Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Resolved! ASA - NAT issue

Hello,   I try to configure my ASA firewall to redirect http port from outside (outside-OVH) to inside (vlan1).   Please find here the following configuration: object network NAT-SERVEUR-HTTP-IN nat (VLAN1,outside-OVH) static interface service tcp...

how to allow some fixed extension go in from outside to inside but not allow go from inside to outsidefor example, allow JPEG, MOV, AVI data flow from outside to insidebut not allow JPEG, MOV, AVI files access or upload or get by outside, in another ...

Maivoko by Level 1
  • 1221 Views
  • 7 replies
  • 0 Helpful votes

Our Security Team is Reporting vulnerability related to SSH Weak MAC Algorithms Enabled for one of my WS-C3750G-24TS-1U switch.As far as i know user will send the required negotiation cipher to access the device and device is just accepting it.Also i...

Manish221 by Level 1
  • 6057 Views
  • 2 replies
  • 0 Helpful votes

If deep packet inspection "sees" personal identifying information in a packet(SS#, Bank account information, etc.), does it log the information in clear text, does it replace with other characters, does it remove it form the log?  Thanks in advance.

Hi!I would like know about the Firewall Device selection. We are mid-sized business with 5 Servers and 15 Switches network. We are planning to have a web server/database server in house. I need guidance to choose a firewall device that can protect ou...

Currently practicing configuring ACLS on packet tracer and I am having trouble doing so. My scenario is that i have 3 vlans  VLAN 10 sales Vlan 20 management Vlan 30 admin. I want to only permit vlan 30 to only have the access to the server and to de...