Thank you, @Eric chi I'm glad I could help clarify things and give you some relief. Cisco's documentation can be challenging to navigate, especially with complex topics like VLANs and PVLANs. It's great to hear that my explanations provided the guid...
Hello @mohammedalrawiib When dealing with SSL/TLS vulnerabilities, particularly those related to key exchange, it can be frustrating when the recommended solutions don't seem to resolve the issue. If your goal is to mitigate the "Weak SSL/TLS Key Exc...
Hi @Eric chi Creating a SVI for a Private VLAN's Primary VLAN lets you route traffic without breaking its isolation. It's a way to add Layer 3 (routing) while keeping Layer 2 isolation (no direct communication between isolated segments). Just make ...
@morris0117 Here some relatable answer for second one.The average RTT is calculated by summing all the RTT values for a set of ping responses and then dividing by the total number of responses.Consider a set of ping responses with a large number of l...
Hello @mohammedalrawiib Configuration changes might require a reboot to take effect. Reboot the switch and re-scan to verify if the vulnerability persists.Determine if there are other interfaces or modules on the switch that might be using SSL/TLS.wi...