Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Resolved! IDSM-2 data-ports

Hi,I have taken over managing a 6500 IDSM-2 implementation, as far as I can see it has been configured in Promiscuous  Mode with a single virtual sensor assigned to both data ports 0/7 & 0/8.The switch has been configured with the following commands:...

Can anyone provide me soln for the belowMy goal is to create an ipsec tunnel between my pix and fortigate(other vendor)I am facing a lot of issuesSite A network looks like this---10.41.x.x/16---switch(192.168.1.1/30)----(192.168.1.2)pix--122.x.x.x---...

pramod by Level 1
  • 524 Views
  • 2 replies
  • 0 Helpful votes

I am having trouble with Sun Unix NFS and NIS between two servers, one that is outside the firewall (192.168.20.1) and the NFS/NIS server (192.168.10.1) that is inside.  Even though I have NFS selected as an allowed protocol, it appears that we get f...

sdniel by Level 1
  • 1144 Views
  • 0 replies
  • 0 Helpful votes

I got complained from my ISP that our system is being used for conducting scanning/hacking NT knownexploits, port scanning and/or spidering of another network and the ip they mentioned is our asa5510 ip. This is what they told us to do Please investi...

lawsuites by Level 1
  • 1268 Views
  • 8 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card