
----------------------------------------------------------------
SWITCH#sh access-lists
Standard IP access list 30
10 permit 192.168.1.1
20 permit 192.168.1.2 (618 matches)
--------------------------------------------------------
Or more specific.
Please advice
08-19-2016 12:56 PM
Yeah, that's basically it.
08-19-2016 12:58 PM
Thank for help me Phill Brutsche. again, thank for your time.
And, Again, thank for your time.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide