Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hello, We currently get all of our logging needs with our ASAs by using "logging host" command to send all firewall traffic to an event collector where we can search and correlate traffic events. I'm working to determine if there's any advantage to ...

Hi, I have a doubt about the ipsec site to site vpn. When I tried to ping peer ip , i can not able to ping. Is it essential that peer ip should be pingable for vpn tunnel to come up. Or else without ping whether vpn tunnel will come up. Please clarif...

Hello. I have a network with 2 PCs , an email server, ftp server, and web server. I am trying to configure the firewall of the email server such that PC1 can access it while PC2 cannot. For the ftp server's firewall its vice versa, PC2 can access it,...

7oda95 by Level 1
  • 7892 Views
  • 1 replies
  • 0 Helpful votes

Dears, To have a recommended security configuration on cisco switches and routers and firewalls which will be approved by a security auditor  organization , i want to know the security type of attacks  and their mitigation on cisco switches, routers ...

I'm stuck! I need to get to an IP address on the other side of my Cisco ASA5555-X running 9.5. Here's the important info (IPs obfuscated for obvious reasons): Source IP can be anythingDestination IP for clients is 10.92.200.1 (int-map)NAT'ed to 66.77...

handsy by Level 1
  • 801 Views
  • 3 replies
  • 0 Helpful votes

Is there a method to notify administrators about disk usage on the appliance?  I see the data pruning notification, but that appears to apply to data connections exceeded.  What I am looking for is a notification that the disk is >80% full.  I also a...

Hi, I have a case that a potential positive injection using API related coding was passing through our IPS, and no intrusion event was seen on Intrusion event. I check the documentation and found out that snort combines signature, protocol and anoma...