I understand the two alternatives given:
1. upgrade the IOS
2. Apply the ACL
However, how does one prove the vulneribility is then being defeated? It seems we need more information on just how this vulneribility is exploited.
Example of reasoning..the ACL allows a number of protocols riding...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.