Cisco 1700 series Panduan Konfigurasi - Halaman 20

Jelajahi secara online atau unduh pdf Panduan Konfigurasi untuk Titik Akses Nirkabel Cisco 1700 series. Cisco 1700 series 25 halaman. Secure firewall management center
Juga untuk Cisco 1700 series: Panduan Informasi Kepatuhan Peraturan dan Keselamatan (45 halaman), Manual (15 halaman), Catatan Aplikasi (41 halaman), Pemecahan Masalah Perangkat Keras (12 halaman), Panduan Ikhtisar (13 halaman), Mengkonfigurasi (34 halaman), Manual (5 halaman), Panduan Memulai Cepat (6 halaman), Panduan Pemasangan Perangkat Keras (46 halaman)

Cisco 1700 series Panduan Konfigurasi

Documentation Feedback

Documentation Feedback
You can send comments about technical documentation to [email protected].
You can submit comments by using the response card (if present) behind the front cover of your
document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.

Cisco Product Security Overview

Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you can perform these tasks:
A current list of security advisories and notices for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they are updated in real time, you can access a Product
Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release them,
and we strive to correct all vulnerabilities quickly. If you think that you might have identified a
vulnerability in a Cisco product, contact PSIRT:
We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive
Tip
information that you send to Cisco. PSIRT can work from encrypted information that is compatible with
PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence
with PSIRT is the one that has the most recent creation date in this public key server list:
http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com&op=index&exact=on
Documentation Feedback
20
Report security vulnerabilities in Cisco products.
Obtain assistance with security incidents that involve Cisco products.
Register to receive security information from Cisco.
Emergencies —
Nonemergencies —
78-11422-03