Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi AllI Wondering if any ones has complete block traffic with encrypted Torrents.When torrents is not encrypted NBAR is recognizes torrents traffic and is easy to block them , in other way when the client torrent (like utorrent) is enabled the encryp...

tsoukalis by Level 1
  • 1178 Views
  • 1 replies
  • 0 Helpful votes

I have been looking at spke to spoke comms or "hairpining" for months and have posted on numerouse forums but to no avail.I have a Hub and spoke network where the HUB is an ASA Firewall version 8.2I basicaly want to allow 2 spokes to be able to commu...

VRAI by Level 1
  • 2860 Views
  • 16 replies
  • 0 Helpful votes

Please clarify for me the exact meaning of In-band and Out-Of-Band as it applies to CAS/CAM to get a user authenticated/validated; specifically mentioning the relevance of "trusted network", "untrusted network", "'virtual gateway" etc. so I can get a...

Hi,One of our customers webserver is hosted with us and its behind the ASA & IPS with standard IPS configuration. I have also enabled some signatures related to IIS n DDOS. The website is constantly under DDOS attack from various IP addresses, each s...

aijaz802 by Level 1
  • 2972 Views
  • 5 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card