The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The links provided in this document can help you troubleshoot issues related to the "Microsoft SQL /Slammer/Sapphire" worm.
There are no specific requirements for this document.
This document is not restricted to specific software and hardware versions.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
Refer to Cisco Technical Tips Conventions for more information on document conventions.
The Slammer worm released on January 25, 2003 had a severe impact on Internet traffic worldwide. There are a number of Cisco Integrated Network Security technologies that can assist organizations in responding to this worm and mitigate against future infestations. This white paper and accompanying scripted presentation will help in communicating to customers the means to combat Internet worms using integrated network security.
Cisco Security Notice: Microsoft SQL Worm Mitigation Recommendations
Cisco Security Advisory: Microsoft SQL Server 2000 Vulnerabilities in Cisco Products - MS02-061