Hello,
IMHO there is mess with docs/terms. FEC 128 multihoming as described has
nothing to do with ldp. It's bgp signaling and autodiscovery.
Krasi
On 8 September 2013 22:37, Darren O'Connor wrote:
>
>
>
> Hi list.
>
> I'm going over the VPLS multihoming options on Juniper's web site. I'm not
On 9/9/2013 12:16 PM, Harri Makela wrote:
> Hi There
>
> I got following report from after the vulneraboility scanning. Now first we
> don`t use IPv6 and secondly how we can check on Juniper that versio is SSH 4?
>
>
> Synopsis: The remote SSH service is prone to an X11 session
> hijacking\nvulne
Thank you very much for an update Tim. Much appreciated.
From: Tim Eberhard
To: Harri Makela
Cc: "juniper-nsp@puck.nether.net"
Sent: Monday, 9 September 2013, 17:45
Subject: Re: [j-nsp] SSH version 4 vulnerability on JUNOS
I've checked in with Juniper
I've checked in with Juniper CERT a couple of times after SSH
vulnerabilities get made public and given the fact they run such older ssh
binaries.
The answer i've received every time is they run a modified version of
OpenSSH 4.4, and disallow unsigned, third party or modified binaries to run
under
Hi There
I got following report from after the vulneraboility scanning. Now first we
don`t use IPv6 and secondly how we can check on Juniper that versio is SSH 4?
Synopsis: The remote SSH service is prone to an X11 session
hijacking\nvulnerability.
Description: According to its banner, the v
5 matches
Mail list logo