Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi,Here I need help from someone! I have a scenario where, one hub site which is connected to metro ether MAN at 1Gbps and spoke sites are variable bandwidths. Requirement is I should be able to shape down stream traffic branch-wise and in total at 1...

Hello, I was wondering, whether it is possible to create an Application Detector for HTTPs connections including SSLv2 Client Hello Requests. If not is there any alternative how to capture and eventually block those kind of events with FireSIGHT.   T...

Netmart by Level 3
  • 1248 Views
  • 2 replies
  • 0 Helpful votes

I am working on a big firewall migration project where each firewall has atleast 10K lines of ACLs, I need to export them into an excel spreadsheet and then get rid of the redundant ones. Then would need to configure them on the new firewall.   Since...

ring zer0 by Level 1
  • 539 Views
  • 1 replies
  • 0 Helpful votes

Dears, My IKEv2 tunnel is not coming up with the below settings , on my end I have a asa and the remote end is check point , I want to know the below is correct configuration or there should be some change,   crypto ipsec ikev2 ipsec-proposal AES256 ...

adamgibs7 by Level 6
  • 554 Views
  • 6 replies
  • 0 Helpful votes

I would be grateful if somebody could point me in the right direction.   On our ASA 5510 the management interface is set up as management only (Subnet 172.24.100.0/24).   The above subnet is also used as management access to our other firewalls.   We...

aspry by Level 1
  • 511 Views
  • 3 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card