This portal is to open public enhancement requests against IBM System Storage products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
If I understand correctly, Nessus incorrectly identifies Scale GUI as a wireless access point. If so, Nessus needs to fix their problem.
Nessus scan detect "wireless access point" on gpfs gui url.
From security:
For the Wireless, open a ticket with the vendor to determine how to change the theme or layout of the web login page and/or a feature request to change layout due to graphics definitions in the HTML matching wireless access points 2.4ghz channels.
11026 - Wireless Access Point Detection
Synopsis
The remote host is a wireless access point.
Description
Nessus has determined that the remote host is a wireless access point (AP).
Ensure that proper physical and logical controls are in place for its use. A misconfigured access point may allow
an attacker to gain access to an internal network without being physically present on the premises. If the access
point is using an 'off-the-shelf'
configuration (such as 40 or 104 bit WEP encryption), the data being passed through the access point may be
vulnerable to hijacking or sniffing.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/06/09, Modified: 2020/06/12
Plugin Output
tcp/0
Nessus has determined that this device is an access point based on a
phrase found on the server's default web page. That is, Nessus
maintains a list of commonly-used technical phrases which can be
associated with wireless technologies. When Nessus encounters these
phrases during a scan, a determination is made regarding the nature of
the device. In this case, Nessus has determined that the device may
be running a wireless device with an administrative interface enabled.
This is a very common configuration for Access Points. The exact
phrases which Nessus flagged on were :
- 2.412
- 2.417
- 2.422
- 2.427
- 2.437
Let Modi know if you need more information.
Sorry, I do not understand what this request means. Can you please provide a more detailed explanation?