JUNIPER NETWORKS 9.1R2 CTP View Software Tsarin Gudanarwa

JUNIPER NETWORKS 9.1R2 CTP View Software Tsarin Gudanarwa

Saki 9.1R2 Disamba 2020 

Waɗannan bayanan bayanan sakin suna rakiyar Sakin 9.1R2 na CTP View Software System Management. Suna ƙunshi bayanan shigarwa kuma suna bayyana abubuwan haɓakawa ga software. Farashin CTP View Sakin software na 9.1R2 ya dace da Juniper Networks CTP jerin dandamali masu gudana CTPOS sigar 9.1R2 ko baya.

Kuna iya samun waɗannan bayanan bayanan saki akan Takardun Software na Juniper Networks CTP webshafi, wanda yake a https://www.juniper.net/documentation/product/en_US/ctpview

Fitowar Fitowa

An ƙara abubuwan haɓakawa ko haɓakawa zuwa CTP View Saukewa: 9.1R2.

  • [PR 1364238] STIG hardening don CTP View Farashin 9.1R2.
  • [PR 1563701] Kunna serial console ta tsohuwa lokacin da CTP View an shigar a kan uwar garken jiki na Centos 7.

NOTE: CTP View 9.1R2 yana gudana akan OS da aka sabunta (CentOS 7.5.1804) wanda ke ba da ingantaccen tsaro tare da ingantaccen juriya da ƙarfi.

Ba a samun goyan bayan fasalulluka masu zuwa a cikin CTP View Saukewa: 9.1R2.

  • [PR 1409289] Abubuwan PBS da L2Agg ba su da tallafi. Za a sake dawo da waɗannan fasalulluka a cikin sakin gaba.
  • [PR 1409293]. Za a sake dawo da waɗannan fasalulluka 1 a cikin sakin gaba.

Matsalolin da aka warware a cikin CTP View Saukewa: 9.1R2

An warware waɗannan batutuwan a cikin CTP View Saki 9.1R2:

  • [PR 1468711] CTP View 9.1R2 yana buƙatar masu amfani don canza tsoho kalmar sirri na tsoffin asusun mai amfani.

Abubuwan da aka sani a cikin CTP View Saukewa: 9.1R2

Babu.

Da ake buƙata Shigar Files

Alhakin ku ne shigar da CentOS akan VM, kuma nau'in CentOS dole ne ya zama 7.5.1804 (http://vault.centos.org/7.5.1804/isos/x86_64/). Don bayani kan yadda ake ƙirƙirar injin kama-da-wane na CentOS 7, duba “Ƙirƙirar Injin Farfaɗo na CentOS 7” a shafi na 3. Sanya sabbin abubuwan da aka fitar na Centos ba su da tallafi dole ne ku yi amfani da Centos 7.5.1804. Idan kuna da tambayoyi ko buƙatar ƙarin taimako, tuntuɓi Cibiyar Taimakon Fasaha ta Juniper Networks (JTAC).

Masu bi file An tanadar don shigar da CTP View software:

File Filesuna Checksum
Sabunta software da CentOS OS CTPView-9.1R-2.0-1.el7.x86_64.rpm 5e41840719d9535aef17ba275b5b6343

Yi amfani da waɗannan bayanan don tantance daidai file don amfani:

CTP View Server OS

An shigar da CTP View Saki File don haɓakawa Sake kunna uwar garken yayin haɓakawa?
CentOS 7.5 NA CTPView-9.1R-2.0-1.el7.x86_64.rpm Ee

Shawarar Kanfigareshan Tsari don Bayar da CTP View Sabar

Wadannan sune shawarwarin da aka ba da shawarar hardware don saita CTP View 9.1R2 uwar garken:

  • CentOS 7.5.1804 (64-bit)
  • 1 x processor (core 4)
  • 4 GB RAM
  • Adadin NICs - 2
  • 80 GB Disk sarari

CTP View Manufar Shigarwa da Kulawa

Daga fitowar CTP View 9.0R1, Juniper Networks sun karɓi sabon tsari don shigarwa da kiyaye CTP View uwar garken. CTP View yanzu ana rarraba shi azaman samfurin "Aikace-aikace kawai", a cikin nau'i na kunshin RPM. Kuna iya shigar da kuma kula da OS (CentOS 7.5) bisa ga jagororin da aka bayyana a cikin “Saka CTP View 9.1R2" a shafi na 8. Tare da CTP View 7.3Rx da farkon sakewa, OS (CentOS 5.11) da CTP View An haɗa aikace-aikacen kuma an rarraba su azaman shigarwa guda ɗaya ISO, da duk sabuntawa (OS da CTP View aikace-aikace) suna samuwa ne kawai daga Juniper Networks. Wannan yana haifar da jinkirin samun CTP View sake sabuntawa don mahimman sabuntawar tsaro (ciki har da aikace-aikacen Linux OS da CTP View aikace-aikace).

Tare da wannan sabon samfurin, zaku iya sabunta aikace-aikacen CentOS guda ɗaya daga CTP View aikace-aikacen idan an ba da rahoton duk wani lahani na tsaro don aikace-aikacen Linux OS. Wannan yana ba da ƙarin sassaucin da kuke buƙata don tabbatar da tsaron dandamali na tushen Linux.

CTP View ya kunshi:

  • Nau'in 1-Stock CentOS 7.5 RPMs
  • Nau'in 2-Stock CentOS RPMs daga wasu nau'ikan CentOS
  • Nau'in 3-CentOS RPMs da aka gyara
  • Nau'in 4-CTP View aikace-aikace file

Inda, "Stock" RPMs sune fakitin da ke da alaƙa da takamaiman sakin CentOS kuma ana samun su akan Intanet. RPMs "An gyara" nau'ikan haja ne na RPMs waɗanda Juniper Networks ke gyara don buƙatun CTP View dandamali. Shigarwa na CentOS 7.5 ISO kawai ya ƙunshi abubuwan da ake buƙata na nau'in 1. CTP monolithic View RPM ya ƙunshi sauran abubuwan da suka rage na nau'ikan 2, 3, da 4, waɗanda za'a iya cirewa da shigar dasu.

Lokacin da Juniper Networks ke ba da CTP View tabbatarwa saki RPM, ya ƙunshi updated sassa na iri 2, 3, da 4. Har ila yau, ya ƙunshi dogara don tabbatar da cewa nau'in 1 sassa ma na zamani da kuma gargadi mai amfani idan wani daga cikinsu yana bukatar a updated.

Juniper Networks suna kiyaye jerin RPMs don CTP View cewa muna ba da shawarar ingantawa don tsaro da dalilai na aiki. Ana amfani da hanyoyi masu zuwa don tantance wane CTP View RPMs suna buƙatar sabuntawa:

  • Retina/Nessus sc0ans na yau da kullun
  • Sanarwa daga ƙungiyar Juniper's SIRT
  • Rahotanni daga abokan ciniki

Lokacin da ake buƙatar ɗaukakawar RPM, Juniper Networks tana inganta sabon sigar ɓangaren don tabbatar da cewa yana aiki da kyau kafin ƙara shi zuwa lissafin RPM. Za a raba muku wannan jeri ta hanyar KB. Ko da yake CTP View wajabcin sabunta sabuntawa (kuma mai yiwuwa samar da) RPM na zamani kafin shigarwa, wannan jerin RPM yana taimaka muku sabunta CTP ɗin ku. View software tsakanin sakewa. Idan akwai RPM da aka ƙara zuwa jerin RPM, zaku iya ɗaukar mataki nan take. Juniper Networks yana ba da kayan aikin nau'in 3 ta hanyar sakewa kawai.

Don nau'in 1 da 2, RPMs yakamata su kasance a cikin 'yanci akan abubuwan web, da Juniper Networks yana ba da sampda links. Idan kun gano cewa RPM yana buƙatar sabuntawar tsaro kuma baya cikin jerin RPM, kuna iya sanar da mu don mu gwada shi kuma mu ƙara shi cikin jerin.

HANKALI: Babban sabuntawar RPM ta amfani da “yum update” haramun ne. CTP View 9.x, kodayake galibi ya dogara da CentOS 7.5, kuma an yi shi da RPMs daga sauran rabawa. Yin sabuntawa zuwa sabon sigar CentOS 7 na iya haifar da CTP View don zama marasa aiki, kuma ana iya buƙatar sake shigarwa.

Idan kun sabunta RPMs waɗanda basa cikin jerin KB RPM, CTP View maiyuwa bazaiyi aiki yadda yakamata ba.

Ƙirƙirar Injin Virtual Centos 7

Kafin ka fara:

  • Tabbatar cewa an shigar da abokin ciniki vSphere akan wurin aikin ku.

NOTE: A cikin vSphere, akwai hanyoyi da yawa don yin wani aiki na musamman. Mai zuwa example ya kwatanta daya irin wannan hanya. Kuna iya amfani da hanyar da ta dace da tura cibiyar sadarwar ku yadda ya kamata.

Don ƙirƙirar sabon misalin CentOS 7 Sting's VM na CTP View uwar garken akan uwar garken Essig:

  1. Kwafi CentOS 7 ISO file (centOS-7-x86_64-DVD-1804.iso) zuwa ma'ajiyar bayanai ta Essig. Ana iya sauke CentOS 7 ISO daga http://vault.centos.org/7.5.1804/isos/x86_64/.
  2. Fara abokin ciniki na vSphere kuma shigar da adireshin IP na uwar garken ESXi da takaddun shaidar shiga ku.
  3. Fara maye don ƙirƙirar sabon injin kama-da-wane. Zaɓi File > Sabo > Injin Farko.
  4. Zaɓi tsarin daidaitawa azaman Na Musamman kuma danna Gaba.
  5. Shigar da suna don VM. Domin misaliampku, CTPView_9.1R2.
  6. Zaɓi wurin ajiyar bayanai (tare da aƙalla sarari kyauta 80 GB) kuma danna Next.
  7. Zaɓi Guest OS azaman Linux da sigar azaman sauran Linux (64-bit), sannan danna Next.
  8. Zaɓi adadin NICs azaman 2 da nau'in adaftar kamar E1000, sannan danna Next.
  9. Zaɓi girman faifai na kama-da-wane kamar 80 GB kuma zaɓi Ƙaƙƙarfan Samar da Lazy Zeroed.
  10.  Zaɓi Shirya saitunan injin kama-da-wane kafin kammala rajistan akwatin kuma danna Ci gaba.
  11. Danna Hardware shafin kuma zaɓi girman ƙwaƙwalwar ajiya azaman 4 GB.
  12. A cikin Hardware shafin, zaɓi CPU. Sannan, zaɓi adadin kwasfa masu kama-da-wane azaman 2 da adadin cores kowane soket azaman 1 (zaka iya zaɓar har zuwa 4 cores).
  13. A cikin Hardware shafin, zaɓi CD/DVD. Sannan, zaɓi nau'in na'urar azaman Datastore ISO File kuma bincika zuwa CentOS 7 ISO file. Zaɓi Haɗa a wuta akan akwatin rajistan shiga ƙarƙashin Matsayin Na'ura.
  14. Danna Gama.
  15. Zaɓi injin kama-da-wane da kuka ƙirƙira a cikin ɓangaren hagu na vSphere> Inventory.
  16. A cikin Farawa shafin, zaɓi Ƙarfi akan injin kama-da-wane.
  17. Canja zuwa shafin Console kuma danna cikin kwailin tasha.
  18. Zaɓi zaɓin Shigar CentOS Linux 7 tare da maɓallin Up-Arrow kuma danna Shigar.
  19. Danna maɓallin Shigar don fara aikin shigarwa.
  20. Zaɓi harshen da yankin lokacin ƙasar da kuke so (idan ya cancanta) sannan danna Ci gaba.
  21. Danna zabin SOFTWARE SELECTION.
  22. A cikin Basic Environment sashe, zaɓi Basic Web Maɓallin rediyon uwar garken. A cikin Ƙara-kan don Zaɓin Muhalli, zaɓi Tallafin PHP da Perl don Web duba akwatuna kuma danna Anyi.
  23. Danna INSTALLATION DESTINATION kuma tabbatar da cewa an zaɓi VMware Virtual disk (80 GB).
  24. A cikin Sauran Zaɓuɓɓukan Ma'ajiya, zaɓi Zan saita maɓallin zaɓin rarrabawa.
  25. Danna Anyi. Shafin PARTITIONING MANAL ya bayyana.
  26. Danna maɓallin +. Akwatin maganganu na ƙara SABON DUMI DUMI ya bayyana. Amfanin Kasuwancin Juniper kawai
  27. Don ƙirƙirar bangare don /boot, shigar da /boot a cikin filin Dutsen Point kuma shigar da 1014 MB a cikin filin da ake so. Sa'an nan, danna Add mount point.
  28. Zaɓi Standard Partition daga lissafin Nau'in Na'ura kuma zaɓi ext3 daga cikin File Jerin tsarin. Shigar da LABEL=/ taya a cikin Label filin sannan danna Sabunta Saituna.
  29. Hakazalika, maimaita matakai na 26 zuwa 28 don ƙirƙirar ɓangarori don wuraren tsaunuka masu zuwa tare da saitunan da aka bayar.
    Table 1: Dutsen Points da Saitunansu
    Dutsen Point Ƙarfin da ake so Nau'in Na'ura File Tsari Lakabi
    /tmp 9.5 GB Daidaitaccen bangare ext3 LABEL=/tmp
    / 8 GB Daidaitaccen bangare ext3 LABEL=/
    /var/log 3.8 GB Daidaitaccen bangare ext3 LABEL=/var/log
    /var 3.8 GB Daidaitaccen bangare ext3 LABEL=/var
    /var/log/audit 1.9 GB Daidaitaccen bangare ext3 LABEL=/var/log/a
    /gida 1.9 GB Daidaitaccen bangare ext3 LABEL=/gida
    /var/www 9.4 GB Daidaitaccen bangare ext3 LABEL=/var/www
  30. Danna Anyi sau biyu sannan danna Karɓa Canje-canje.
  31. Danna NETWORK & SUNAN MAI GIRMA.
  32. Zaɓi zaɓin Ethernet (misaliample, Ethernet (ens32)), shigar da sunan mai masauki (don misaliampku, ctp view) a cikin filin sunan Mai watsa shiri, sannan danna Aiwatar.
  33. Danna Sanya. Sa'an nan, danna IPv4 Saituna tab.
  34. Zaɓi Manual daga lissafin Hanyar kuma danna Ƙara.
  35. Shigar da ƙimar adireshi, Netmask, da filayen Ƙofar, sannan danna Ajiye.
  36. Danna maɓallin juyawa a kusurwar dama na sama don kawo saitunan Ethernet sama da aiki, sannan danna Anyi.
  37. Danna SIYASAR TSARO.
  38. Zaɓi DISA STIG don zaɓin uwar garken CentOS Linux 7 kuma danna Zaɓi Profile. Sannan, danna Anyi.
  39. Danna Fara Shigarwa. Shafin USER SETTINGS ya bayyana.
  40. Danna USER CREATION, shigar da sunan mai amfani a matsayin "admin", kuma shigar da kalmar sirri. Don Allah kar a shigar da sunan mai amfani a matsayin "junipers" a nan.
  41. Zaɓi akwatin Yi wannan mai gudanar da mai amfani kuma danna Anyi.
  42. A cikin shafin USER SETTINGS, danna ROOT PASSWORD, shigar da kalmar wucewa kamar “CTPView-2-2” ko kowane kalmar sirri kuma danna Anyi.
  43. Bayan da shigarwa tsari da aka kammala, danna Sake yi.

Shigar da CTP View 9.1R2

CTP View za a iya shigar a kan sabuwar ƙirƙira CentOS 7.5[1804] VM ko CentOS 7.5[1804] sabar karfe mara amfani.

Matakan sune kamar haka:

  1. Ƙirƙiri sabon misali na CentOS 7 Virtual Machine (VM) kamar yadda aka ambata a cikin "Ƙirƙirar Injin Virtual Centos 7" a shafi na 3.
  2. Kwafi CTP View RPM (CTPView-9.1R-2.0-1.el7.x86_64.rpm) to /tamp directory na sabon ƙirƙira CentOS 7.5[1804] VM ko CentOS 7.5[1804] ƙaramin ƙarfe.
  3. Shiga azaman mai amfani "admin" wanda kuka ƙirƙira a lokacin ƙirƙirar Centos 7 VM. Shigar da CTP View RPM Idan installing a saman
    • Centos 7 ko 9.1R1 - yi amfani da umarni "sudor rpm -Urho CTPView-9.1R-2.0-1.el7.x86_64.rpm”
    • 9.0R1 - yi amfani da umarni "sudor rpm -Usha -force CTPView-9.1R-2.0-1.el7.x86_64.rpm”.
  4. Canja kalmomin shiga don duk tsoffin asusun mai amfani (junipers, tushen, Juniper, ctpview_pgsql) a ƙarshen lokacin haɓakawa (Dubi sashe Canja kalmar sirri na asusun mai amfani na tsoho).

Canja kalmar sirri ta tsoffin asusun mai amfani

Wannan matakin yana aiki ne kawai lokacin da kuka shigar da CTPView 9.1R2 RPM akan sabar ku. Canja kalmomin shiga don duk tsoffin asusun mai amfani kamar yadda aka nuna a ƙasa:

CTP View an shigar akan tsarin ku. Yanzu, Kuna buƙatar saita kalmomin shiga don duk tsoffin asusun mai amfani.
DON ALLAH KA TUNANI DA WADANNAN KASUWANCI!!!

Maido da kalmar wucewa ba tsari bane mai sauƙi:

  • Yana shafar sabis.
  • Yana buƙatar samun damar na'ura wasan bidiyo zuwa CTP View
  • Yana buƙatar sake kunna CTP View (Wataƙila ko da tsarin sake ƙarfafawa)

Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa

@ {} # % ~ [ ] = & , - _ !

Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da

1 ƙananan haruffa 1, babban baƙaƙe 1, lambobi 1 da wasu haruffa XNUMX.

Lura : Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2"

Shigar da Sabuwar Kalmar wucewa ta UNIX don tushen

Sake rubuta Sabuwar kalmar wucewa ta UNIX don tushen

Canza kalmar sirri don tushen mai amfani.

passwd: duk alamun tabbatarwa an sabunta su cikin nasara.

Wannan zai zama Mai Gudanar da Tsari

Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa

@ {} # % ~ [ ] = & , - _ !

Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da\ 1 ƙarami, babban baƙaƙe 1, lambobi 1 da wasu haruffa 1.

Lura: Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2"

Shigar da Sabuwar Kalmar wucewa ta UNIX don juniper_sa

Sake rubuta Sabuwar kalmar wucewa ta UNIX don juniper_sa

Canza kalmar sirri don junipers mai amfani. passwd: duk alamun tabbatarwa an sabunta su cikin nasara. Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa

@ {} # % ~ [ ] = & , - _ !

Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da

1 ƙananan haruffa 1, babban baƙaƙe 1, lambobi 1 da wasu haruffa XNUMX.

Lura: Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2" Canza kalmar sirri don mai amfani Juniper
Shigar da sabon kalmar sirri:

Sake shigar da sabuwar kalmar sirri:

Yanzu za a tambaye ku kalmar sirrin asusun Administrator PostgreSQL:

Kalmar wucewa don matsayi mai amfani:

==== Anyi nasarar sabunta CTP View kalmar sirri don tsohon mai amfani Juniper. ====

Lura: An sanya Juniper mai amfani ga tsohuwar rukunin mai amfani TempGroup kuma an ba shi tsoffin kaddarorin mai amfani. Review Ƙimar ta amfani da CTPView Cibiyar Gudanarwa da yin kowane gyare-gyare masu dacewa.

Sabuwar kalmar sirri dole ne ta zama haruffa ko haruffa

@ {} # % ~ [ ] = & , - _ !

Sabuwar kalmar sirri kuma dole ne ta kasance aƙalla tsawon haruffa 6, tare da

1 ƙananan haruffa 1, babban baƙaƙe 1, lambobi 1 da wasu haruffa XNUMX.

Lura : Idan ba a buƙatar kalmomin sirri na musamman, yi amfani da “CTPView-2-2" Canza kalmar sirri don mai amfani ctpview_pgsql

Shigar da sabon kalmar sirri:

Sake shigar da sabuwar kalmar sirri:

Yanzu za a tambaye ku kalmar sirrin asusun Administrator PostgreSQL:

Kalmar wucewa don matsayi mai amfani:

Lura - Hakanan zaka iya sake saita kalmar wucewa ta duk tsoffin asusun mai amfani daga CTP View menu -> Manyan Ayyuka
-> Sake saitin asusu don tsoho mai kula da tsarin

Ana cire CTPView 9.1R2

CTP View Ana iya cire 9.1R2 daga Centos 7 ta aiwatar da matakai masu zuwa:

  1. Bincika idan an ba da izinin shiga tushen. Idan ba haka ba, kunna tushen shiga daga menu -> Tsaro Profile(1) -> Gyara Matsayin Tsaro (5) -> Sanya matakin OS zuwa 'sosai-ƙasa'(3).
  2. Shiga ta mai amfani da "tushen" kuma gudanar da umurnin "sudo rpm -edh CTPView-9.1R-2.0-1.el7.x86_64”.
  3. Tsarin zai sake farawa bayan cirewa, yi amfani da mai amfani (wanda kuka ƙirƙiri yayin ƙirƙirar CentOS 7) don shiga.

CVEs da Rashin Lafiyar Tsaro An magance su a cikin CTP View Saukewa: 9.1R2

Tebur masu zuwa suna lissafin CVEs da raunin tsaro waɗanda aka magance a cikin CTP View 9.1R2. Don ƙarin bayani game da kowane CVEs, duba http://web.nvd.nist.gov/view/vuln/search.

Table 2: Mahimmanci ko Muhimman CVEs Haɗe a cikin php

CVE-2018-10547 CVE-2018-5712 CVE-2018-7584 CVE-2019-9024

Table 3: Mahimmanci ko Muhimman CVEs Haɗe a cikin kwaya

CVE-2019-14816 CVE-2019-14895 CVE-2019-14898 CVE-2019-14901
CVE-2019-17133 CVE-2019-11487 CVE-2019-17666 CVE-2019-19338
CVE-2015-9289 CVE-2017-17807 CVE-2018-19985 CVE-2018-20169
CVE-2018-7191 CVE-2019-10207 CVE-2019-10638 CVE-2019-10639
CVE-2019-11190 CVE-2019-11884 CVE-2019-12382 CVE-2019-13233
CVE-2019-13648 CVE-2019-14283 CVE-2019-15916 CVE-2019-16746
CVE-2019-18660 CVE-2019-3901 CVE-2019-9503 CVE-2020-12888
CVE-2017-18551 CVE-2018-20836 CVE-2019-9454 CVE-2019-9458
CVE-2019-12614 CVE-2019-15217 CVE-2019-15807 CVE-2019-15917
CVE-2019-16231 CVE-2019-16233 CVE-2019-16994 CVE-2019-17053
CVE-2019-17055 CVE-2019-18808 CVE-2019-19046 CVE-2019-19055
CVE-2019-19058 CVE-2019-19059 CVE-2019-19062 CVE-2019-19063
CVE-2019-19332 CVE-2019-19447 CVE-2019-19523 CVE-2019-19524
CVE-2019-19530 CVE-2019-19534 CVE-2019-19537 CVE-2019-19767
CVE-2019-19807 CVE-2019-20054 CVE-2019-20095 CVE-2019-20636
CVE-2020-1749 CVE-2020-2732 CVE-2020-8647 CVE-2020-8649
CVE-2020-9383 CVE-2020-10690 CVE-2020-10732 CVE-2020-10742
CVE-2020-10751 CVE-2020-10942 CVE-2020-11565 CVE-2020-12770
CVE-2020-12826 CVE-2020-14305 CVE-2019-20811 CVE-2020-14331

Table 4: Mahimmanci ko Muhimman CVEs Haɗe a cikin net-snmp

CVE-2018-18066

Table 5: Mahimmanci ko Muhimman CVEs Haɗe a nss, nspr

CVE-2019-11729 CVE-2019-11745 CVE-2019-11719 CVE-2019-11727
CVE-2019-11756 CVE-2019-17006 CVE-2019-17023 CVE-2020-6829
CVE-2020-12400 CVE-2020-12401 CVE-2020-12402 CVE-2020-12403

Table 6: Mahimmanci ko Muhimman CVEs Haɗe a Python

CVE-2018-20852 CVE-2019-16056 CVE-2019-16935 CVE-2019-20907

Tebur 7: Mahimmanci ko Muhimman CVEs Haɗe a cikin OpenSSL

CVE-2016-2183

Table 8: Mahimmanci ko Muhimman CVEs Haɗe a sudo

CVE-2019-18634

Table 9: Mahimmanci ko Muhimman CVEs Haɗe a cikin rsyslog

CVE-2019-18634

Tebur 10: Muhimman ko Muhimman CVEs Haɗe a cikin http

CVE-2017-15710 CVE-2018-1301 CVE-2018-17199
CVE-2017-15715 CVE-2018-1283 CVE-2018-1303
CVE-2019-10098 CVE-2020-1927 CVE-2020-1934

Table 11: Mahimmanci ko Muhimman CVEs Haɗe a cikin cire zip

CVE-2019-13232

Table 12: Mahimmanci ko Muhimman CVEs Haɗe a ɗaure

CVE-2018-5745 CVE-2019-6465 CVE-2019-6477 CVE-2020-8616
CVE-2020-8617 CVE-2020-8622 CVE-2020-8623 CVE-2020-8624

Table 13: Mahimmanci ko Muhimman CVEs Haɗe a curl

CVE-2019-5436 CVE-2019-5482 CVE-2020-8177

Table 14: Mahimmanci ko Muhimman CVEs Haɗe a cikin rigidi

CVE-2019-18397

Table 15: Muhimman ko Muhimman CVEs Haɗe a cikin expat

CVE-2018-20843 CVE-2019-15903

Table 16: Mahimmanci ko Muhimman CVEs Haɗe a cikin glib2

CVE-2019-12450 CVE-2019-14822

Table 17: Muhimman ko Muhimman CVEs Haɗe a cikin lebe

CVE-2017-12652

Table 18: Mahimmanci ko Muhimman CVEs Haɗe a cikin poi

CVE-2019-14866

Table 19: Mahimmanci ko Muhimman CVEs Haɗe a cikin e2fsprogs

CVE-2019-5094 CVE-2019-5188

Table 20: Mahimmanci ko Muhimman CVEs Haɗe a cikin sake bugawa

CVE-2020-15999

Table 21: Mahimmanci ko Muhimman CVEs Haɗe a cikin Hun spell

CVE-2019-16707

Table 22: Mahimmanci ko Muhimman CVEs Haɗe a cikin libX11

CVE-2020-14363

Shafin 23: Mahimmanci ko Muhimman CVEs Haɗe a cikin libcroco

CVE-2020-12825

Table 24: Mahimmanci ko Muhimman CVEs Haɗe a cikin libssh2

CVE-2019-17498

Table 25: Mahimmanci ko Muhimman CVEs Haɗe a cikin buɗaɗɗen dap

CVE-2020-12243

Table 26: Mahimmanci ko Muhimman CVEs Haɗe a cikin dbus

CVE-2019-12749

Table 27: Muhimman ko Muhimman CVEs Haɗe a cikin glibc

CVE-2019-19126

Table 28: Mahimmanci ko Muhimman CVEs Haɗe a cikin tsarin

CVE-2019-20386

Takardun CTP da Bayanan Bayanan Saki

Don jerin takaddun takaddun CTP masu alaƙa, duba

https://www.juniper.net/documentation/product/en_US/ctpview

Idan bayanin da ke cikin sabbin bayanan saki ya bambanta da bayanan da ke cikin takaddun, bi Bayanan Sakin CTPOS da CTP View Bayanan Sakin uwar garken.

Don samun mafi kyawun halin yanzu na duk takaddun fasaha na Juniper Networks, duba shafin takaddun samfur akan hanyoyin sadarwar Juniper. websaiti a https://www.juniper.net/documentation/

Neman Tallafin Fasaha

Ana samun tallafin samfur na fasaha ta hanyar Cibiyar Taimakon Fasaha ta Juniper Networks (JTAC). Idan kai abokin ciniki ne tare da kwangilar tallafi na J-Care ko JNASC, ko kuma an rufe ku ƙarƙashin garanti, kuma kuna buƙatar tallafin fasaha na tallace-tallace, zaku iya samun damar kayan aikinmu da albarkatun mu akan layi ko buɗe shari'a tare da JTAC.

Tarihin Bita
Disamba 2020-Bita 1, CTPView Saukewa: 9.1R2

Tallafin Abokin Ciniki

Haƙƙin mallaka © 2020 Juniper Networks, Inc. Duk haƙƙin mallaka.
Juniper Networks, alamar Juniper Networks, Juniper, da Junos alamun kasuwanci ne masu rijista na
Juniper Networks, Inc. da/ko masu haɗin gwiwa a Amurka da wasu ƙasashe. Duk sauran
alamun kasuwanci na iya zama mallakar masu su.
Juniper Networks ba ta da alhakin kowane kuskure a cikin wannan takaddar. Juniper Networks
yana da haƙƙin canzawa, gyara, canja wuri, ko in ba haka ba sake duba wannan ɗaba'ar ba tare da sanarwa ba.

Takardu / Albarkatu

JUNIPER NETWORKS 9.1R2 CTP View Software Tsarin Gudanarwa [pdf] Jagorar mai amfani
9.1R2 CTP View Tsarin Gudanarwa, 9.1R2, CTP View Tsarin Gudanarwa, View Tsarin Gudanarwa, Tsarin Gudanarwa

Magana

Bar sharhi

Ba za a buga adireshin imel ɗin ku ba. Ana yiwa filayen da ake buƙata alama *