The workaround for transit suggests permitting only tcp, udp, icmp, gre, esp, and ah protocols. Is this sufficient to protect the router itself, or do you have to get hard-nosed with specific ACLs (restricting access to all your possible interface addresses)?
Jeff
- Re: Cisco IOS Vulnerability joshua sahala
- Re: Cisco IOS Vulnerability Jared Mauch
- Re: Cisco IOS Vulnerability Christopher L. Morrow
- Re: Cisco IOS Vulnerability Jason Lixfeld
- RE: Cisco IOS Vulnerability Todd Mitchell - lists
- Re: Cisco IOS Vulnerability Ryan Tucker
- Re: Cisco IOS Vulnerability (going OT) Petri Helenius
- RE: Cisco IOS Vulnerability Mikael Abrahamsson
- Re: Cisco IOS Vulnerability Jared Mauch
- RE: Cisco IOS Vulnerability Sean Donelan
- Re: Cisco IOS Vulnerability Jeff Kell
- Re: Cisco IOS Vulnerability Jack Bates
- Re: Cisco IOS Vulnerability Andy Dills
- Re: Cisco IOS Vulnerability Joe Abley
- Re: Cisco IOS Vulnerability micah mcnelly
- Re: Cisco IOS Vulnerability Michael Painter
- Re: Cisco IOS Vulnerability Daniel Karrenberg
- Re: Cisco IOS Vulnerability joshua sahala
- Re: Cisco IOS Vulnerability Petri Helenius
- RE: Cisco IOS Vulnerability Darrell Kristof
- Re: Cisco IOS Vulnerability Valdis . Kletnieks
