09-11-2017 04:33 AM - edited 03-08-2019 11:58 AM
Hi Team,
i have cisco WS-C6506-E chassi running with "s3223-ipbasek9-mz.122-33.SXJ10.bin" IOS .Below are the vulnerability hitting on the perticular IOS.
Unsupported Cisco Operating System
SSH Server CBC Mode Ciphers Enabled
SSH Weak MAC Algorithms Enabled
Kindly letmeknow how we can recover the same.
09-11-2017 04:56 AM - edited 09-11-2017 05:03 AM
Hi
I recommend upgrade your IOS, use crypto key size of 1024 as minimal and SSH v2, please check this link:
Also you can open a ticket with the Cisco TAC.
:-)
09-11-2017 05:22 AM
Hi Julio,
Kindly let me know which is the stayable version.
09-11-2017 05:58 AM
Hi
The following link will show you the latest images, but to be honest you should reach the Cisco TAC to get a proper solution.
:-)
09-11-2017 02:01 PM
@vishnupalloormeethal wrote:
Hi Julio,
Kindly let me know which is the stayable version.
No one knows the inside of your network more than you. And this is the reason why no one is going to recommend what version your network should be running on.
However, go to the Cisco download website, pick a version you might be interested on and read the Release Notes carefully. The Release Notes will determine if the software version is or might-be suitable for your needs or not.
09-11-2017 08:34 AM - edited 09-11-2017 08:34 AM
I agree with Julio, anytime you deal with distribution core switch you need to validate code version with Cisco TAC for a recommended version. However, for a quick look you need to identify your sup model then based on that you can find out which code its compatiable with such as for:
Catalyst 6500 Series Virtual Switching Supervisor Engine 720 with 10GE uplinks
suggested code: IOS Software-15.1.2-SY10
I hope this helps. Good luck!
09-11-2017 05:05 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide