Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Is it possible to use the SHA2 signature algorithm when generating a self-signed certificate on an ASA? I can't seem to find any documentation showing commands that have control of things like the signature algorithm when using self-signed certificat...

Hi. I was wondering how I can go about routing traffic from 1 VPN tunnel to another. For example: Site A Subnet: 10.1.1.10 Site B Subnet: 10.1.1.20 Site C Subnet: 10.1.1.30 If I have point A as my main middle location, and point B and C as my ...

Hello everyone, Our company uses two Cat 6509 chassis in VSS mode each having it’s own FWSM-2 module. Recently one of these modules failed and we sent it to a non-official hardware repair company to be repaired. This module had 100 virtual context li...

Hi All,I have recently set-up a redundant link on our ASA, part of the config below:interface GigabitEthernet0/0 (Primary ISP) nameif outside security-level 0 ip address A.A.A.A 255.255.255.240 standby x.x.x.x!interface GigabitEthernet0/1 nameif insi...

szczyrk80 by Level 1
  • 638 Views
  • 3 replies
  • 0 Helpful votes

Hello Team,We are in building of the new Cisco ASA 5585 Firewall cluster and racked both the devices there is some issue in Primary Firewall device hence as of now we need to configure the secondary device. Once Primary device received we need to add...

Hello, This is my first post, so i applogise in advance if this is a stupid question. The managment at my company want me to set up a blacklist on out external facing ASA 5540. I set up a network object group the explictly denies any incomming traff...

Review Cisco Networking for a $25 gift card