Cisco confirm me off-list that this is only a internal usage socket
which is not exposed.
An official info from them should come.
And before applying any iACL, check your netflow, you should not apply a
trivial iACL on your upstream, but you should be able to deny only
src=any, dst=yournetwork, pr
.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?search=6154
in contrary to the SMI (zero touch feature on tcp 4786) which is
registered since almost 10y:
https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?search=4786
Fred
Hi,
We have Cat 4500 series on SUP7L-E with IOS/XE 03.06.02.E/152(2).E2
which have TCP port 6154 listening on all interfaces.
Any idea what it could be ?
#show tcp brief all
TCB Local Address Foreign Address (state)
...
5A529430 0.0.0.0.6154<<
Hi Christian,
On 01.05.2017 15:20, Christian wrote:
> Hey,
>
> On 01/05/17 15:12, Lukas Tribus wrote:
>>> Seriously? I thought only Trident cards ended support in 5.3.X.
>>
>> IOS XR 6.x *DOES* support Typhoon, just not in the 64-bit flavor.
>
> yeah, based on dead QNX, not with Linux and LXC arc