Home > Cisco > Network Hardware > Cisco Prime Nerk 43 User Guide

Cisco Prime Nerk 43 User Guide

Here you can view all the pages of manual Cisco Prime Nerk 43 User Guide. The Cisco manuals for Network Hardware are available online for free. You can easily download all the documents as PDF.

Page 201

  
9-53
Cisco Prime Network 4.3.2 User Guide
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Cisco Security Advisories 
(PSIRT)AAA Command Authorization By-pass - 68840
ARP Table Overwrite - 13600
Access Point Memory Exhaustion from ARP Attacks - 68715
Access Point Web-browser Interface - 70567
Auth Proxy Buffer Overflow - 66269
Authentication Proxy Vulnerability - 110478
BGP Attribute Corruption - 10935
BGP Logging - 63845...

Page 202

  
9-54
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Cisco Security Advisories 
(PSIRT) (contd.)HTTP - 13627
HTTP Auth - 13626
HTTP Command Injection - 68322
HTTP GET Vulnerability - 44162
HTTP Server Query - 13628
Hard-Coded SNMP Community Names in Cisco Industrial 
Ethernet 3000 Series Switches Vulnerability- 111895
IKE Resource Exhaustion Vulnerability - 110559
IKE...

Page 203

  
9-55
Cisco Prime Network 4.3.2 User Guide
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Cisco Security Advisories 
(PSIRT) (contd.)IOS Software Memory Leak in SIP Inspection Vulnerability - 
20120328
IOS Software Multicast Source Discovery Protocol 
Vulnerability - 20120328
IOS Software NAT DoS Vulnerability - 20120926
IOS Software NAT For SIP DoS Vulnerability - 20120926
IOS Software NAT H.323 Vulnerability - 112253...

Page 204

  
9-56
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Cisco Security Advisories 
(PSIRT) (contd.)Multiple Features IP Sockets Vulnerability - 109333
Multiple Multicast Vulnerabilities - 107550
Multiple SIP DoS Vulnerabilities - 107617
Multiple SSH Vulnerabilities - 8118
Multiprotocol Label Switching Packet Vulnerability- 111458
NAM (Network Analysis Module) Vulnerability -...

Page 205

  
9-57
Cisco Prime Network 4.3.2 User Guide
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Cisco Security Advisories 
(PSIRT) (contd.)SSH Malformed Packet - 29581
SSH TACACS+ Authentication - 64439
SSL - 91888
SSL Packet Processing Vulnerability - 107631
SSL VPN Vulnerability - 112029
Secure Copy Authorization Bypass Vulnerability - 97261
Secure Copy Privilege Escalation Vulnerability - 109323
Secure Shell Denial of...

Page 206

  
9-58
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Compliance PoliciesBPDU Filter Disabled on Access Ports
BPDU-Guard Disabled on Access Ports
CDP Enabled on Access Ports
Channel Port in Auto Mode
Loop Guard and Port Fast Enabled on Ports
Non-channel Port in Desirable Mode
Non-trunk Ports in Desirable Mode
Port Fast Enabled on Trunk Port
Port is in Error Disabled State...

Page 207

  
9-59
Cisco Prime Network 4.3.2 User Guide
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Choosing the Devices for the Compliance Audit
After you create a policy profile, you must choose the devices or device groups on which the compliance 
audit must be performed. After you choose the devices or device groups and schedule an audit, a job with 
the name of the policy profile is created. This name defines the job, and can...

Page 208

  
9-60
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
By Devices—Choose this option to select the device(s) that you want to audit.
By Groups—Choose this option to select the device group(s) that you want to audit. There must be 
at least one device added to a device group for the group to be audited. If a device is added to 
multiple device groups that are selected for...

Page 209

  
9-61
Cisco Prime Network 4.3.2 User Guide
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
Reschedule—Using this option, you can reschedule a job that has been scheduled for a different 
time. Choose a job, and click Reschedule. The Compliance Audit Job Rescheduler window opens. 
Set your preferences. The following options are available against Choose Configuration option:
–Use Latest Archived Configuration—If you choose...

Page 210

  
9-62
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 9      Manage Device Configurations and Software Images
  Making Sure Devices Conform to Policies Using Compliance Audit
To export and view the job results in XLS format from Change and Configuration:
Step 1Log in to the Change and Configuration Management client.
Step 2Click the All Jobs tab.
Step 3Select a row that has a Job type that is mentioned above. Ensure that the Job Status is in Scheduled or 
Completed and the Lastrun Status is...
Start reading Cisco Prime Nerk 43 User Guide

Related Manuals for Cisco Prime Nerk 43 User Guide

All Cisco manuals