Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

client (requests dhcp request)----outside int(192.168.10.1/24) ASA  inside int(10.1.0.186/24)---dhcp server(10.1.0.2/24)I have a client connected on the outside interface(ip 192.168.10.1) that requires an ip address from an inside dhcp server(10.1.0....

Hello,Is it possible to turn on and dictate the length of packet decodes on the sensor?For example I do not get a decode for invalid netbios name(3357), but do for Windows Image color Management (6984).exmaple:  context:       fromAttacker: 000000  0...

markidotw by Level 1
  • 811 Views
  • 2 replies
  • 0 Helpful votes

Hello I have  3 sites and Core sites , i want to ask which better place in each site Firewall blade on 6509 switch or place central Firewall on the core sitesand applay the police on all site on this firewall .i want choose the best practical design ...

If  a host on 192.168.1.x, the inside interface tries to ping a host on 192.168.10.x (a network behind a router which is connected 6.1)The ASA returns:Jan 23 2010 10:17:58: %ASA-3-305006: portmap translation creation failed for icmp src inside:192.16...

spollock by Level 1
  • 8754 Views
  • 4 replies
  • 0 Helpful votes

Resolved! ACL's and ACEs

Is it possible to remove an ACE that is encompassed by an ACL?exp:  access-list vlan1000 line 1 extended permit ip object-group X object-group Yobject-group network X  network-object 10.10.10.0 255.255.255.0object-group network Y network-object 192.1...

Dear AllWe have FWSM in our orgnization. I have a firewall analyzer for analyzing the FWSM logs.The Firewall Analyzer is giving me these attacks:arp poisioning    arp    05 Dec 2009, 19:46:53    -    %fwsm-4-405001: received arp request collision fro...

When a linux system boots, the 'root' processes typically attempts to mount network drives via NFS, prior to any user login on the system. In NAC, is it sufficient to add in the User Roles->Traffic Control->Unathenticated Role allowing TCP/UDP ports ...

degriffin by Level 1
  • 817 Views
  • 1 replies
  • 0 Helpful votes

I have the following components, ISA Server, two standalone PIX firewalls, two internet routers (800 series)Currently only one router is being used for internet access.We now have a second internet DSL connection and want to use one connection for ex...

vergeerf by Level 1
  • 1198 Views
  • 4 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card