Feature Description
Feature 1 This WS-C3650-48PQ device is vulnerable to Software Defect - CSCuu97048: Traffic is dropped due to static mac entry on foreign interface
Feature 2 Restrict SNMP community access with ACL as a security best practice
Feature 3 This WS-C3650-48PQ device is vulnerable to Software Defect - CSCvc38159: IP phones LLDP/CDP enabled rebooting - Documentation defect
Feature 4 The device's clock is incorrect
Feature 5 Improve the Security Posture of the Device by Disabling SSH version 1
Feature 6 The clock on this device is not 'authoritative' and may be incorrect
Feature 7 IP HTTP Server is enabled, which is a deviation from the router security hardening best practices
Feature 8 Found missing router security best practices
Feature 9 No K9 image detected
Feature 10 IP Source Routing is enabled, which is a deviation from the router security hardening best practices
Feature 11 Syslog entries found in show logging (severity warning or higher)
Feature 12 Improve the Security Posture of the Device by Disabling Telnet
Feature 13 Evaluation period left
Feature 14 SNMP is enabled but not running version 3, which is a security best practice
Feature 15 Enable password use detected which uses weak hashing techniques
Feature 16 IP Bootp Server is enabled, which is a deviation from the router security hardening best practices
Feature 17 Service password encryption disabled causing cleartext passwords to be saved in the configuration
Feature 18 Unencrypted Password(s) found in the Configuration
Feature 19 CEF is disabled for some interfaces
Feature 20 Type 7 (insecure) password detected in config. This is a security best practice violation
Feature 21 This device may have hit Software Defect - CSCuq89605: Switch does not show the configured duplex value
Feature 22 This device may have hit Software Defect - CSCtn42790: 3560X/3750X: Elevated CPU usage due to Hulc LED process
Feature 23 Type 4 password or secret found, which is insecure and deprecated
Feature 24 EXEC facility timeout is disabled, which is a deviation from the router security hardening best practices
Feature 25 Significant interface input errors
Feature 26 Significant interface CRC errors
Feature 27 Interface is Half-duplex
Feature 28 One of the interfaces is in inconsistent state from spanning-tree perspective which could impact proper packet forwarding.
Feature 29 The data from this device was evaluated against 992 different diagnostic checks.