Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi all, in our network we have a Cisco ASA 5510, 256 MB RAM, running on ios verison 8.2(5)48. The problem that started around 10 days ago includes exceptionally high memory usage (around 85-87% which is a considarable spike as before it was no more t...

ovic by Level 1
  • 10880 Views
  • 5 replies
  • 0 Helpful votes

I am looking right now at dedicated ssl decryption appliances that will allow me to decrypt ssl stream and feed into a number of systems. Mainly a Cisco ASA with firepower module and a dedicated ips. I am running into a problem as to how to feed the...

Hello, We currently get all of our logging needs with our ASAs by using "logging host" command to send all firewall traffic to an event collector where we can search and correlate traffic events. I'm working to determine if there's any advantage to ...

Hi, I have a doubt about the ipsec site to site vpn. When I tried to ping peer ip , i can not able to ping. Is it essential that peer ip should be pingable for vpn tunnel to come up. Or else without ping whether vpn tunnel will come up. Please clarif...

Hello. I have a network with 2 PCs , an email server, ftp server, and web server. I am trying to configure the firewall of the email server such that PC1 can access it while PC2 cannot. For the ftp server's firewall its vice versa, PC2 can access it,...

7oda95 by Level 1
  • 8002 Views
  • 1 replies
  • 0 Helpful votes

Dears, To have a recommended security configuration on cisco switches and routers and firewalls which will be approved by a security auditor  organization , i want to know the security type of attacks  and their mitigation on cisco switches, routers ...