5KI5G0,交换机S5560X-EI R6530P02是否涉及以下漏洞,如涉及如何解决
问题描述:
交换机S5560X-EI R6530P02 是否涉及以下漏洞:
CVE-
如果涉及,如何解决?
组网及组网描述:
不涉及
5小时前提问
CVE-
3.1.CVE-
配置非RC4的算法
[H3C-ssl-server-policy-fxm]ciphersuite ?
dhe_rsa_aes_128_cbc_sha Cipher suite that uses DHE RSA, 128-bit AES_CBC, and SHA
dhe_rsa_aes_256_cbc_sha Cipher suite that uses DHE RSA, 256-bit AES_CBC, and SHA
exp_rsa_des_cbc_sha Export cipher suite that uses RSA, DES_CBC, and SHA
exp_rsa_rc2_md5 Export cipher suite that uses RSA, RC2, and MD5
exp_rsa_rc4_md5 Export cipher suite that uses RSA, RC4, and MD5
rsa_3des_ede_cbc_sha Cipher suite that uses RSA, 3DES_EDE_CBC, and SHA
rsa_aes_128_cbc_sha Cipher suite that uses RSA, 128-bit AES_CBC, and SHA
rsa_aes_256_cbc_sha Cipher suite that uses RSA, 256-bit AES_CBC, and SHA
rsa_des_cbc_sha Cipher suite that uses RSA, DES_CBC, and SHA
rsa_rc4_128_md5 Cipher suite that uses RSA, 128-bit RC4, and MD5
rsa_rc4_128_sha Cipher suite that uses RSA, 128-bit RC4, and SHA
重启https服务。
undo ip https enable
ip https enable
5. SSL/TLS 受诫礼(BAR-MITZVAH)攻击漏洞(CVE-
禁用掉相关加密算法就可以了,可以参考漏洞1和知了案例:
某局点 S5560-EI/ S6800 CVE
5小时前回答暂无
你正在,交换机S5560X-EI R6530P02是否涉及以下漏洞,如涉及如何解决