Hello there, i've got a really srange issue with ASA 5540 active/standby cluster (actually with active ASA). Lets say there is inside and outside interfaces. Host 10.20.60.16 is behind inside intefrace and it successfully establishes TCP connection with host 10.20.46.25 which is actually a remote VPN client terminated on outside interface. Everything works fine, ASA generated logs about successfull TCP build/teardown connection, however ASA generated additional logs indicatitng that same connection establishment attempt was detected on the outside!! interface. Please refer to log below or download the .doc file attached. I'll be glad to read your ideas about the issue.
User Experience Enhancements
As part of the Cisco Common User Experience program, we are working towards a more uniform user experience and terminology alignment. This program runs across all Cisco security products.
Early Access introduces a...
This video features a step by step walk through of configuring Cisco AnyConnect on FTD managed by FMC. Timestamps included for certificate installation, Access Control, Licensing, NAT, and Deployment failures.
I am trying to solve a CSR signing issue in a home lab.Can someone clarify this theoretical point? According to Wikipedia: "Before creating a CSR, the applicant first generates a key pair, keeping the private key secret. The...
Threat Response integrates with Cisco's Web Security Appliance (WSA) to provide visibility into web-bourne threats. By adding a Web Security or SMA Web module to Threat Response, investigators will be able to search for domains, URLs, and file hashes th...
I was helping some friends and they were trying to solve a scalable VPN issues, specially these days with the pandemic situation.
I recommended to implement ASA VPN Load-Balancing.
This will allow to keep 1 FQDN for all RA-VPN users an...