| Feature | Description |
|---|---|
| Feature 1 | This WS-C3650-48PQ device is vulnerable to Software Defect - CSCuu97048: Traffic is dropped due to static mac entry on foreign interface |
| Feature 2 | Restrict SNMP community access with ACL as a security best practice |
| Feature 3 | This WS-C3650-48PQ device is vulnerable to Software Defect - CSCvc38159: IP phones LLDP/CDP enabled rebooting - Documentation defect |
| Feature 4 | The device's clock is incorrect |
| Feature 5 | Improve the Security Posture of the Device by Disabling SSH version 1 |
| Feature 6 | The clock on this device is not 'authoritative' and may be incorrect |
| Feature 7 | IP HTTP Server is enabled, which is a deviation from the router security hardening best practices |
| Feature 8 | Found missing router security best practices |
| Feature 9 | No K9 image detected |
| Feature 10 | IP Source Routing is enabled, which is a deviation from the router security hardening best practices |
| Feature 11 | Syslog entries found in show logging (severity warning or higher) |
| Feature 12 | Improve the Security Posture of the Device by Disabling Telnet |
| Feature 13 | Evaluation period left |
| Feature 14 | SNMP is enabled but not running version 3, which is a security best practice |
| Feature 15 | Enable password use detected which uses weak hashing techniques |
| Feature 16 | IP Bootp Server is enabled, which is a deviation from the router security hardening best practices |
| Feature 17 | Service password encryption disabled causing cleartext passwords to be saved in the configuration |
| Feature 18 | Unencrypted Password(s) found in the Configuration |
| Feature 19 | CEF is disabled for some interfaces |
| Feature 20 | Type 7 (insecure) password detected in config. This is a security best practice violation |
| Feature 21 | This device may have hit Software Defect - CSCuq89605: Switch does not show the configured duplex value |
| Feature 22 | This device may have hit Software Defect - CSCtn42790: 3560X/3750X: Elevated CPU usage due to Hulc LED process |
| Feature 23 | Type 4 password or secret found, which is insecure and deprecated |
| Feature 24 | EXEC facility timeout is disabled, which is a deviation from the router security hardening best practices |
| Feature 25 | Significant interface input errors |
| Feature 26 | Significant interface CRC errors |
| Feature 27 | Interface is Half-duplex |
| Feature 28 | One of the interfaces is in inconsistent state from spanning-tree perspective which could impact proper packet forwarding. |
| Feature 29 | The data from this device was evaluated against 992 different diagnostic checks. |