Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

For those who have to deal with STIGs, https://en.wikipedia.org/wiki/Security_Technical_Implementation_Guide, do any of you know if there's an automated check like SCAPE for Windows machines.I ran into some information on OVAL but that's pretty dated...

Hi,Is there a way to check the expiration date of the FDM's  DefaultWebCertificate before upgrading to higher code?  Thanks in advance.

GDS2023 by Level 1
  • 2442 Views
  • 8 replies
  • 0 Helpful votes

Question regarding what is specifically required to have a functional AMP for networks (module/application?) on FTD firewall utilizing the FMC.I know that it will need the malware and threat licenses for the specific firewall at a minimum, but is a l...

AFlack20 by Level 1
  • 2785 Views
  • 6 replies
  • 0 Helpful votes

Hi Setting up Policy set in ISE. Please see below screenshot. WHat is relation between Library and Dictionary? Iooks like both Library and Dictionary can be used to build Condition for authentication and authorization. Anyone can explain it? Thank yo...

1.PNG

HelloI would like to know best way to change ISP on a pair of asa ( active - standby).Currently, there are 14 public IPs on the ASA.By searching in the configuration txt file in :Outside interface, VPN, network objects, NAT, static route, crypto ca t...

abtt-39 by Level 1
  • 427 Views
  • 2 replies
  • 0 Helpful votes

Hello Community,I need your collective brains with a situation I'm trying to solve.I currently have a couple of hundred endpoints that I can remotely manage, these endpoints traverse through a firepower to reach the management system I manage them wi...

Review Cisco Networking for a $25 gift card