Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

I have a 4240 that is physically sitting in between my edge router and my ASA - One interface is connected to router and the other is connected to ASA. I have confiured Inline Interface pair. My question is to manage 4240, what option do I have? I...

peterhkim by Level 2
  • 990 Views
  • 2 replies
  • 0 Helpful votes

I'm having trouble loading a digital certificate on an ASA 5520 running 8.0(4). The CA is a Fedora Dogtag Certificate System with a very simple PKI scheme running (O=CM TEST). All of this is running on an isolated test network in a lab setting.I'm ...

smdavi2 by Community Member
  • 4212 Views
  • 4 replies
  • 0 Helpful votes

Hi, I am trying to perform a downgrade of PIX515E from version 7.2(2) to 7.0(4). I have found some info from the link http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00804708d8.shtml#t6. The procedure shows downgrade of ...

essilorasia by Community Member
  • 1128 Views
  • 3 replies
  • 0 Helpful votes

Experts: We have ASA 5505 model using into all production sites and as you all know that ASA 5505 model doesn't have included IPS solution. Now is there any other way we use this services by software basis. Please Advice. Thanks

ray_stone by Level 7
  • 446 Views
  • 1 replies
  • 0 Helpful votes

Hi guys, I own a pair of Cisco ASA 5510 running version 8.x of PIX-OS in an Active/Passive failover setup, configured as router on a stick with redundant interfaces. 

shield1(config)# sh int outside 
Interface Redundant1.100 "outside", is up, ...

e s by Community Member
  • 1187 Views
  • 4 replies
  • 0 Helpful votes

And some one said, "Considering that everyone on the internet has access to the VPN, and if an L2TP user id is compromised, is there any chance we could restrict the access? "I know this is silly question, but i am confused myself. Our partner's have...

We have an IDSM-2 installation on 6500 switch. There is an ATM switch resides inside the data center. The branch ATMs having encrypted tunnel up to the ATM switch via IDSM-2 ( in-line mode).1. How does the IDSM-2 will analyze this traffic ?2. Is ther...

Hello all My ISP provide me with 2 links for redundancy and load balancing purposes. The subnet is broken in two parts, let's say 10.0.0.0/25 and 10.0.0.128/25. From Internet side each subnet is announced using BGP to ISP routers GW1 and GW2. Each r...

Richard--92 by Community Member
  • 995 Views
  • 4 replies
  • 0 Helpful votes

I just configured a new ASA 5520 running 8.0(4) with a fairly simple setup. For several weeks the only usage for it was B2B http requests going from Gi0/1 to Gi0/2. Fairly low bandwidth, around 150Kb/s. Never a problem. Yesterday I created on Gi0/0...

Richard--92 by Community Member
  • 801 Views
  • 1 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card