nanog mailing list archives
Re: Cisco IOS Vulnerability
From: Jeff Kell <jeff-kell () utc edu>
Date: Thu, 17 Jul 2003 02:13:18 -0400
The workaround for transit suggests permitting only tcp, udp, icmp, gre, esp, and ah protocols. Is this sufficient to protect the router itself, or do you have to get hard-nosed with specific ACLs (restricting access to all your possible interface addresses)?
Jeff
Current thread:
- Re: Cisco IOS Vulnerability, (continued)
- Re: Cisco IOS Vulnerability Jared Mauch (Jul 16)
- Re: Cisco IOS Vulnerability Christopher L. Morrow (Jul 16)
- Re: Cisco IOS Vulnerability Jason Lixfeld (Jul 16)
- RE: Cisco IOS Vulnerability Todd Mitchell - lists (Jul 16)
- Re: Cisco IOS Vulnerability Ryan Tucker (Jul 16)
- Re: Cisco IOS Vulnerability (going OT) Petri Helenius (Jul 16)
- Flapping (was Re: Cisco IOS Vulnerability) Sean Donelan (Jul 16)
- RE: Cisco IOS Vulnerability Mikael Abrahamsson (Jul 16)
- Re: Cisco IOS Vulnerability Jared Mauch (Jul 16)
- RE: Cisco IOS Vulnerability Sean Donelan (Jul 16)
- Re: Cisco IOS Vulnerability Jeff Kell (Jul 16)
- Re: Cisco IOS Vulnerability Jack Bates (Jul 17)
- Re: Cisco IOS Vulnerability Andy Dills (Jul 17)
- Re: Cisco IOS Vulnerability Joe Abley (Jul 17)
- Re: Cisco IOS Vulnerability micah mcnelly (Jul 17)
- Re: Cisco IOS Vulnerability Michael Painter (Jul 17)
- Re: Cisco IOS Vulnerability Daniel Karrenberg (Jul 18)
- Re: Cisco IOS Vulnerability joshua sahala (Jul 18)
- Re: Cisco IOS Vulnerability Petri Helenius (Jul 18)
- RE: Cisco IOS Vulnerability Darrell Kristof (Jul 16)
- Re: Cisco IOS Vulnerability Valdis . Kletnieks (Jul 17)