Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

I have a customer whom is currently using TACACS to authenticate incoming Admin session requests to the ASA appliance. Currently is uses TACACS and prompts for a username and password when you SSH to the box. Once authenticated, and then to enter p...

Hi,we have a IDS 4215 boxs which is running with 5.1(8)E3S407V1.4 code.we have to monitor the event logs frequently and give an update to the client with the recomendations.As i am new this technology, i am not able to track the event logs properly, ...

Hi,i am having some issue while configuring PIX firewall in my network.Please find the network digram for your refernce abt the setup.As per diagram i am able to reach the firewall using inside interface ip address from remote end Lan.but there is no...

Hi,What if we need to get in rule to permit certain site on ASA with the sites domain name & not based on IP. Can this be done by just putting in the site name"www.abc.com" or is there any other way.Please help.Thanks.

suthomas1 by Level 6
  • 1283 Views
  • 4 replies
  • 0 Helpful votes

My goal is to reduce traffic loads and save some money.Now I am exporting Netflow to AdventNet Netflow Analyzer - it is helping me to understand what traffic is passing through router. It gives a lot of useful information. But, I still have a lot of ...

I am looking for feed back from the community on the ASA 8.2(1) code I am looking to upgrade to mitigate a vulnerability but I don't want to introduce any issues especially since I am running a phone proxy configuration. If you have experience with ...

Review Cisco Networking for a $25 gift card