<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CIsco ASA 5500? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860957#M43972</link>
    <description>&lt;P&gt;My question is : can we still use the 5500 ASA-s even after the EOL and what are the risks, and what we would want to replace e.g 5505 and 5510 with ? anything build in with IPS like the next X generation?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:36:29 GMT</pubDate>
    <dc:creator>besnik baftijari</dc:creator>
    <dc:date>2019-03-10T13:36:29Z</dc:date>
    <item>
      <title>CIsco ASA 5500?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860957#M43972</link>
      <description>&lt;P&gt;My question is : can we still use the 5500 ASA-s even after the EOL and what are the risks, and what we would want to replace e.g 5505 and 5510 with ? anything build in with IPS like the next X generation?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860957#M43972</guid>
      <dc:creator>besnik baftijari</dc:creator>
      <dc:date>2019-03-10T13:36:29Z</dc:date>
    </item>
    <item>
      <title>There are some folks still</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860958#M43975</link>
      <description>&lt;P&gt;There are some folks still running Pix firewalls. So yes you can run them for many years if you're happy with the service they provide.&lt;/P&gt;
&lt;P&gt;The risks are that you will have the appearance of security without protection against modern day threats such as Malware, ransomware and such things which are often carried in via web browsing and email that your users are allowed to do with the older generation of firewalls.&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2016 23:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860958#M43975</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-05-02T23:44:55Z</dc:date>
    </item>
    <item>
      <title>In addition to the important</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860959#M43978</link>
      <description>&lt;P&gt;In addition to the important fact (more important then ever) that Marvin mentioned you also put your network at risk because you don't know if there are any vulnerabilities on the device that won't get patched because the device is end of service.&lt;/P&gt;
&lt;P&gt;For your replacement question:&lt;/P&gt;
&lt;P&gt;Consider the &lt;A href="http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/datasheet-c78-733916.html"&gt;5506-X, 5508-X or 5516-X&lt;/A&gt;&amp;nbsp;instead of the 5505/5510 based on your performance requirements.&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2016 06:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860959#M43978</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-05-03T06:25:23Z</dc:date>
    </item>
    <item>
      <title>thank you gentleman for</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860960#M43981</link>
      <description>&lt;P&gt;thank you gentleman for taking the time to respond.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 01:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5500/m-p/2860960#M43981</guid>
      <dc:creator>besnik baftijari</dc:creator>
      <dc:date>2016-07-19T01:40:09Z</dc:date>
    </item>
  </channel>
</rss>

