S-376: Cisco uBR10012 Series Devices SNMP Vulnerability
Cisco uBR10012 series devices automatically enable Simple Network Management Protocol (SNMP) read/write access to the device if configured for linecard redundancy. This can be exploited by an attacker to gain complete control of the device. The risk is HIGH. Successful exploitation of the vulnerability may allow an attacker to gain complete control of the device.
Hi,
My name is SAMKZ and I'm a dummy with Linux and I'm so sad about that.
I need to have a Syslog Server to archive Logs from my Cisco Routers and Switches.
I'd like to know to most robust way of doing this.
I've installed Centos 5.9 and Trixbox both on VMWares.
I've read... (1 Reply)
Hello all!
I am running Nagios 3.3.1 and I am trying to get it to monitor the ports on my Cisco Catalyst 3524-XL-PWR Managed Switch. But I keep getting "(Return code of 127 is out of bounds - plugin may be missing)" I have installed and compiled the plugins and the snmp services on the Ubuntu... (0 Replies)
I am having trouble working with SNMP module with perl. I am trying to get SNMP version of target system. I use following code to get it however it resturns error as "Argument "v6.0.1" isn't numeric in numeric lt (<) at ./chk_env_upd.pl line 447."
Get load table
my $resultat =... (1 Reply)
Hello,
I am new to the mac world, and would like to automate my login to cisco devices (routers, switches etc...), i am in a need of writing a script that i may just click on an icon on the desktop and it will open terminal and run a few command.
as follow:
telnet to an ip address
type... (2 Replies)
I use configure cisco devices daily using hyper terminal in windows via the serial port. Is there an alternative solution in unix that I can connect to a cisco console port via serial port? What application do I need?? (1 Reply)
SNMP Vulnerability:
In a few minutes wire services and other news sources will begin
breaking a story about widespread vulnerabilities in SNMP (Simple
Network Management Protocol). Exploits of the vulnerability cause
systems to fail or to be taken over. The vulnerability can be found in... (1 Reply)
Info::Layer2::Aironet(3pm) User Contributed Perl Documentation Info::Layer2::Aironet(3pm)NAME
SNMP::Info::Layer2::Aironet - SNMP Interface to Cisco Aironet devices running IOS.
AUTHOR
Max Baker
SYNOPSIS
# Let SNMP::Info determine the correct subclass for you.
my $aironet = new SNMP::Info(
AutoSpecify => 1,
Debug => 1,
DestHost => 'myswitch',
Community => 'public',
Version => 2
)
or die "Can't connect to DestHost.
";
my $class = $aironet->class();
print "SNMP::Info determined this device to fall under subclass : $class
";
DESCRIPTION
Provides interface to SNMP Data available on newer Aironet devices running Cisco IOS.
Note there are two classes for Aironet devices :
SNMP::Info::Layer3::Aironet
This class is for devices running Aironet software (older)
SNMP::Info::Layer2::Aironet
This class is for devices running Cisco IOS software (newer)
For speed or debugging purposes you can call the subclass directly, but not after determining a more specific class using the method above.
my $aironet = new SNMP::Info::Layer2::Aironet(...);
Inherited Classes
SNMP::Info::Layer2
SNMP::Info::Entity
SNMP::Info::EtherLike
SNMP::Info::CiscoStats
SNMP::Info::CiscoConfig
Required MIBs
Inherited Classes
MIBs required by the inherited classes listed above.
GLOBALS
These are methods that return scalar value from SNMP
$aironet->discription()
Adds info from method e_descr() from SNMP::Info::Entity
$aironet->vendor()
Returns 'cisco'
$aironet->description()
System description
Globals imported from SNMP::Info::Layer2
See documentation in "GLOBALS" in SNMP::Info::Layer2 for details.
Globals imported from SNMP::Info::Entity
See documentation in "GLOBALS" in SNMP::Info::Entity for details.
Globals imported from SNMP::Info::EtherLike
See documentation in "GLOBALS" in SNMP::Info::EtherLike for details.
TABLE METHODS
$aironet->cd11_port()
Returns radio interfaces.
$aironet->cd11_mac()
Returns radio interface MAC addresses.
$aironet->cd11_ssid()
Returns radio interface ssid.
$aironet->dot11_cur_tx_pwr_mw()
Current transmit power, in milliwatts, of the radio interface.
Overrides
$aironet->interfaces()
Uses the i_description() field.
$aironet->i_mac()
MAC address of the interface. Note this is just the MAC of the port, not anything connected to it.
$aironet->i_duplex()
Crosses information from SNMP::Info::EtherLike to get duplex info for interfaces.
$aironet->bp_index()
Returns reference to hash of bridge port table entries map back to interface identifier (iid)
$aironet->fw_mac()
Returns reference to hash of forwarding table MAC Addresses
$aironet->fw_port()
Returns reference to hash of forwarding table entries port interface identifier (iid)
$aironet->i_vlan()
Returns a mapping between "ifIndex" and the PVID or default VLAN.
$aironet->v_index()
Returns VLAN IDs
$aironet->v_name()
Returns VLAN names
$aironet->i_ssidlist()
Returns a list of SSIDs associated with interfaces. This function is "MBSSID" aware, so when using "MBSSID" can map SSIDs to the sub-
interface to which they belong.
$aironet->i_ssidbcast()
With the same keys as i_ssidlist, returns whether the given SSID is being broadcast.
Table Methods imported from SNMP::Info::Layer2
See documentation in "TABLE METHODS" in SNMP::Info::Layer2 for details.
Table Methods imported from SNMP::Info::Entity
See documentation in "TABLE METHODS" in SNMP::Info::Entity for details.
Table Methods imported from SNMP::Info::EtherLike
See documentation in "TABLE METHODS" in SNMP::Info::EtherLike for details.
Data Munging Callback Subroutines
$aironet->munge_cd11_txrate()
Converts units of half a megabit to human readable string.
perl v5.12.4 2011-09-28 Info::Layer2::Aironet(3pm)