<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA and firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677684#M423155</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use "sh module &lt;MODULE no=""&gt;"&lt;/MODULE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e sh module 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the 'Mod Status', and it should be up.&lt;/P&gt;&lt;P&gt;The above command is to verify the module is up and running. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for configuration or traffic inspection wise, it needs to be configured accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_module_installation_guide_chapter09186a008043d786.html#wp1041115" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_module_installation_guide_chapter09186a008043d786.html#wp1041115&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Oct 2006 21:59:24 GMT</pubDate>
    <dc:creator>a.kiprawih</dc:creator>
    <dc:date>2006-10-10T21:59:24Z</dc:date>
    <item>
      <title>ASA and firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677681#M423152</link>
      <description>&lt;P&gt;what are the typical featured whcih an ASA offers ut not firewall.i believe webVPN and AIP-SSM&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677681#M423152</guid>
      <dc:creator>aksher</dc:creator>
      <dc:date>2020-02-21T09:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677682#M423153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Generally, these are some of the differences:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a. ASA, with 4 options: Firewall Edition, IPS Edition, Anti-X Edition, VPN Edition &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   Main Differences:&lt;/P&gt;&lt;P&gt;   * VPN: SSL VPN (webVPN)&lt;/P&gt;&lt;P&gt;   * All access ports are GE (UTP-copper)&lt;/P&gt;&lt;P&gt;   * AIP-SSM: full-featured intrusion prevention services to stop malicious traffic, including worms and network viruses&lt;/P&gt;&lt;P&gt;   * CSC-SSM (anti-X): antivirus, anti-spyware, file blocking, anti-spam, anti-phishing, URL blocking and filtering, content filtering&lt;/P&gt;&lt;P&gt;   * Failover - no dedicated unit just to function as failover only. All boxes came with same license/failover feature&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b. PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   Main Differences:&lt;/P&gt;&lt;P&gt;   * IDS only (basic)&lt;/P&gt;&lt;P&gt;   * Default all 10/100Base-T. Optional cards: 1000Base-X (fiber) or single/4-ports FE&lt;/P&gt;&lt;P&gt;   * Failover:&lt;/P&gt;&lt;P&gt;     - Pix 6.3(x) need pairing of 2 PIXes (primary+UR License, and secondary+failover only)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c. Common Features&lt;/P&gt;&lt;P&gt;   * VPN - remote access &amp;amp; site-to-site&lt;/P&gt;&lt;P&gt;   * Firewalling&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Oct 2006 23:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677682#M423153</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-10-09T23:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677683#M423154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is the command to check AIP-SSM CSC-SSM is active or not?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2006 19:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677683#M423154</guid>
      <dc:creator>aksher</dc:creator>
      <dc:date>2006-10-10T19:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677684#M423155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use "sh module &lt;MODULE no=""&gt;"&lt;/MODULE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e sh module 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the 'Mod Status', and it should be up.&lt;/P&gt;&lt;P&gt;The above command is to verify the module is up and running. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for configuration or traffic inspection wise, it needs to be configured accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_module_installation_guide_chapter09186a008043d786.html#wp1041115" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_module_installation_guide_chapter09186a008043d786.html#wp1041115&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2006 21:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-firewall/m-p/677684#M423155</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-10-10T21:59:24Z</dc:date>
    </item>
  </channel>
</rss>

