HelloPlease Clarify me,does the IPS stops Virus/Malware at the Edge,Like the ProxyAV or Fortinet or Even CSC-SSMThanks
HelloPlease Clarify me,does the IPS stops Virus/Malware at the Edge,Like the ProxyAV or Fortinet or Even CSC-SSMThanks
Hi All,I just had a Cisco ASA 5505 and I am trying to configure it with a inside and outside interface. The inside network will just have one web server but I am having problems getting http connections out/in from the web server as the implicit deny...
Hi,I have a new cisco ASA 5510 that i have to configure for the first time. After setting my terminal emulator for 9600 baud, 8 data bits, no parity, 1 stop bit, no flow control and connecting the appliance to my Pc with a console cable, i powered it...
All,I have the following configuration snippet on my Cisco 881W that I cant make heads or tails of:class-map type inspect match-any ccp-cls-insp-traffic match protocol cuseeme match protocol dns match protocol ftp match protocol h323 match protocol h...
Dears,Can I shutdown all unused ports at Cisco switches by Netconfig or other tool at Cisco Works managment too?I have 300 LAN switches and I need to block all unused ports automatically.Many thanks.
All,I'd like to create a simple IP NAT statement on my Cisco 837 router to allow any UDP 514 traffic from the outside, to enter my Dialer1 interface and hit my syslog server on the inside at private address 192.168.1.100.Can you help me create the ri...
I have the following scenario:We have two edge firewalls with Active/ Active setup connected directly to two core switches. New two IPS sensor s4260 are required to be connected inline between the firewalls and core switches. What is the best practic...
i have successfuly run the KT pass in AD. then as per the procedure i have sync the AD with CAS & CAM after that when i am going to start AD service Error : Could not start the SSO service. Please check the configuration. is comming. Neither i have f...
We just installed ASA Version 8.3(1) and I a little confused by the "System Resources Status". It shows my memory usage at 3902MB of 6000MB. My total memory is 2048MB under “Device Information” which is accurate. What is the 3902MB of 6000MB? The...
I am using Clean Access 4.7.2.If a user does not mett a requirement and is unable to remediate, he is stucked in the Temporary role.I checked the "Device Management > Clean Access y Reports" but this does not show any user with failed status with red...
I would like to deploy a HA-CAMbased on two 3995 servers. After I set up the HA configuration on both of the servers the primary CAM could no boot up anymore. The Grub failed to boot the Linux. It stucked in state "GRUB Loading stage1.5."What can cou...
Hello Everyone,I'm in the process of getting a PIX 525 (OS 8.04) setup. It has 6 ethernet interfaces. I have a DMZ (DMZ-IBM) that hosts our Lotus Domino Servers. I am using PAT for this scenario. Inbound mail is working fine, but I am unable to s...
himay be it is a basic question but can anyone let me know what is actually a security context means when it comes to firewall or ipskarthik
All I am tryin to setup a 1 to 1 NAT on an ASA, I am rather new to ASA's and need to get this setup for a client.. I am tryin to setup an IP phone with an external of 70.X.X.4 and want to route telnet and www to an internal of 10.130.0.10. Any hel...
I am in need of deleting one of the context of FWSM and it happens to be admin context of that FWSM. As we can not delete admin context, I am planning to make other context as 'admin context' first. Can this be possible by just using 'admin-context...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
Subject | Author | Posted |
---|---|---|
06-25-2025 04:32 PM | ||
06-25-2025 04:40 AM | ||
06-19-2025 07:32 AM | ||
06-17-2025 01:07 PM | ||
06-11-2025 07:59 AM |
User | Count |
---|---|
4 | |
3 | |
2 | |
1 | |
1 |