<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Botnet Filter with multiple Context Mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046628#M438306</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well this I tried before too. Here the result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-filter updater-client &lt;/P&gt;&lt;P&gt;can only be set in the system context. If you do so, you get a no dns server availabe response.&lt;/P&gt;&lt;P&gt; As described in the document you posted all other settings are made in the needed context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output from system context:&lt;/P&gt;&lt;OL&gt;&lt;LI level="1" type="ol"&gt;&lt;P&gt;show dynamic-filter updater-client&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Dynamic Filter updater client is enabled&lt;/P&gt;&lt;P&gt;Updater server URL is https://update-manifests.ironport.com&lt;/P&gt;&lt;P&gt;Application name: threatcast, version: 1.0&lt;/P&gt;&lt;P&gt;Encrypted UDI: xxxx&lt;/P&gt;&lt;P&gt;Last update attempted at 17:28:45 CEDT Sep 23 2012,&lt;/P&gt;&lt;P&gt; with result: Failed to connect to updater server&lt;/P&gt;&lt;P&gt;Next update is in 00:50:59&lt;/P&gt;&lt;P&gt;No database file&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 23 Sep 2012 15:35:08 GMT</pubDate>
    <dc:creator>hwetzelwtg</dc:creator>
    <dc:date>2012-09-23T15:35:08Z</dc:date>
    <item>
      <title>Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046626#M438304</link>
      <description>&lt;P&gt;We used the Botnet Filter in Single Context Mode for a long Time. Now we converted to multiple Context Mode and the Database is no longer updated. In the system Context I can See the update settings but when I try to update the result is always "no DNS server". Since the system context has no interfaces there are no DNS settings etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How should be the Botnet Filter configured in Multiple Context Mode?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any response in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046626#M438304</guid>
      <dc:creator>hwetzelwtg</dc:creator>
      <dc:date>2019-03-11T23:57:53Z</dc:date>
    </item>
    <item>
      <title>Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046627#M438305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Botnet filter should be configured under each context as system context is not actually a data context where the actual traffic is passing through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample configuration on multiple context mode:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/protect_botnet.html#wp1350582"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/protect_botnet.html#wp1350582&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 14:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046627#M438305</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-23T14:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046628#M438306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well this I tried before too. Here the result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-filter updater-client &lt;/P&gt;&lt;P&gt;can only be set in the system context. If you do so, you get a no dns server availabe response.&lt;/P&gt;&lt;P&gt; As described in the document you posted all other settings are made in the needed context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output from system context:&lt;/P&gt;&lt;OL&gt;&lt;LI level="1" type="ol"&gt;&lt;P&gt;show dynamic-filter updater-client&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Dynamic Filter updater client is enabled&lt;/P&gt;&lt;P&gt;Updater server URL is https://update-manifests.ironport.com&lt;/P&gt;&lt;P&gt;Application name: threatcast, version: 1.0&lt;/P&gt;&lt;P&gt;Encrypted UDI: xxxx&lt;/P&gt;&lt;P&gt;Last update attempted at 17:28:45 CEDT Sep 23 2012,&lt;/P&gt;&lt;P&gt; with result: Failed to connect to updater server&lt;/P&gt;&lt;P&gt;Next update is in 00:50:59&lt;/P&gt;&lt;P&gt;No database file&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 15:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046628#M438306</guid>
      <dc:creator>hwetzelwtg</dc:creator>
      <dc:date>2012-09-23T15:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046629#M438308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to specify the dns server in order to resolve the update server database. Have you configured the dns server on one of the context?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2012 13:25:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046629#M438308</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-24T13:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046630#M438311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, all contexts have a valid DNS except admin and system context.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2012 16:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046630#M438311</guid>
      <dc:creator>hwetzelwtg</dc:creator>
      <dc:date>2012-09-24T16:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046631#M438314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the ASA, can you please try to ping the following:&lt;/P&gt;&lt;P&gt;update-manifests.ironport.com&lt;/P&gt;&lt;P&gt;updates.ironport.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using an internal or external DNS server? and are you able to ping the DNS server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls kindly share your context configuration that has the DNS server configured. &lt;/P&gt;&lt;P&gt;Do you also have "dns domain-lookup &lt;INTERFACE-WHERE-DNS-SERVER-IS-CONNECTED&gt;" configured?&lt;/INTERFACE-WHERE-DNS-SERVER-IS-CONNECTED&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 08:58:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046631#M438314</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-25T08:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046632#M438317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;OL&gt;&lt;LI level="1" type="ol"&gt;&lt;P&gt;sh run | grep dns&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;dns domain-lookup T-COM&lt;/P&gt;&lt;P&gt;dns domain-lookup COLT&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI level="1" type="ol"&gt;&lt;P&gt;ping update-manifests.ironport.com&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 204.15.82.17, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 160/162/170 ms&lt;/P&gt;&lt;OL&gt;&lt;LI level="1" type="ol"&gt;&lt;P&gt;ping updates.ironport.com&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 80.239.221.64, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;HR originaltext="-----------" /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname DE-VM-TER-FW-02&lt;/P&gt;&lt;P&gt;enable password 8Ry2Yj8765U24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnb6IdI.2KY75 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.3207&lt;/P&gt;&lt;P&gt; nameif TR_v207&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.28.6.60 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.3208&lt;/P&gt;&lt;P&gt; nameif TR_v208&lt;/P&gt;&lt;P&gt; security-level 70&lt;/P&gt;&lt;P&gt; ip address 10.28.6.68 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.3209&lt;/P&gt;&lt;P&gt; nameif TR_v209&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 10.28.6.76 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.3210&lt;/P&gt;&lt;P&gt; nameif TR_v210&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.28.6.84 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif COLT&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 217.111.58.46 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; nameif T-COM&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 194.25.250.94 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dns domain-lookup T-COM&lt;/P&gt;&lt;P&gt;dns domain-lookup COLT&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt;object network COLT_dynamic_NAT&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network T-COM_dynamiy_NAT&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt; network-object 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt; network-object 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list COLT_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list T-COM_access_in extended permit tcp any object DEUAG01-actsync eq https&lt;/P&gt;&lt;P&gt;access-list T-COM_access_in extended permit tcp any object DEUAG01-portal eq https&lt;/P&gt;&lt;P&gt;access-list T-COM_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list TR_3208_access_in extended deny ip any object-group DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt;access-list TR_3208_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list TR_3208_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list TR_v207_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list TR_v210_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list TR_v209_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu TR_v208 1500&lt;/P&gt;&lt;P&gt;mtu T-COM 1500&lt;/P&gt;&lt;P&gt;mtu COLT 1500&lt;/P&gt;&lt;P&gt;mtu TR_v207 1500&lt;/P&gt;&lt;P&gt;mtu TR_v210 1500&lt;/P&gt;&lt;P&gt;mtu TR_v209 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface T-COM&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface COLT&lt;/P&gt;&lt;P&gt;ipv6 access-list TR_v207_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;ipv6 access-list TR_v208_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;ipv6 access-list TR_v209_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;ipv6 access-list TR_v210_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network COLT_dynamic_NAT&lt;/P&gt;&lt;P&gt; nat (any,COLT) dynamic interface&lt;/P&gt;&lt;P&gt;object network T-COM_dynamiy_NAT&lt;/P&gt;&lt;P&gt; nat (any,T-COM) dynamic interface&lt;/P&gt;&lt;P&gt;access-group TR_3208_access_in in interface TR_v208&lt;/P&gt;&lt;P&gt;access-group TR_v208_access_ipv6_in in interface TR_v208&lt;/P&gt;&lt;P&gt;access-group T-COM_access_in in interface T-COM&lt;/P&gt;&lt;P&gt;access-group COLT_access_in in interface COLT&lt;/P&gt;&lt;P&gt;access-group TR_v207_access_in in interface TR_v207&lt;/P&gt;&lt;P&gt;access-group TR_v207_access_ipv6_in in interface TR_v207&lt;/P&gt;&lt;P&gt;access-group TR_v210_access_in in interface TR_v210&lt;/P&gt;&lt;P&gt;access-group TR_v210_access_ipv6_in in interface TR_v210&lt;/P&gt;&lt;P&gt;access-group TR_v209_access_in in interface TR_v209&lt;/P&gt;&lt;P&gt;access-group TR_v209_access_ipv6_in in interface TR_v209&lt;/P&gt;&lt;P&gt;route T-COM 0.0.0.0 0.0.0.0 194.25.250.81 1&lt;/P&gt;&lt;P&gt;route COLT 0.0.0.0 0.0.0.0 217.111.58.33 20&lt;/P&gt;&lt;P&gt;route TR_v208 10.28.24.0 255.255.255.0 10.28.6.65 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;dynamic-filter use-database&lt;/P&gt;&lt;P&gt;dynamic-filter enable interface T-COM&lt;/P&gt;&lt;P&gt;dynamic-filter enable interface COLT&lt;/P&gt;&lt;P&gt;dynamic-filter drop blacklist interface T-COM&lt;/P&gt;&lt;P&gt;dynamic-filter drop blacklist interface COLT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum client auto&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect ip-options&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map dynamic-filter-snoop&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:7bbe975fb39e189e99d8878787a0037&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;System Context&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/WARNING"&gt;&lt;/A&gt; dynamic-filter updater-client enable&lt;/P&gt;&lt;P&gt;​ Can't resolve update-manifests.ironport.com, make sure dns nameserver is configured&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 16:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046632#M438317</guid>
      <dc:creator>hwetzelwtg</dc:creator>
      <dc:date>2012-09-27T16:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Botnet Filter with multiple Context Mode</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046633#M438319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Solution: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/contexts.html#wp1146788&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;System Configuration&lt;/P&gt;&lt;P&gt;The system administrator adds and manages contexts by configuring each context configuration location, allocated interfaces, and other context operating parameters in the system configuration, which, like a single mode configuration, is the startup configuration. The system configuration identifies basic settings for the ASA. The system configuration does not include any network interfaces or network settings for itself; rather, when the system needs to access network resources (such as downloading the contexts from the server), it uses one of the contexts that is designated as the admin context. The system configuration does include a specialized failover interface for failover traffic only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now it works! The Admin context need to have Internet access and DNS defined.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 10:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-with-multiple-context-mode/m-p/2046633#M438319</guid>
      <dc:creator>hwetzelwtg</dc:creator>
      <dc:date>2012-10-09T10:37:38Z</dc:date>
    </item>
  </channel>
</rss>

