Nov
10
2013
October 2013: seven Cisco vulnerabilities
Cisco-vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published seven important vulnerability advisories: Multiple Vulnerabilities in Cisco IOS XE Software for 1000 Series Aggregation Services Routers Cisco IOS XR Software Route Processor Denial of Service Vulnerability Multiple Vulnerabilities in Cisco Identity Services Engine Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products Multiple Vulnerabilities in Cisco Firewall Services Module Software Multiple Vulnerabilities in Cisco ASA Software Cisco IOS XR Software Memory Exhaustion Vulnerability

Oct
12
2013
September 2013: eleven Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published eleven important vulnerability advisories: Cisco IOS Software Queue Wedge Denial of Service Vulnerability Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability Cisco IOS Software DHCP Denial of Service Vulnerability Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability Cisco IOS Software Network Address Translation Vulnerabilities Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service Vulnerability Cisco Prime Central for Hosted Collaboration Solution Assurance Unauthenticated Username and Password […]

Sep
26
2013
WhoisUP v0.2 released!

One year ago, I had published Whoisup v0.1, a script that monitors hosts via ICMP and shows the status in a web page. The script had obtained a good success, so I have decides to continue the WhoisUP project. The version 0.2 has several improvements: Fixed some bugs in the core.php script and in the CSS file Added the warning latency value Added the width index page Added the maintenance mode Added the compact view Added the the core.php check

Sep
20
2013
August 2013: six Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published six important vulnerability advisories: Cisco Secure Access Control Server Remote Command Execution Vulnerability Multiple Vulnerabilities in Cisco Unified Communications Manager Cisco Prime Central for Hosted Collaboration Solution Assurance Denial of Service Vulnerabilities Cisco Unified Communications Manager IM and Presence Service Denial of Service Vulnerability Cisco TelePresence System Default Credentials Vulnerability OSPF LSA Manipulation Vulnerability in Multiple Cisco Products

Aug
22
2013
How to save configurations using SNMP
How-to-save-the-running-configuration-using-SNMP

Everyone knows there are software to get the configuration using SNMP; but how can you copy the configuration if you don’t have any tool? Let me explain what is SNMP before show you how to implement it. Simple Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP uses an extensible design, where the available information is defined by management information bases (MIBs). MIBs describe the […]

Aug
12
2013
July 2013: five Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Authenticated Command Injection Vulnerability in Multiple Cisco Content Network and Video Delivery Products Cisco WAAS Central Manager Remote Code Execution Vulnerability Multiple Vulnerabilities in the Cisco Video Surveillance Manager Multiple Vulnerabilities in Cisco Intrusion Prevention System Software Multiple Vulnerabilities in Cisco Unified Communications Manager Authenticated Command Injection Vulnerability in Multiple Cisco Content Network and Video Delivery Products Multiple Cisco content network and video delivery products contain a vulnerability when they are configured to run in central management mode. This vulnerability could allow an authenticated but unprivileged, […]

Jul
11
2013
June 2013: five Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Multiple Vulnerabilities in Cisco Web Security Appliance Multiple Vulnerabilities in Cisco Email Security Appliance Multiple Vulnerabilities in Cisco Content Security Management Appliance Cisco ASA Next-Generation Firewall Fragmented Traffic Denial of Service Vulnerability Multiple Vulnerabilities in Cisco TelePresence TC and TE Software

Jun
5
2013
May 2013: two Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published two important vulnerability advisories: Cisco TelePresence Supervisor MSE 8050 Denial of Service Vulnerability Multiple Vulnerabilities in Cisco Unified Customer Voice Portal Software Cisco TelePresence Supervisor MSE 8050 Denial of Service Vulnerability Cisco TelePresence Supervisor MSE 8050 contains a vulnerability that may allow an unauthenticated, remote attacker to cause high CPU utilization and a reload of the affected system. Vulnerable Products Cisco TelePresence Supervisor MSE 8050 running software versions 2.2(1.17) and earlier are affected by this vulnerability.

May
14
2013
Reload in X? Why don’t you rollback or replace the configuration?

Do you remember the article ‘How to schedule a reload‘? This feature (reload in ‘x’) is useful when you must apply a critical configuration on a remote device, for instance new route or new acl. In fact, if you happen to lose connection to device after a change, you must wait the device reload to reconnect to it. This can be a solution but there is a better solution: the replace/roolback feature. Introduced in 12.3(7)T IOS, the Configuration Replace and Configuration Rollback features provide the capability to replace the current running configuration with any saved Cisco IOS configuration file. This […]

May
8
2013
Using IP SLA to change routing

Cisco IP SLAs is a part of Cisco IOS that allows Cisco customers to analyze IP service levels for IP applications and services by using active traffic monitoring for measuring network performance. With Cisco IOS IP SLAs, service provider customers can measure and provide service level agreements, and enterprise customers can verify service levels, verify outsourced service level agreements, and understand network performance. Cisco IOS IP SLAs can perform network assessments, verify quality of service (QoS), ease the deployment of new services, and assist with network troubleshooting. IP SLAs collects a unique subset of these performance metrics: Delay (both round-trip […]

Pages:«1234567...24»

Email Updates

Enter your email address to receive notifications of new posts.

Ciscozine on Facebook


Partners