Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hello Guys,Is there any advantage using ASA transparent multi context mode vs using routed multicointext mode. Except avoiding the ip addressing re design and ease of inserting the firewall inside the existing network I do notice that there are few l...

sgjr82841 by Level 1
  • 3679 Views
  • 3 replies
  • 0 Helpful votes

Hi Experts,I am going to implement Syslog server in my environment.. how can we check any attack pattern in that logs???One more doubt... do i need to configure in the severity-level???? which is the best??? is there any problem happen if i give debu...

vipinrajrc by Level 3
  • 1847 Views
  • 13 replies
  • 0 Helpful votes

Hi All,I have a cisco catalyst 2801 and a cisco catalyst 3750. I want to have a monitoring of the performance of this network devices especially the cisco 2801 as well as to have graph of its bandwidth utilization and which ip address is eating the m...

hello support,I have configured here remote access VPN, for accessing INSIDE server to remote access purpose.I had try to connect server through cisco VPN client but its show us in LOG i.e build inbound connection for outside x.x.x.x to INSIDE y.y.y....

Hello,we observe a very strange issue with FWSM blades (hardware WS-SVC-FWM-1, software versions 3.2(2) later upgdaded to 4.1(3)) on 6509 boxes ( IOS s72033-ipservicesk9-mz.122-33.SXI3).FWSMs abrupt stop forward traffic from some (NOT ALL) DMZ interf...

Review Cisco Networking for a $25 gift card