Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hello all,This is a signature that detects a "CA BrightStor ARCserve Backup Listservcntrl ActiveX Overflow". As I understand it, this is a meta signature that fires when 6794/1 and 5477 both trigger. Alerts have showed up a couple times today, but t...

Has anyone been able to modify the look & feel of the Network User Authentication screen provided by the PIX/ASA when using the aaa authentication listener commands?It's located at: http://IP_Addr:port/netaccess/connstatus.htmlI'm aware that you can ...

Does the ASA allow you to use the aux port to access the console port on another device? I used to do this with IOS routers, but I can't find any docs to support this with the ASA. I'd like to be able to console a standby asa via the aux port the ...

tf2-conky by Level 1
  • 1066 Views
  • 1 replies
  • 0 Helpful votes

I have an ASA whose end of access list for a group doesnt showup the implicit deny ip any line.I believe this is by implicit built in, but it doesnt show up in config.Does this require to be added in manually at the end of acl & should it be appended...

suthomas1 by Level 6
  • 404 Views
  • 1 replies
  • 0 Helpful votes

Hi. I need access to webpage that have HTTPS on 8081 port. I make an access rule to permit this port outgoing but page dont work. How can say to PIX 515E 6.3(3) that protocol are https on non standard port.

I am upgrading my old Linksys router/access point at home from DD-WRT to an ASA5505. One of the nice features of DD-WRT on Linksys is that I was able to dynamically update my outside IP address to resolve to my <hostname.dyndns.org>. Does the ASA55...

kerryjcox by Level 1
  • 19764 Views
  • 9 replies
  • 0 Helpful votes

According to Cisco's bulletin, they do not have any signatures recommended to stop the Gumblar Bot Net. However, a client of ours, uses IBM's Proventia and they currently have a list of signatures they recommend to block.IBM: http://www.iss.net/thre...

solinal01 by Level 1
  • 1341 Views
  • 5 replies
  • 0 Helpful votes

I have a DMVPN setup and on the spoke router the tunnel interface is T0 and it's on FE0/0 where the ISP router is connected. The total bandwidth is 1.5Mbps.I have IP phone traffic on the VPN tunnel and I want to prioritize it. However the local inter...