[c-nsp] ASR1000 - IOS-XE 3.16.3 - experience?
Satish Patel
satish.txt at gmail.com
Fri Aug 5 09:03:27 EDT 2016
You are right! We blocked everything using ACL on router but yep attacker can spoof packet.
I will proceed for upgrade soon.
--
Sent from my iPhone
> On Aug 5, 2016, at 2:48 AM, Antoine Monnier <mrantoinemonnier at gmail.com> wrote:
>
> Upgraded just a few days ago, but now apparently there is this this NTP bug that allows for a DoS apparently right in that version.
> http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge
>
>
>> On Thu, Jul 21, 2016 at 7:28 PM, Satish Patel <satish.txt at gmail.com> wrote:
>> You won't believe i have upgraded IOS to
>> asr1000rp2-adventerprisek9.03.16.03.S.155-3.S3-ext and just 1 hour ago
>> on ASR1006
>>
>> Just pushed to production. figure coross, so far everything looks good.
>>
>> On Thu, Jul 21, 2016 at 10:56 AM, Antoine Monnier
>> <mrantoinemonnier at gmail.com> wrote:
>> > Hi All,
>> >
>> > Is anyone running the 3.16 train on ASR1000? specifically 3.16.3 if
>> > possible.
>> > How is that going for you? No major issue?
>> >
>> > Thanks.
>> > _______________________________________________
>> > cisco-nsp mailing list cisco-nsp at puck.nether.net
>> > https://puck.nether.net/mailman/listinfo/cisco-nsp
>> > archive at http://puck.nether.net/pipermail/cisco-nsp/
>
More information about the cisco-nsp
mailing list