- #CISCO IOS XE COMMAND INSTALL#
- #CISCO IOS XE COMMAND CODE#
- #CISCO IOS XE COMMAND FREE#
- #CISCO IOS XE COMMAND MAC#
Customers may only install and expect support for software versions and feature sets for which they have purchased a license.
#CISCO IOS XE COMMAND FREE#
The following example shows the output of the command for a device that is running Cisco IOS XE Software Release 16.2.1 and has an installed image name of CAT3K_CAA-UNIVERSALK9-M: ios-xe-device# show versionĬisco IOS Software, Catalyst 元 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version Denali 16.2.1, RELEASE SOFTWARE (fc1)Ĭopyright (c) 1986-2016 by Cisco Systems, Inc.įor information about the naming and numbering conventions for Cisco IOS XE Software releases, see the Cisco IOS and NX-OS Software Reference Guide.Ĭisco has released free software updates that address the vulnerability described in this advisory. If the device is running Cisco IOS XE Software, the system banner displays Cisco IOS Software, Cisco IOS XE Software, or similar text. To determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. The presence of either command in the device's configuration indicates that the HTTP Server feature is enabled.ĭetermining the Cisco IOS XE Software Release The following example shows the output of the show running-config | include ip http server|secure-server command for a router that has the HTTP Server feature enabled: Router# show running-config | include ip http server|secure-server If either command is present and configured, the HTTP Server feature is enabled for the device. To determine whether the HTTP Server feature is enabled for a device, administrators can log in to the device and use the show running-config | include ip http server|secure-server command in the CLI to check for the presence of the ip http server command or the ip http secure-server command in the global configuration. The default state of the HTTP Server feature is version dependent.įor information about which Cisco IOS XE Software releases are vulnerable, see the Fixed Software section of this advisory.
#CISCO IOS XE COMMAND CODE#
(MEG) ID Code (UMC) (maximum: 12 characters).This vulnerability affects Cisco devices that are running an affected release of Cisco IOS XE Software with the HTTP Server feature enabled. The domain name and short MA nameĬarrier Code (ICC) (maximum: 6 characters) and unique maintenance entity group Short-name identifier for the MA service. Specifies the maintenance association (MA) within the domain. Specifies a DOWN service direction with no VLAN associations To disable cross-checking, use theĮthernet cfm mep crosscheck disable command.Ĭisco Prestandard Connectivity Fault Management Draft 1 (CFM D1)Įthernet cfm mep crosscheck Through continuity check messages (CCMs), use theĮthernet cfm mep crosscheck command in privileged EXEC mode or global configuration mode. To enable cross-checking between the list of configured remote maintenance endpoints (MEPs) of a domain and MEPs learned
ethernet oam link-monitor symbol-period.ethernet oam link-monitor high-threshold action.
#CISCO IOS XE COMMAND MAC#