04-16-2018 02:35 AM - edited 03-08-2019 02:39 PM
Hello Everyone,
We have this C3750 switches on our network with IOS version - 12.2(55)SE1. To fix recent vulnerability with smart install ( https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-smartinstall ) we have been disabling vstack on all our switches as we dont use this feature. Vstack configuration are as follows -
#show vstack config
Role: Client
Vstack Director IP address: 0.0.0.0
*** Following configurations will be effective only on director ***
Vstack default management vlan: 1
Vstack management Vlans: none
Join Window Details:
Window: Open (default)
Operation Mode: auto (default)
Vstack Backup Details:
Mode: On (default)
Repository:
#show tcp brief all | include 4786
06170394 *.4786 *.* LISTEN
#sh run | i vstack
#
IOS -
Switch Ports Model SW Version SW Image
------ ----- ----- ---------- ----------
* 1 52 WS-C3750-48P 12.2(55)SE1 C3750-IPSERVICESK9-M
On these 3750s ' No Vstack ' command is unavailable. I have tried few of the followings but vstack was still enabled and port 4786 is still listening.
#conf t
Enter configuration commands, one per line. End with CNTL/Z.
(config)#no vstack ?
backup - Configuration backup feature
basic - Enable vstack director
config - Configure default configuration file
dhcp-localserver Configure vstack dhcp parameters
director - Configure director's IP address
group - Configure a group for vstack
hostname-prefix Specify hostname prefix for Client
image - Configure default image file
join-window Configure time interval to enable director
vlan - Configure vstack management vlan
Any ideas how we can disable vstack on these models please ?
Regards,
Sheikh
04-16-2018 02:45 AM
04-16-2018 02:56 AM
04-16-2018 02:50 AM - edited 04-20-2018 07:06 PM
What about "no vstack config"?
Smart Install was only introduced starting from 12.2(55)SE2 and later. I think with the current version Smart Install was still operating as a "bug".
My only recommendation is to upgrade the IOS. 12.2(55)SE1 is not really that stable.
WARNING: This recommedation (disable Smart Install by using the command "no vstack") is no longer valid. Read my updated response.
04-16-2018 02:56 AM
04-16-2018 06:08 AM
04-16-2018 06:29 AM
04-16-2018 06:51 AM
04-20-2018 12:28 AM
We dont have internal FTP.
There is now enough space in the flash to copy the files. However, the error msg I am getting is not relevant to to space requirement. hence the confusion. I could delete the existing IOS and try copying the new one but it fails then I end up having a production switch with no IOS on it.
I are to replace our switches later on this year with 3850Xs. But looks like I will have to replace these 3750s now to mitigate the recent vulnerability identified with smart install.
I might try removing the existing IOS and try copying the new IOS again when I have a downtime.
Please share if you have any more ideas.
Regards,
Sheikh
04-20-2018 02:15 AM
Hi there,
If you are patient, why don't your try a xmodem transfer. Make sure you set the console baud rate to something high:
! line con 0 speed 115200 !
cheers,
Seb.
04-20-2018 02:20 AM
04-20-2018 05:28 AM
04-20-2018 07:05 PM
If no one is using Smart Install then running the command poses no risk to the network.
(Switch models as old as 2940/2950/2955, 3550 and EARLIER are not covered by this response. I am not yet sure how the new Catalyst 9K behaves.)
I got some good news and some bad news.
The GOOD news
The list of routers & switches that support Smart Install can be found HERE. What is missing in the list are the 3650/3850 and 4500/6500 Supervisor cards. This list is important.
IF you have appliances found in this list, this means the only way to disable Smart Install is to use the command "no vstack" or "no vstack config".
The BAD news (a really bad one)
If you have appliances (routers &/or Catalyst switches) not in this list, the ACL must be applied. Emphasis on the word "must".
04-27-2018 07:04 AM
Thanks guys.
Before I plan replacement of these switches with new ones that we now have, ACL may be an option.
Looking at this - https://bst.cloudapps.cisco.com/bugsearch/bug/CSCtj75729
Control plane policing -
access-list 150 permit ip any any eq 4786
class-map match-all drop-smartinstall-class match access-group 150
policy-map control-plane-policy class drop-smartinstall-class drop
control-plane service-policy input control-plane-policy
Is this application to c3750 s ?
2nd option - Infrastructure Access Control Lists
access-list 150 deny ip any INFRASTRUCTURE_ADDRESSES WILDCARD eq 4786
access-list 150 permit ip any any
Then applying this ACL on all interfaces.
Has anyone applied this ? Any suggestions with this ACLs ?
Regards,
Sheikh
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide