Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Dear All, I need some help related to cisco pix 515e. I need to create a inter vlan and want to make network segment. right now i have flat admin network and i need to make a new vlan name CDE (credit card data environment) and will move some workst...

Hi I am performing the installation for Cisco FMC in Esxi server. I am downloading the files from cisco.com extracting the files for ovf extension. When I select the OVF file in EsXi installation , it is throwing an error of " Integrity of File is n...

Hi, As guide of FMC 6, the limit of events is 10 milion (on Virtual Management Center) of rows, so when this limit is reached FMC start the pruning of database, and clear the older rows. Is there anyway to increase this limit? TKs

Hi Guys, Good day! Just needs some confirmation how to read bugs version to version in Cisco ASA using the bug search tool. I am having a health check in my ASA and I want to know the open bugs from 8.4(2) up to 9.1(7). Do this mean that I need to se...

I've been working with Cisco gear for 20 + years and never before has the lineup been so confusing. I'm working out the specs on a new customer project and I'm trying to choose a firewall.  Can someone please explain how the regular ASAs differ from ...

codewize by Level 1
  • 1674 Views
  • 4 replies
  • 0 Helpful votes

Hi, We have a security event that says that a trojan has tried to make a outbound connection attempt. What confuses me is that the source is an external IP-address and the source is our IP-address. If its an outbound attempt then the traffic should b...