Cisco 3020 - Cisco Catalyst Blade Switch Manual de introducción - Página 27

Navegue en línea o descargue pdf Manual de introducción para Interruptor Cisco 3020 - Cisco Catalyst Blade Switch. Cisco 3020 - Cisco Catalyst Blade Switch 37 páginas. Release notes for the cisco catalyst blade switch 3020 for hp, ciscoã‚â iosã‚â releaseã‚â 12.2(44)se
También para Cisco 3020 - Cisco Catalyst Blade Switch: Manual de introducción (31 páginas), Quickspecs (12 páginas), Nota de publicación (41 páginas), Nota de publicación (27 páginas), Nota de publicación (23 páginas), Nota de publicación (21 páginas), Manual de instalación (21 páginas)

Cisco 3020 - Cisco Catalyst Blade Switch Manual de introducción

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release
them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a
vulnerability in a Cisco product, contact PSIRT:
• For Emergencies only — [email protected]
An emergency is either a condition in which a system is under active attack or a condition for
which a severe and urgent security vulnerability should be reported. All other conditions are
considered nonemergencies.
• For Nonemergencies — [email protected]
In an emergency, you can also reach PSIRT by telephone:
• 1 877 228-7302
• 1 408 525-6532
We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example,
Tip
GnuPG) to encrypt any sensitive information that you send to Cisco. PSIRT can work with
information that has been encrypted with PGP versions 2.x through 9.x.
Never use a revoked or an expired encryption key. The correct public key to use in your
correspondence with PSIRT is the one linked in the Contact Summary section of the Security
Vulnerability Policy page at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
The link on this page has the current PGP key ID in use.
If you do not have or use PGP, contact PSIRT at the aforementioned e-mail addresses or phone
numbers before sending any sensitive material to find other means of encrypting the data.
27