<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS design in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-design/m-p/1174029#M77748</link>
    <description>&lt;P&gt;I have 2 unit ASA 5520 with AIP-SSM-20 for front-end and 2 units ASA5520 with AIP_SSM-20 for back-end.I also have 2 units catalyst 6509. How should my design looks like.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 11:29:48 GMT</pubDate>
    <dc:creator>chiangfong</dc:creator>
    <dc:date>2019-03-10T11:29:48Z</dc:date>
    <item>
      <title>IPS design</title>
      <link>https://community.cisco.com/t5/network-security/ips-design/m-p/1174029#M77748</link>
      <description>&lt;P&gt;I have 2 unit ASA 5520 with AIP-SSM-20 for front-end and 2 units ASA5520 with AIP_SSM-20 for back-end.I also have 2 units catalyst 6509. How should my design looks like.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-design/m-p/1174029#M77748</guid>
      <dc:creator>chiangfong</dc:creator>
      <dc:date>2019-03-10T11:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPS design</title>
      <link>https://community.cisco.com/t5/network-security/ips-design/m-p/1174030#M77749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to provide much more detail on the goals your design is trying to achieve.&lt;/P&gt;&lt;P&gt;Are the asa pairs for reduntancy?&lt;/P&gt;&lt;P&gt;What do you mean front-end and back-end, to what?&lt;/P&gt;&lt;P&gt;What networks feed into and out of this hardware?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Feb 2009 16:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-design/m-p/1174030#M77749</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2009-02-10T16:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPS design</title>
      <link>https://community.cisco.com/t5/network-security/ips-design/m-p/1174031#M77750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Pairs of ASA is for redundancy. Front end mean to internet edge.Back end means internal network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Feb 2009 01:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-design/m-p/1174031#M77750</guid>
      <dc:creator>chiangfong</dc:creator>
      <dc:date>2009-02-11T01:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPS design</title>
      <link>https://community.cisco.com/t5/network-security/ips-design/m-p/1174032#M77752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA pairs for redundancy makes sence, but I do not understand why you are using two sets of firewalls? what is between these two ASA pairs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Feb 2009 19:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-design/m-p/1174032#M77752</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2009-02-11T19:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPS design</title>
      <link>https://community.cisco.com/t5/network-security/ips-design/m-p/1174033#M77755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Between these two ASA pairs is a pair of catalyst 6509. The internal network is purely flat network. Do i need two pairs of ASA?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 01:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-design/m-p/1174033#M77755</guid>
      <dc:creator>chiangfong</dc:creator>
      <dc:date>2009-02-12T01:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPS design</title>
      <link>https://community.cisco.com/t5/network-security/ips-design/m-p/1174034#M77756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It all depends on what you are trying to accomplish and what features you are using in each ASA. The outside ASA, as a firewall can host serveral inside networks (limited by the number of interfaces in the ASA) each netowrk can have a different firewall policy assigned. If that meets your firewall needs, then you might not require a second set of ASAs. &lt;/P&gt;&lt;P&gt;You have not provided enough network requirements detail to even make an guess of what you need.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 17:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-design/m-p/1174034#M77756</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2009-02-12T17:18:11Z</dc:date>
    </item>
  </channel>
</rss>

