L3 On Sep 7, 2016 8:10 PM, "Ken Hohhof" <af...@kwisp.com> wrote:
> Rebooting Cisco switches that lock up? Not trying to shill for Cisco, but > that doesn’t sound right. I don’t think in 20 years I’ve ever had to do > that, and I’ve had 2950 and 2960 switches in my network for a long time, > plus a few 3550’s. In fact, I can’t think of having to reboot any brand of > switch. I’ve had a couple up and die, usually power supply, but not lock > up and require a reboot. > > > > Are these fancy L3 switches, or just managed L2 switches? > > > > > > *From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of *Jaime Solorza > *Sent:* Wednesday, September 7, 2016 8:27 PM > *To:* Animal Farm <af@afmug.com> > *Subject:* Re: [AFMUG] Ubnt password hack with public IP radios > > > > I have told this WISP owner that he bought a business with lots of > issues. Lots of over complicated VPNs and public IPs on devices that > don't need it. It was designed by a Cisco trained consultant who had total > control over it for many years... Troubleshooting is a mess because of all > the damn rules... Lots of time is spent on rebooting Cisco switches that > lock up... They finally hired a Cisco savvy guy and fired the > consultant.... He is learning the Ubnt and Cambium systems... I sent him > the link Josh provided and got to work... Once he has grip on it, I am sure > he will eliminate public IPs on most of the radios. > > > > On Sep 7, 2016 7:08 PM, "That One Guy /sarcasm" <thatoneguyst...@gmail.com> > wrote: > > actually at the time of the last fiasco, the current firmware had been > vulnerable > > > > but how anybody is still getting hit by this is amazing to me > > > > On Wed, Sep 7, 2016 at 7:56 PM, Mathew Howard <mhoward...@gmail.com> > wrote: > > They weren't necessarily backhauls... but a few firewall rules at the edge > of the network and/or not running ancient firmware would have prevented > it... > > > > On Wed, Sep 7, 2016 at 6:57 PM, Chris Wright <ch...@velociter.net> wrote: > > This sums up the kind of person who programs a public IP into their > backhauls. > > http://25.media.tumblr.com/tumblr_m8d8vusNcL1qa9jn1o2_500.gif > > Chris Wright > Network Administrator > Velociter Wireless > 209-838-1221 x115 > > > > -----Original Message----- > From: Af [mailto:af-boun...@afmug.com] On Behalf Of Josh Reynolds > Sent: Wednesday, September 07, 2016 4:47 PM > To: af@afmug.com > Subject: Re: [AFMUG] Ubnt password hack with public IP radios > > Yep, it was widely talked about on the forum, the Brothers WISP podcast, > and through direct emails from UBNT to customers who have basically ever > sent them a working email address for anything.... > amongst other places. > > https://community.ubnt.com/t5/airMAX-Updates-Blog/Important- > Security-Notice-and-airOS-5-6-5-Release/ba-p/1565949 > > > On Wed, Sep 7, 2016 at 6:42 PM, Jaime Solorza <losguyswirel...@gmail.com> > wrote: > > Seems like a local WISP got radios hacked and passwords changed. > Someone > > told him there is a virus that sniffs Ubnt radios with public IPs and > > changes password to Moth3rfuck3r or something like that. Supposedly a > > telnet script can remedy this matter.... Anyone know about this? Tak > > > > > > > > > -- > > If you only see yourself as part of the team but you don't see your team > as part of yourself you have already failed as part of the team. > > >