Monday, 30 March 2015

Cisco Wipes Its Memory From Susceptible-to-Row Hammer List

Make sure you use only original spares


Cisco has worked all over the data center switching products that may have been exposed to Riga Hammer vulnerability and decided that there was nothing on the label on the front of the bridge that is the subject of bug.Back earlier this month, Google happily announced to the world that the writing and rewriting of DRAM capacitors might force errors.

Hammering a row, the report concludes, could damage the data in an adjacent row - which, if exploited properly could lead to privilege level of the nucleus to the normal user space programs.When first announced that it was research on the topic, Borg said that only a "limited number of products" has allowed non-privileged users to load and run the tracks. These include a handful of Nexus, Web security and security products running IOS email or various Software ASA.

Cisco now says: this question can not be used on devices that have control options ECC ECC DDRAM and accredited in their BIOS - which is the default products configuration.All Cisco UCS were deleted if they use Cisco DIMM, but if users have not installed Cisco DIMM, which could be vulnerable.

Thursday, 12 March 2015

350-080 Sample Question : 3

QUESTION 3:

Which two statements about SAN port channels configured on Cisco Nexus 5000 Series switches
are true? (Choose two.)

A.
The bring up protocol automatically detects and overrides any misconfiguration.
B. You can manually configure channel groups, or they can be automatically created.
C. Changes in configuration to the SAN port channel interface must also be made to all members
of the channel group.
D. The port channel protocol uses the exchange fabric parameters command to communicat
across peer ports in an ISL.
E. The port channel protocol ensures that a set of ports is eligible to be part of the same SAN port channel.

Answer: B,E