JUNIPER NETWORKS 9.1R2 CTP View Software Tsarin Gudanarwa
Saki 9.1R2 Disamba 2020
Waɗannan bayanan bayanan sakin suna rakiyar Sakin 9.1R2 na CTP View Software System Management. Suna ƙunshi bayanan shigarwa kuma suna bayyana abubuwan haɓakawa ga software. Farashin CTP View Sakin software na 9.1R2 ya dace da Juniper Networks CTP jerin dandamali masu gudana CTPOS sigar 9.1R2 ko baya.
Kuna iya samun waɗannan bayanan bayanan saki akan Takardun Software na Juniper Networks CTP webshafi, wanda yake a https://www.juniper.net/documentation/product/en_US/ctpview
Fitowar Fitowa
An ƙara abubuwan haɓakawa ko haɓakawa zuwa CTP View Saukewa: 9.1R2.
- [PR 1364238] STIG hardening don CTP View Farashin 9.1R2.
- [PR 1563701] Kunna serial console ta tsohuwa lokacin da CTP View an shigar a kan uwar garken jiki na Centos 7.
NOTE: CTP View 9.1R2 yana gudana akan OS da aka sabunta (CentOS 7.5.1804) wanda ke ba da ingantaccen tsaro tare da ingantaccen juriya da ƙarfi.
Ba a samun goyan bayan fasalulluka masu zuwa a cikin CTP View Saukewa: 9.1R2.
- [PR 1409289] Abubuwan PBS da L2Agg ba su da tallafi. Za a sake dawo da waɗannan fasalulluka a cikin sakin gaba.
- [PR 1409293]. Za a sake dawo da waɗannan fasalulluka 1 a cikin sakin gaba.
Matsalolin da aka warware a cikin CTP View Saukewa: 9.1R2
An warware waɗannan batutuwan a cikin CTP View Saki 9.1R2:
- [PR 1468711] CTP View 9.1R2 yana buƙatar masu amfani don canza tsoho kalmar sirri na tsoffin asusun mai amfani.
Abubuwan da aka sani a cikin CTP View Saukewa: 9.1R2
Babu.
Da ake buƙata Shigar Files
Alhakin ku ne shigar da CentOS akan VM, kuma nau'in CentOS dole ne ya zama 7.5.1804 (http://vault.centos.org/7.5.1804/isos/x86_64/). Don bayani kan yadda ake ƙirƙirar injin kama-da-wane na CentOS 7, duba “Ƙirƙirar Injin Farfaɗo na CentOS 7” a shafi na 3. Sanya sabbin abubuwan da aka fitar na Centos ba su da tallafi dole ne ku yi amfani da Centos 7.5.1804. Idan kuna da tambayoyi ko buƙatar ƙarin taimako, tuntuɓi Cibiyar Taimakon Fasaha ta Juniper Networks (JTAC).
Masu bi file An tanadar don shigar da CTP View software:
File | Filesuna | Checksum |
Sabunta software da CentOS OS | CTPView-9.1R-2.0-1.el7.x86_64.rpm | 5e41840719d9535aef17ba275b5b6343 |
Yi amfani da waɗannan bayanan don tantance daidai file don amfani:
CTP View Server OS |
An shigar da CTP View Saki | File don haɓakawa | Sake kunna uwar garken yayin haɓakawa? |
CentOS 7.5 | NA | CTPView-9.1R-2.0-1.el7.x86_64.rpm | Ee |
Shawarar Kanfigareshan Tsari don Bayar da CTP View Sabar
Wadannan sune shawarwarin da aka ba da shawarar hardware don saita CTP View 9.1R2 uwar garken:
- CentOS 7.5.1804 (64-bit)
- 1 x processor (core 4)
- 4 GB RAM
- Adadin NICs - 2
- 80 GB Disk sarari
CTP View Manufar Shigarwa da Kulawa
Daga fitowar CTP View 9.0R1, Juniper Networks sun karɓi sabon tsari don shigarwa da kiyaye CTP View uwar garken. CTP View yanzu ana rarraba shi azaman samfurin "Aikace-aikace kawai", a cikin nau'i na kunshin RPM. Kuna iya shigar da kuma kula da OS (CentOS 7.5) bisa ga jagororin da aka bayyana a cikin “Saka CTP View 9.1R2" a shafi na 8. Tare da CTP View 7.3Rx da farkon sakewa, OS (CentOS 5.11) da CTP View An haɗa aikace-aikacen kuma an rarraba su azaman shigarwa guda ɗaya ISO, da duk sabuntawa (OS da CTP View aikace-aikace) suna samuwa ne kawai daga Juniper Networks. Wannan yana haifar da jinkirin samun CTP View sake sabuntawa don mahimman sabuntawar tsaro (ciki har da aikace-aikacen Linux OS da CTP View aikace-aikace).
Tare da wannan sabon samfurin, zaku iya sabunta aikace-aikacen CentOS guda ɗaya daga CTP View aikace-aikacen idan an ba da rahoton duk wani lahani na tsaro don aikace-aikacen Linux OS. Wannan yana ba da ƙarin sassaucin da kuke buƙata don tabbatar da tsaron dandamali na tushen Linux.
CTP View ya kunshi:
- Nau'in 1-Stock CentOS 7.5 RPMs
- Nau'in 2-Stock CentOS RPMs daga wasu nau'ikan CentOS
- Nau'in 3-CentOS RPMs da aka gyara
- Nau'in 4-CTP View aikace-aikace file
Inda, "Stock" RPMs sune fakitin da ke da alaƙa da takamaiman sakin CentOS kuma ana samun su akan Intanet. RPMs "An gyara" nau'ikan haja ne na RPMs waɗanda Juniper Networks ke gyara don buƙatun CTP View dandamali. Shigarwa na CentOS 7.5 ISO kawai ya ƙunshi abubuwan da ake buƙata na nau'in 1. CTP monolithic View RPM ya ƙunshi sauran abubuwan da suka rage na nau'ikan 2, 3, da 4, waɗanda za'a iya cirewa da shigar dasu.
Lokacin da Juniper Networks ke ba da CTP View tabbatarwa saki RPM, ya ƙunshi updated sassa na iri 2, 3, da 4. Har ila yau, ya ƙunshi dogara don tabbatar da cewa nau'in 1 sassa ma na zamani da kuma gargadi mai amfani idan wani daga cikinsu yana bukatar a updated.
Juniper Networks suna kiyaye jerin RPMs don CTP View cewa muna ba da shawarar ingantawa don tsaro da dalilai na aiki. Ana amfani da hanyoyi masu zuwa don tantance wane CTP View RPMs suna buƙatar sabuntawa:
- Retina/Nessus sc0ans na yau da kullun
- Sanarwa daga ƙungiyar Juniper's SIRT
- Rahotanni daga abokan ciniki
Lokacin da ake buƙatar ɗaukakawar RPM, Juniper Networks tana inganta sabon sigar ɓangaren don tabbatar da cewa yana aiki da kyau kafin ƙara shi zuwa lissafin RPM. Za a raba muku wannan jeri ta hanyar KB. Ko da yake CTP View wajabcin sabunta sabuntawa (kuma mai yiwuwa samar da) RPM na zamani kafin shigarwa, wannan jerin RPM yana taimaka muku sabunta CTP ɗin ku. View software tsakanin sakewa. Idan akwai RPM da aka ƙara zuwa jerin RPM, zaku iya ɗaukar mataki nan take. Juniper Networks yana ba da kayan aikin nau'in 3 ta hanyar sakewa kawai.
Don nau'in 1 da 2, RPMs yakamata su kasance a cikin 'yanci akan abubuwan web, da Juniper Networks yana ba da sampda links. Idan kun gano cewa RPM yana buƙatar sabuntawar tsaro kuma baya cikin jerin RPM, kuna iya sanar da mu don mu gwada shi kuma mu ƙara shi cikin jerin.
HANKALI: Babban sabuntawar RPM ta amfani da “yum update” haramun ne. CTP View 9.x, kodayake galibi ya dogara da CentOS 7.5, kuma an yi shi da RPMs daga sauran rabawa. Yin sabuntawa zuwa sabon sigar CentOS 7 na iya haifar da CTP View don zama marasa aiki, kuma ana iya buƙatar sake shigarwa.
Idan kun sabunta RPMs waɗanda basa cikin jerin KB RPM, CTP View maiyuwa bazaiyi aiki yadda yakamata ba.
Ƙirƙirar Injin Virtual Centos 7
Kafin ka fara:
- Tabbatar cewa an shigar da abokin ciniki vSphere akan wurin aikin ku.
NOTE: A cikin vSphere, akwai hanyoyi da yawa don yin wani aiki na musamman. Mai zuwa example ya kwatanta daya irin wannan hanya. Kuna iya amfani da hanyar da ta dace da tura cibiyar sadarwar ku yadda ya kamata.
Don ƙirƙirar sabon misalin CentOS 7 Sting's VM na CTP View uwar garken akan uwar garken Essig:
- Kwafi CentOS 7 ISO file (centOS-7-x86_64-DVD-1804.iso) zuwa ma'ajiyar bayanai ta Essig. Ana iya sauke CentOS 7 ISO daga http://vault.centos.org/7.5.1804/isos/x86_64/.
- Fara abokin ciniki na vSphere kuma shigar da adireshin IP na uwar garken ESXi da takaddun shaidar shiga ku.
- Fara maye don ƙirƙirar sabon injin kama-da-wane. Zaɓi File > Sabo > Injin Farko.
- Zaɓi tsarin daidaitawa azaman Na Musamman kuma danna Gaba.
- Shigar da suna don VM. Domin misaliampku, CTPView_9.1R2.
- Zaɓi wurin ajiyar bayanai (tare da aƙalla sarari kyauta 80 GB) kuma danna Next.
- Zaɓi Guest OS azaman Linux da sigar azaman sauran Linux (64-bit), sannan danna Next.
- Zaɓi adadin NICs azaman 2 da nau'in adaftar kamar E1000, sannan danna Next.
- Zaɓi girman faifai na kama-da-wane kamar 80 GB kuma zaɓi Ƙaƙƙarfan Samar da Lazy Zeroed.
- Zaɓi Shirya saitunan injin kama-da-wane kafin kammala rajistan akwatin kuma danna Ci gaba.
- Danna Hardware shafin kuma zaɓi girman ƙwaƙwalwar ajiya azaman 4 GB.
- A cikin Hardware shafin, zaɓi CPU. Sannan, zaɓi adadin kwasfa masu kama-da-wane azaman 2 da adadin cores kowane soket azaman 1 (zaka iya zaɓar har zuwa 4 cores).
- A cikin Hardware shafin, zaɓi CD/DVD. Sannan, zaɓi nau'in na'urar azaman Datastore ISO File kuma bincika zuwa CentOS 7 ISO file. Zaɓi Haɗa a wuta akan akwatin rajistan shiga ƙarƙashin Matsayin Na'ura.
- Danna Gama.
- Zaɓi injin kama-da-wane da kuka ƙirƙira a cikin ɓangaren hagu na vSphere> Inventory.
- A cikin Farawa shafin, zaɓi Ƙarfi akan injin kama-da-wane.
- Canja zuwa shafin Console kuma danna cikin kwailin tasha.
- Zaɓi zaɓin Shigar CentOS Linux 7 tare da maɓallin Up-Arrow kuma danna Shigar.
- Danna maɓallin Shigar don fara aikin shigarwa.
- Zaɓi harshen da yankin lokacin ƙasar da kuke so (idan ya cancanta) sannan danna Ci gaba.
- Danna zabin SOFTWARE SELECTION.
- A cikin Basic Environment sashe, zaɓi Basic Web Maɓallin rediyon uwar garken. A cikin Ƙara-kan don Zaɓin Muhalli, zaɓi Tallafin PHP da Perl don Web duba akwatuna kuma danna Anyi.
- Danna INSTALLATION DESTINATION kuma tabbatar da cewa an zaɓi VMware Virtual disk (80 GB).
- A cikin Sauran Zaɓuɓɓukan Ma'ajiya, zaɓi Zan saita maɓallin zaɓin rarrabawa.
- Danna Anyi. Shafin PARTITIONING MANAL ya bayyana.
- Danna maɓallin +. Akwatin maganganu na ƙara SABON DUMI DUMI ya bayyana. Amfanin Kasuwancin Juniper kawai
- Don ƙirƙirar bangare don /boot, shigar da /boot a cikin filin Dutsen Point kuma shigar da 1014 MB a cikin filin da ake so. Sa'an nan, danna Add mount point.
- Zaɓi Standard Partition daga lissafin Nau'in Na'ura kuma zaɓi ext3 daga cikin File Jerin tsarin. Shigar da LABEL=/ taya a cikin Label filin sannan danna Sabunta Saituna.
- Hakazalika, maimaita matakai na 26 zuwa 28 don ƙirƙirar ɓangarori don wuraren tsaunuka masu zuwa tare da saitunan da aka bayar.
Table 1: Dutsen Points da Saitunansu
Dutsen Point Ƙarfin da ake so Nau'in Na'ura File Tsari Lakabi /tmp 9.5 GB Daidaitaccen bangare ext3 LABEL=/tmp / 8 GB Daidaitaccen bangare ext3 LABEL=/ /var/log 3.8 GB Daidaitaccen bangare ext3 LABEL=/var/log /var 3.8 GB Daidaitaccen bangare ext3 LABEL=/var /var/log/audit 1.9 GB Daidaitaccen bangare ext3 LABEL=/var/log/a /gida 1.9 GB Daidaitaccen bangare ext3 LABEL=/gida /var/www 9.4 GB Daidaitaccen bangare ext3 LABEL=/var/www - Danna Anyi sau biyu sannan danna Karɓa Canje-canje.
- Danna NETWORK & SUNAN MAI GIRMA.
- Zaɓi zaɓin Ethernet (misaliample, Ethernet (ens32)), shigar da sunan mai masauki (don misaliampku, ctp view) a cikin filin sunan Mai watsa shiri, sannan danna Aiwatar.
- Danna Sanya. Sa'an nan, danna IPv4 Saituna tab.
- Zaɓi Manual daga lissafin Hanyar kuma danna Ƙara.
- Shigar da ƙimar adireshi, Netmask, da filayen Ƙofar, sannan danna Ajiye.
- Danna maɓallin juyawa a kusurwar dama na sama don kawo saitunan Ethernet sama da aiki, sannan danna Anyi.
- Danna SIYASAR TSARO.
- Zaɓi DISA STIG don zaɓin uwar garken CentOS Linux 7 kuma danna Zaɓi Profile. Sannan, danna Anyi.
- Danna Fara Shigarwa. Shafin USER SETTINGS ya bayyana.
- Danna USER CREATION, shigar da sunan mai amfani a matsayin "admin", kuma shigar da kalmar sirri. Don Allah kar a shigar da sunan mai amfani a matsayin "junipers" a nan.
- Zaɓi akwatin Yi wannan mai gudanar da mai amfani kuma danna Anyi.
- A cikin shafin USER SETTINGS, danna ROOT PASSWORD, shigar da kalmar wucewa kamar “CTPView-2-2” ko kowane kalmar sirri kuma danna Anyi.
- Bayan da shigarwa tsari da aka kammala, danna Sake yi.
Shigar da CTP View 9.1R2
CTP View za a iya shigar a kan sabuwar ƙirƙira CentOS 7.5[1804] VM ko CentOS 7.5[1804] sabar karfe mara amfani.
Matakan sune kamar haka:
- Ƙirƙiri sabon misali na CentOS 7 Virtual Machine (VM) kamar yadda aka ambata a cikin "Ƙirƙirar Injin Virtual Centos 7" a shafi na 3.
- Kwafi CTP View RPM (CTPView-9.1R-2.0-1.el7.x86_64.rpm) to /tamp directory na sabon ƙirƙira CentOS 7.5[1804] VM ko CentOS 7.5[1804] ƙaramin ƙarfe.
- Shiga azaman mai amfani "admin" wanda kuka ƙirƙira a lokacin ƙirƙirar Centos 7 VM. Shigar da CTP View RPM Idan installing a saman
- Centos 7 ko 9.1R1 - yi amfani da umarni "sudor rpm -Urho CTPView-9.1R-2.0-1.el7.x86_64.rpm”
- 9.0R1 - yi amfani da umarni "sudor rpm -Usha -force CTPView-9.1R-2.0-1.el7.x86_64.rpm”.
- Canja kalmomin shiga don duk tsoffin asusun mai amfani (junipers, tushen, Juniper, ctpview_pgsql) a ƙarshen lokacin haɓakawa (Dubi sashe Canja kalmar sirri na asusun mai amfani na tsoho).
Canja kalmar sirri ta tsoffin asusun mai amfani
Wannan matakin yana aiki ne kawai lokacin da kuka shigar da CTPView 9.1R2 RPM akan sabar ku. Canja kalmomin shiga don duk tsoffin asusun mai amfani kamar yadda aka nuna a ƙasa:
CTP View an shigar akan tsarin ku. Yanzu, Kuna buƙatar saita kalmomin shiga don duk tsoffin asusun mai amfani.
DON ALLAH KA TUNANI DA WADANNAN KASUWANCI!!!
Maido da kalmar wucewa ba tsari bane mai sauƙi:
- Yana shafar sabis.
- Yana buƙatar samun damar na'ura wasan bidiyo zuwa CTP View
- Yana buƙatar sake kunna CTP View (Wataƙila ko da tsarin sake ƙarfafawa)
Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa
@ {} # % ~ [ ] = & , - _ !
Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da
1 ƙananan haruffa 1, babban baƙaƙe 1, lambobi 1 da wasu haruffa XNUMX.
Lura : Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2"
Shigar da Sabuwar Kalmar wucewa ta UNIX don tushen
Sake rubuta Sabuwar kalmar wucewa ta UNIX don tushen
Canza kalmar sirri don tushen mai amfani.
passwd: duk alamun tabbatarwa an sabunta su cikin nasara.
Wannan zai zama Mai Gudanar da Tsari
Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa
@ {} # % ~ [ ] = & , - _ !
Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da\ 1 ƙarami, babban baƙaƙe 1, lambobi 1 da wasu haruffa 1.
Lura: Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2"
Shigar da Sabuwar Kalmar wucewa ta UNIX don juniper_sa
Sake rubuta Sabuwar kalmar wucewa ta UNIX don juniper_sa
Canza kalmar sirri don junipers mai amfani. passwd: duk alamun tabbatarwa an sabunta su cikin nasara. Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa
@ {} # % ~ [ ] = & , - _ !
Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da
1 ƙananan haruffa 1, babban baƙaƙe 1, lambobi 1 da wasu haruffa XNUMX.
Lura: Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2" Canza kalmar sirri don mai amfani Juniper
Shigar da sabon kalmar sirri:
Sake shigar da sabuwar kalmar sirri:
Yanzu za a tambaye ku kalmar sirrin asusun Administrator PostgreSQL:
Kalmar wucewa don matsayi mai amfani:
==== Anyi nasarar sabunta CTP View kalmar sirri don tsohon mai amfani Juniper. ====
Lura: An sanya Juniper mai amfani ga tsohuwar rukunin mai amfani TempGroup kuma an ba shi tsoffin kaddarorin mai amfani. Review Ƙimar ta amfani da CTPView Cibiyar Gudanarwa da yin kowane gyare-gyare masu dacewa.
Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa
@ {} # % ~ [ ] = & , - _ !
Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da
1 ƙananan haruffa 1, babban baƙaƙe 1, lambobi 1 da wasu haruffa XNUMX.
Lura : Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2" Canza kalmar sirri don mai amfani ctpview_pgsql
Shigar da sabon kalmar sirri:
Sake shigar da sabuwar kalmar sirri:
Yanzu za a tambaye ku kalmar sirrin asusun Administrator PostgreSQL:
Kalmar wucewa don matsayi mai amfani:
Lura - Hakanan zaka iya sake saita kalmar wucewa ta duk tsoffin asusun mai amfani daga CTP View menu -> Manyan Ayyuka
-> Sake saitin asusu don tsoho mai kula da tsarin
Ana cire CTPView 9.1R2
CTP View Ana iya cire 9.1R2 daga Centos 7 ta aiwatar da matakai masu zuwa:
- Bincika idan an ba da izinin shiga tushen. Idan ba haka ba, kunna tushen shiga daga menu -> Tsaro Profile(1) -> Gyara Matsayin Tsaro (5) -> Sanya matakin OS zuwa 'sosai-ƙasa'(3).
- Shiga ta mai amfani da "tushen" kuma gudanar da umurnin "sudo rpm -edh CTPView-9.1R-2.0-1.el7.x86_64”.
- Tsarin zai sake farawa bayan cirewa, yi amfani da mai amfani (wanda kuka ƙirƙiri yayin ƙirƙirar CentOS 7) don shiga.
CVEs da Rashin Lafiyar Tsaro An magance su a cikin CTP View Saukewa: 9.1R2
Tebur masu zuwa suna lissafin CVEs da raunin tsaro waɗanda aka magance a cikin CTP View 9.1R2. Don ƙarin bayani game da kowane CVEs, duba http://web.nvd.nist.gov/view/vuln/search.
Table 2: Mahimmanci ko Muhimman CVEs Haɗe a cikin php
CVE-2018-10547 | CVE-2018-5712 | CVE-2018-7584 | CVE-2019-9024 |
Table 3: Mahimmanci ko Muhimman CVEs Haɗe a cikin kwaya
CVE-2019-14816 | CVE-2019-14895 | CVE-2019-14898 | CVE-2019-14901 |
CVE-2019-17133 | CVE-2019-11487 | CVE-2019-17666 | CVE-2019-19338 |
CVE-2015-9289 | CVE-2017-17807 | CVE-2018-19985 | CVE-2018-20169 |
CVE-2018-7191 | CVE-2019-10207 | CVE-2019-10638 | CVE-2019-10639 |
CVE-2019-11190 | CVE-2019-11884 | CVE-2019-12382 | CVE-2019-13233 |
CVE-2019-13648 | CVE-2019-14283 | CVE-2019-15916 | CVE-2019-16746 |
CVE-2019-18660 | CVE-2019-3901 | CVE-2019-9503 | CVE-2020-12888 |
CVE-2017-18551 | CVE-2018-20836 | CVE-2019-9454 | CVE-2019-9458 |
CVE-2019-12614 | CVE-2019-15217 | CVE-2019-15807 | CVE-2019-15917 |
CVE-2019-16231 | CVE-2019-16233 | CVE-2019-16994 | CVE-2019-17053 |
CVE-2019-17055 | CVE-2019-18808 | CVE-2019-19046 | CVE-2019-19055 |
CVE-2019-19058 | CVE-2019-19059 | CVE-2019-19062 | CVE-2019-19063 |
CVE-2019-19332 | CVE-2019-19447 | CVE-2019-19523 | CVE-2019-19524 |
CVE-2019-19530 | CVE-2019-19534 | CVE-2019-19537 | CVE-2019-19767 |
CVE-2019-19807 | CVE-2019-20054 | CVE-2019-20095 | CVE-2019-20636 |
CVE-2020-1749 | CVE-2020-2732 | CVE-2020-8647 | CVE-2020-8649 |
CVE-2020-9383 | CVE-2020-10690 | CVE-2020-10732 | CVE-2020-10742 |
CVE-2020-10751 | CVE-2020-10942 | CVE-2020-11565 | CVE-2020-12770 |
CVE-2020-12826 | CVE-2020-14305 | CVE-2019-20811 | CVE-2020-14331 |
Table 4: Mahimmanci ko Muhimman CVEs Haɗe a cikin net-snmp
CVE-2018-18066 |
Table 5: Mahimmanci ko Muhimman CVEs Haɗe a nss, nspr
CVE-2019-11729 | CVE-2019-11745 | CVE-2019-11719 | CVE-2019-11727 |
CVE-2019-11756 | CVE-2019-17006 | CVE-2019-17023 | CVE-2020-6829 |
CVE-2020-12400 | CVE-2020-12401 | CVE-2020-12402 | CVE-2020-12403 |
Table 6: Mahimmanci ko Muhimman CVEs Haɗe a Python
CVE-2018-20852 | CVE-2019-16056 | CVE-2019-16935 | CVE-2019-20907 |
Tebur 7: Mahimmanci ko Muhimman CVEs Haɗe a cikin OpenSSL
CVE-2016-2183 |
Table 8: Mahimmanci ko Muhimman CVEs Haɗe a sudo
CVE-2019-18634 |
Table 9: Mahimmanci ko Muhimman CVEs Haɗe a cikin rsyslog
CVE-2019-18634 |
Tebur 10: Muhimman ko Muhimman CVEs Haɗe a cikin http
CVE-2017-15710 | CVE-2018-1301 | CVE-2018-17199 |
CVE-2017-15715 | CVE-2018-1283 | CVE-2018-1303 |
CVE-2019-10098 | CVE-2020-1927 | CVE-2020-1934 |
Table 11: Mahimmanci ko Muhimman CVEs Haɗe a cikin cire zip
CVE-2019-13232 |
Table 12: Mahimmanci ko Muhimman CVEs Haɗe a ɗaure
CVE-2018-5745 | CVE-2019-6465 | CVE-2019-6477 | CVE-2020-8616 |
CVE-2020-8617 | CVE-2020-8622 | CVE-2020-8623 | CVE-2020-8624 |
Table 13: Mahimmanci ko Muhimman CVEs Haɗe a curl
CVE-2019-5436 | CVE-2019-5482 | CVE-2020-8177 |
Table 14: Mahimmanci ko Muhimman CVEs Haɗe a cikin rigidi
CVE-2019-18397 |
Table 15: Muhimman ko Muhimman CVEs Haɗe a cikin expat
CVE-2018-20843 | CVE-2019-15903 |
Table 16: Mahimmanci ko Muhimman CVEs Haɗe a cikin glib2
CVE-2019-12450 | CVE-2019-14822 |
Table 17: Muhimman ko Muhimman CVEs Haɗe a cikin lebe
CVE-2017-12652 |
Table 18: Mahimmanci ko Muhimman CVEs Haɗe a cikin poi
CVE-2019-14866 |
Table 19: Mahimmanci ko Muhimman CVEs Haɗe a cikin e2fsprogs
CVE-2019-5094 | CVE-2019-5188 |
Table 20: Mahimmanci ko Muhimman CVEs Haɗe a cikin sake bugawa
CVE-2020-15999 |
Table 21: Mahimmanci ko Muhimman CVEs Haɗe a cikin Hun spell
CVE-2019-16707 |
Table 22: Mahimmanci ko Muhimman CVEs Haɗe a cikin libX11
CVE-2020-14363 |
Shafin 23: Mahimmanci ko Muhimman CVEs Haɗe a cikin libcroco
CVE-2020-12825 |
Table 24: Mahimmanci ko Muhimman CVEs Haɗe a cikin libssh2
CVE-2019-17498 |
Table 25: Mahimmanci ko Muhimman CVEs Haɗe a cikin buɗaɗɗen dap
CVE-2020-12243 |
Table 26: Mahimmanci ko Muhimman CVEs Haɗe a cikin dbus
CVE-2019-12749 |
Table 27: Muhimman ko Muhimman CVEs Haɗe a cikin glibc
CVE-2019-19126 |
Table 28: Mahimmanci ko Muhimman CVEs Haɗe a cikin tsarin
CVE-2019-20386 |
Takardun CTP da Bayanan Bayanan Saki
Don jerin takaddun takaddun CTP masu alaƙa, duba
https://www.juniper.net/documentation/product/en_US/ctpview
Idan bayanin da ke cikin sabbin bayanan saki ya bambanta da bayanan da ke cikin takaddun, bi Bayanan Sakin CTPOS da CTP View Bayanan Sakin uwar garken.
Don samun mafi kyawun halin yanzu na duk takaddun fasaha na Juniper Networks, duba shafin takaddun samfur akan hanyoyin sadarwar Juniper. websaiti a https://www.juniper.net/documentation/
Neman Tallafin Fasaha
Ana samun tallafin samfur na fasaha ta hanyar Cibiyar Taimakon Fasaha ta Juniper Networks (JTAC). Idan kai abokin ciniki ne tare da kwangilar tallafi na J-Care ko JNASC, ko kuma an rufe ku ƙarƙashin garanti, kuma kuna buƙatar tallafin fasaha na tallace-tallace, zaku iya samun damar kayan aikinmu da albarkatun mu akan layi ko buɗe shari'a tare da JTAC.
- Manufofin JTAC-Don cikakken fahimtar hanyoyin mu da manufofin mu na JTAC, sakeview Jagorar Mai Amfani JTAC dake a https://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.
- Garanti na samfur-Don bayanin garantin samfur, ziyarci- https://www.juniper.net/support/warranty/
- Awanni na aiki na JTAC-Cibiyoyin JTAC suna da albarkatun da ake samu awanni 24 a rana, kwana 7 a mako, kwanaki 365 a shekara.
Tarihin Bita
Disamba 2020-Bita 1, CTPView Saukewa: 9.1R2
Tallafin Abokin Ciniki
Haƙƙin mallaka © 2020 Juniper Networks, Inc. Duk haƙƙin mallaka.
Juniper Networks, alamar Juniper Networks, Juniper, da Junos alamun kasuwanci ne masu rijista na
Juniper Networks, Inc. da/ko masu haɗin gwiwa a Amurka da wasu ƙasashe. Duk sauran
alamun kasuwanci na iya zama mallakar masu su.
Juniper Networks ba ta da alhakin kowane kuskure a cikin wannan takaddar. Juniper Networks
yana da haƙƙin canzawa, gyara, canja wuri, ko in ba haka ba sake duba wannan ɗaba'ar ba tare da sanarwa ba.
Takardu / Albarkatu
![]() |
JUNIPER NETWORKS 9.1R2 CTP View Software Tsarin Gudanarwa [pdf] Jagorar mai amfani 9.1R2 CTP View Tsarin Gudanarwa, 9.1R2, CTP View Tsarin Gudanarwa, View Tsarin Gudanarwa, Tsarin Gudanarwa |