Cisco 3020 - Cisco Catalyst Blade Switch Manuale introduttivo - Pagina 27

Sfoglia online o scarica il pdf Manuale introduttivo per Interruttore Cisco 3020 - Cisco Catalyst Blade Switch. Cisco 3020 - Cisco Catalyst Blade Switch 37. Release notes for the cisco catalyst blade switch 3020 for hp, ciscoã‚â iosã‚â releaseã‚â 12.2(44)se
Anche per Cisco 3020 - Cisco Catalyst Blade Switch: Manuale introduttivo (31 pagine), Specifiche rapide (12 pagine), Nota di rilascio (41 pagine), Nota di rilascio (27 pagine), Nota di rilascio (23 pagine), Nota di rilascio (21 pagine), Manuale di installazione (21 pagine)

Cisco 3020 - Cisco Catalyst Blade Switch Manuale introduttivo

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release
them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a
vulnerability in a Cisco product, contact PSIRT:
• For Emergencies only — [email protected]
An emergency is either a condition in which a system is under active attack or a condition for
which a severe and urgent security vulnerability should be reported. All other conditions are
considered nonemergencies.
• For Nonemergencies — [email protected]
In an emergency, you can also reach PSIRT by telephone:
• 1 877 228-7302
• 1 408 525-6532
We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example,
Tip
GnuPG) to encrypt any sensitive information that you send to Cisco. PSIRT can work with
information that has been encrypted with PGP versions 2.x through 9.x.
Never use a revoked or an expired encryption key. The correct public key to use in your
correspondence with PSIRT is the one linked in the Contact Summary section of the Security
Vulnerability Policy page at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
The link on this page has the current PGP key ID in use.
If you do not have or use PGP, contact PSIRT at the aforementioned e-mail addresses or phone
numbers before sending any sensitive material to find other means of encrypting the data.
27