Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

I have an ASA 5510 with factory default configuration and CLI access.I am trying to connect using ASDM from MACBook using different browsers, also from Win8, I have ASDM Launcher downloaded and try with Java applet. ASDM Launcher asks for IP/user/pas...

HI all, Im trying to connect the Pix515 with Mikrotik via IPsec vpn, but I is not even doing the Phase 1. This is the link Im using as reference.http://wiki.mikrotik.com/wiki/MikroTik_router_to_CISCO_PIX_Firewall_IPSECThanks all. 

Resolved! ASA 5505 ASDM 7.4

I recently upgraded my ASA to version 8.2(5) 55 and in addition moved to ASDM 7.4(1). When I launch the new ASDM it gets stuck at 87% when validating running configuration. I've verified that this ASA firmware version is compatible with ASDM 7.4 and ...

Resolved! ASA - NAT issue

Hello,   I try to configure my ASA firewall to redirect http port from outside (outside-OVH) to inside (vlan1).   Please find here the following configuration: object network NAT-SERVEUR-HTTP-IN nat (VLAN1,outside-OVH) static interface service tcp...

how to allow some fixed extension go in from outside to inside but not allow go from inside to outsidefor example, allow JPEG, MOV, AVI data flow from outside to insidebut not allow JPEG, MOV, AVI files access or upload or get by outside, in another ...

Maivoko by Level 1
  • 1122 Views
  • 7 replies
  • 0 Helpful votes

Our Security Team is Reporting vulnerability related to SSH Weak MAC Algorithms Enabled for one of my WS-C3750G-24TS-1U switch.As far as i know user will send the required negotiation cipher to access the device and device is just accepting it.Also i...

Manish221 by Level 1
  • 5915 Views
  • 2 replies
  • 0 Helpful votes

If deep packet inspection "sees" personal identifying information in a packet(SS#, Bank account information, etc.), does it log the information in clear text, does it replace with other characters, does it remove it form the log?  Thanks in advance.

Hi!I would like know about the Firewall Device selection. We are mid-sized business with 5 Servers and 15 Switches network. We are planning to have a web server/database server in house. I need guidance to choose a firewall device that can protect ou...