Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi Cisco Community -So I'm getting better at ASA's, but still have some items to work through. I have a customer who has requested an ACL policy to allow a few servers with different sub-interfaces to communicate with each other over specified ports....

Hi!I'm a student trying to factory reset a few Pix 515Es when I ran into a problem I couldn't solve with Google. I can't flash any .bin file without getting an error saying "Could not read image header from flash". Prior to this it could not find a f...

Resolved! Change SSH Version

I have 2 core switches, that are using ssh v1.5 and need to change it to V2 so that a monitoring tool can login, if I change the version during office hours, will I need to regenerate RSA keys etc? or will this be done on the fly?

Resolved! nat conversion

HiIm busy working through converting an 8.2 config to the new nat procedures.can someone clarify if my interpretation of this nat is correct please. 8.2nat (dmz) 0 10.1.1.0 255.255.255.0 8.4 upwardsobject network OBJ-10.1.1.0-24     subnet 10.1.1.0 2...

mickyq by Level 1
  • 653 Views
  • 4 replies
  • 0 Helpful votes

Is it possible to have an unused IP address on my ASA, which when it receives traffic flags the source as a bad actor for the whole device. It would work essentially like a spam trap for an email server, where anyone sending to that address clearly i...

Review Cisco Networking for a $25 gift card