Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

I just upgraded to ASA version 8.2(4) on an ASA5520 and ASDM version 6.4(1).After the upgrade, when I go to the Firewall Dashboard and look at the Top 10 Access Rules I now see half of the rules showing up with Source and Dest fields with the message...

dguse by Level 1
  • 2493 Views
  • 1 replies
  • 0 Helpful votes

I'm currently running 3.3, and have been migrated from a Windows 2000 server to a Windows 2003 (SP2) VM.  The install of 3.3 went fine, but I cannot add user accounts... the screen just hangs every time I try.I thought I'd bump up to 4.0, but all I c...

Hello Guys,Is there any advantage using ASA transparent multi context mode vs using routed multicointext mode. Except avoiding the ip addressing re design and ease of inserting the firewall inside the existing network I do notice that there are few l...

sgjr82841 by Level 1
  • 3624 Views
  • 3 replies
  • 0 Helpful votes

Hi Experts,I am going to implement Syslog server in my environment.. how can we check any attack pattern in that logs???One more doubt... do i need to configure in the severity-level???? which is the best??? is there any problem happen if i give debu...

vipinrajrc by Level 3
  • 1689 Views
  • 13 replies
  • 0 Helpful votes

Hi All,I have a cisco catalyst 2801 and a cisco catalyst 3750. I want to have a monitoring of the performance of this network devices especially the cisco 2801 as well as to have graph of its bandwidth utilization and which ip address is eating the m...

hello support,I have configured here remote access VPN, for accessing INSIDE server to remote access purpose.I had try to connect server through cisco VPN client but its show us in LOG i.e build inbound connection for outside x.x.x.x to INSIDE y.y.y....