my cw does not find end hosts conencted to my switches. Aquisition works only for some ov them. From where to start debuging process? I am using LMS 3.2thanks
my cw does not find end hosts conencted to my switches. Aquisition works only for some ov them. From where to start debuging process? I am using LMS 3.2thanks
Can i deploy L-CWLMS-4.0-SBE for multi site with centerlized management at main site? i have 3 sites (main site(23 device), DR site(11 device) & out of countray site(7 devices)) this version is supporting up to 50 device, but i dont know if it ha...
Anyone can share the ASA Ordering Guide as stated inhttp://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns1049/guide_c07-628630.pdf"Cisco ASA 5500 Series Adaptive Security Appliance Ordering Guide, available from your Cisco accountmanager"
Hello,I recently upgraded my pix 515 to a new version, stupidly enough I forgot to copy the current activation key and therefore lost some functionality such as support for the 4 port extra nic.So then I went to cisco.com and registered for a new key...
I have the following policy below for smtp which has been in place onsite for about a week in a new installation and email has been flowing just fine. Then all of a sudden we get a user who cannot contact a certain email address.We test from other lo...
Hello,We have a situation where we are comissioning a DR site. We have three tunnel interfaces for our three remote sites and a loopback interface for crypto maps at the headoffice on a ciso 3845.the config is as followed.As per my initial analysis l...
Is it possible to configure the IPS module to meet PCI DSS requirements for sections 6.5 and 6.6, along with the top 10 OWASP?
I manage an ASA 5520 with an ASA-SSM module at our university. The ASA-SSM-10 works well in detecting P2P traffic. When P2P is detected, the firewall is configured to deny the attacker Internet access for 1 hour. The "attacker" in our case would ...
Hi,I have configured IDSM-2 in Promiscuous mode using VACLs. I have verified the configuration which is correct, IDSM-2 is capturing all the traffic from specified vlans. Issue is that when I want to block any website let suppose "facebook" for any p...
I'd like to know what the experts advise on reboot intervals for busy 5505s. I mean, even the best garbage collection routines are eventually challenged and memory is never perfectly consoliatded like it is after a reboot.I have a client with 5505 wh...
I recently had a client who admitted to not knowing what he was doing, and, with sufficient access to use some external snmp polling process against his 5510, managed to peg the cpu sufficiently such that we could not asdm to it, only ssh. And, in th...
Hello all. Everytime I try to ssh to my ASA inside interface (12.12.7.36) from 10.10.2.3. I get the following error in my logs. how can I get rid of this?Deny IP spoof from (12.12.7.36) to 10.10.2.3 on interface inside.
Hi,Looking for some advice on Implementing NAC across the enterprise. The environment uses laptops, desktops and thin-clients (Vmware VIEW, VDI) which connect to ESX servers where the actual machines reside (running Windows 7 and Windows XP operating...
Hello,I have purchased CISCO ASA 5510 for Clientless VPN use. This device will be behind Watchguard appliance.Please provide or point how to configure.Thanks,Krishna
HelloHow to overcome "Denial of DOS Attack" on ASA 5510, any recommendations or best practisesConsidering the public ip is not same all the time.thanksSaquib
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
Subject | Author | Posted |
---|---|---|
01-18-2025 06:26 PM | ||
01-17-2025 03:45 AM | ||
01-13-2025 06:17 AM | ||
01-09-2025 02:42 PM | ||
12-12-2024 01:58 AM |
User | Count |
---|---|
7 | |
4 | |
3 | |
2 | |
1 |