I was wondering if for e.g. especially for Inbound SSL-Decryption Rules it is possible to integrate Cisco Firepower appliances with any 3rd party HSM, so that private keys, etc. will remain outside the Firepower appliance ?
If you put an SSL appliance inline with the Firepower device you can get the traffic in decrypted form and inspect that.
If you're using an SSL policy on the Firepower device and specifying decrypt-and-resign as part of the policy then the decryption has to be done on the Firepower device itself - not on an HSM or other appliance.
On April 11, 2019, CERT/cc published a vulnerability note ( VU#192371) describing a vulnerability on how different VPN implementations store session cookies within system memory.
Cisco investigated this issue and determined Cisco AnyConnect is not vulner...
ACS to ISE Migration
ACS 5.x: TACACS+ Authentication and Command Authorization based on AD group membership Configuration Example - Cisco
ACS Shell Command Authorization Sets on IOS and ASA/PIX/FWSM Configuration Example - Cisco
ASA 8.3: TACACS Authe...
The Community is Not TAC
If you have an emergency network problem - Open a Case with the Cisco TAC!
While Cisco employees including members of its Technical Services teams may participate, the Cisco Community is not a replacement for TAC or other ...
Cisco has released Email Security AsyncOS version 12.1 on 8th April 2019. This release includes major enhancements to the Intelligent Multi Scan (IMS) feature to improve overall spam detection efficacy.
Customers using the IMS feature on older AsyncOS re...
Copy any or all parts of this document to create your own.
Create a New Document
Follow these steps to create and edit a document in the Cisco Community.
Go to community.cisco.com and Login
Navigate to the community w...