Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Does anyone know if the issue detailed in the following article applies to the ASA? I'm currently running 8.0(4) and have some developers claiming issues and pointing their fingers at my firewall.http://blogs.telerik.com/hristodeshev/posts/07-06-24/f...

Hi,I have a business requirement spelled out below. I would like to know if this is achievable by using Cisco ASA 5520 Multiple Context.1. 2 different ISP - ISP1 & ISP22. Internally there are 2 ZONES - ZONE1 & ZONE23. ZONE1 to access internet via ISP...

Hello,I am studying for the IPS exam and I was reading about the "Resource Exhaustion attacks" that be accomplished thought a DoS attack and it mention the Stick and Snoot tool.I'd like to know more info about this and where can I get it for testing....

allanc16 by Level 1
  • 1586 Views
  • 1 replies
  • 0 Helpful votes

Hello. We've recently outsourced a large IT project to a very well known solutions provider. The infrastructure is being hosted at their facility, with about 40 servers, segregated into different security zones using an FWSM in a 6500 (our original d...

poulid by Level 1
  • 1214 Views
  • 3 replies
  • 0 Helpful votes

HelloHas anyone got a working procedure for changing the EXEC & privilege EXEC passwords on an ASA?I was thinking of logging on (using the old account), deleting the current details, applying the new account details - then, open a second ssh session ...

Hi Sir,I'm not sure about the features and terminology used in the ASA firewall. Can anyone give me a little help?Some capabilities of ASA 5520Maximum firewall connections - 280000 What does connection mean here?Does connection mean user connection o...

c.ong by Level 1
  • 739 Views
  • 1 replies
  • 0 Helpful votes

My penetration vendor reported this result:Exposure Description: Firewalls typically provide the function of effectively blocking TCP/IP ports to and from an Internet connection. IDS/IPS inspects traffic looking for malicious activity. Most firewalls...

Captog by Level 1
  • 614 Views
  • 1 replies
  • 0 Helpful votes

I have inserted a USB flash inside usb slot in ASA5520, but I can not access the usb. I know in the routers if I do "sh usb" I can see the content, but what is the command in ASA 5520 to access USB? I am running ASA 8.2(1)Thanks,

rdianat by Level 1
  • 4456 Views
  • 1 replies
  • 0 Helpful votes

Trying to find fix for Advisory ID: cisco-sa-20090908-tcp24. The only file in the main download area for Pix 535 is named pix804.bin dated Aug 4th 2009. There is another file that is pix804-28.bin released May 2009. Which file should I use? Will ...

Hi experts, wondering if there will be any issues running a IPSEC site-to-site VPN through virtual context in FWSM using IPSEC VPN SPA in 6500. The other end of the tunnel will be terminated on a PIX.Thanks!

t814687 by Level 1
  • 857 Views
  • 2 replies
  • 0 Helpful votes

I have a CSM server currtnely authenticating locally that I wish to change to authenticate against a Cisco ACS server.The ACS server has the schema loaded for CSM. And the apps are all registered (Via the CiscoWorks config panel on the CSM server).I ...