Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

It seems to me, after a lot of testing, that regardless of ACLs and ICMP settings, you cannot ping a firewalled vlan interface on a FWSM through another interface.In other words, let's say I have a layer 3 switch connected via a trunk to the switch w...

Hi, I'm running ASA version 8.4(4)1 and have configured internet failover through the use of weighted default routes and tracking. This part works fine, but when I failover to ISP2 I can't connect out. The problem seems to be NAT, because when I fail...

Terry by Level 1
  • 609 Views
  • 1 replies
  • 0 Helpful votes

Hello Support,I would first like to thank all of you, as you always assist when I have any questions. All your help in the past has been much appreciated!The quesiton I have is currently we are running on one FWSM, that is having certain routing issu...

Hi  ,i have  purchased a new  firewall  and  ask the vendor  the part no---ASA5510-SEC-BUN-K9 .Which  has  3 fast ethernet and  2gig  ports   . How  to  identify  thoses ports  . Does  they  come  with  ethernet 0,1,2,3,4  or   Gig 0 and gig 1 then f...

I have an ASA5510 with 8.3 and a Cisco PIX525 (retiring). The ASA was for VPN traffic only while the PIX was for all other Internet traffic. I'm trying to move all the traffic to the ASA5510 so I used the PIX to ASA migration tool. I migrated the PIX...

mikef by Level 1
  • 499 Views
  • 1 replies
  • 0 Helpful votes

I have CISCO pix, verion 525, today while trying to save the config, I am getting below errorGPRS-PIX# wrBuilding configuration...No memory availableError executing command[FAILED]Can you please suggest what can ben the cuase?and what should do to fi...

Hello,I have several working VPNs between ASAs 8.4 and 8.3The way this was set up is with cryptomaps that match whole subnets and ACL on the outside interface to permit from/to the RFC 1918 addresses.I notice that the hit count is zero on these rules...

Review Cisco Networking for a $25 gift card