Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi Everyone, I've been given a curious problem to solve and I'm completely stuck.. We have 2 sets of firewalls, set up as pairs to load balance incoming Anyconnect VPNs. On the primary Firewall in each pair the clients connect ok and send/receive tra...

I'm sure Firepower is spectacular, and as a non-certified professional, the FMC appears to be the evolution of ASDM (and hopefully not reliant on Java!). As I understand, and correct me if I'm wrong, Firepower is an IOS, but with the ability to subsc...

CAR IT by Level 1
  • 2741 Views
  • 3 replies
  • 0 Helpful votes

It is my understanding that in a HA pair of ASAs the interface MAC addresses used are taken from the primary unit.  How/where does the secondary unit store these MAC addresses if it becomes the Active unit of the pair? In the event of a Primary unit ...

GRANT3779 by Spotlight
  • 2414 Views
  • 3 replies
  • 0 Helpful votes

Dear All,   I have a doubt on working with timeouts and state table.   Below is the Same output   ASA# show conn protocol tcp101 in use, 5589 most usedTCP outside 10.23.232.59:5223 inside 192.168.1.3:52419, idle 0:00:11, bytes 0, flags saATCP outside...

Hi All,   What would be the easiest way to refine/analyze traffic in a ACL "permit IP x x". We want to know what kind of traffic actually is within this ACL. The ACL gets about 1000 hits a day.   I've already setup NetFlow but i'm seeing more data th...

Review Cisco Networking for a $25 gift card