Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Good morning
Checking an ACI leaf switch I found these static routes
ip route 10.10.0.0/16 0.0.0.0 200 (gateway 0.0.0.0 ?)ip route 10.10.0.0/16 10.1.0.1 210
Checking the routing table, it's been considered only the route number 2 (distance 210)
1...
Good morning I have some questions about the path to upgrade a pair of Nexus 7004/7006/7010 switches (presenting VDCs and single-homed FEX)Those Nexus today have the version 6.2.16 installed To reach the version 8.2.6 or 8.2.7a, should we go to the p...
Good afternoon Due to vulnerabilites present on our ASR route, we have to upgrade its IOS-XE versionWe are a little confused about IOS-XE recommended version, smart licensing, ROMMON, etc, even reading some Cisco documentation.router model: ASR1001-X...
Good morning Advisory says: "A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software" and " there's no workaround"Please, how can I check in device (IOS or IOS-XE) if this " HTTP client feature" is active or used?Is it the same as...
Good morningAdvisory informs: "At the time of publication, this vulnerability affected Cisco routers running a vulnerable release of Cisco IOS or IOS XE Software with the RADIUS Change of Authorization feature configured" and also "there's no workar...
Actually I can see next-hop 0.0.0.0 only in static route configuration:
ip route 10.10.0.0/16 0.0.0.0 200but exactly as explained before, this route/gateway is considered invalid and not input in routing table
Hello Giuseppe
Thanks for your answer. I found something about this matter in Internet, even in another topic in Cisco Community:https://community.cisco.com/t5/switching/static-route-next-hop-0-0-0-0-quot-ip-route-192-168-1-0-255-255/td-p/663840but I...
Thanks for our reply. Very helpful.Regarding releases 16.6 and 16.9, from which one is mandatory to use Smart License?I read something about starting from release 16.9, but we found some Cisco article informing that it's mandatory from release 16.10....
Sorry, but the question is not how to verify whether a software version is potentially vulnerable or not.Of course, you can confirm it by IOS Checker and I think it's kind a first step to confirm your device is affected. The question is how to verify...
Thanks for your help
Could someone confirm: Is Any 9.1.7 release or patch so far vulnerable?This vulnerability only affects truspoints created to be used by VPNs, not affecting ASDM access?RegardsChristian