Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi Friends,I have installed CSM 3.1.1 and planning to upgrade to 3.2.0I have not added any devices in CSM 3.1.1 and its a fresh installation. Can I directly upgrade from 3.1.1 to 3.2.0 and can I use the same license? Any issues while upgrading?I have...

I'm unable to authenticate the Guest Client in the RADIUS of NAC Guest Server. The NAC is configured in the AAA Servers of the Guest SSID, in the WLC4402 and the controller as client in the NAC Guest Srv.The Allow Override is Enabled.NAC Guest Server...

raires73 by Level 1
  • 1743 Views
  • 5 replies
  • 0 Helpful votes

Hello,user connecting with the VPN Client to my ASA 5510 could access ressources in the internal Network 192.168.115.0.But there is no access through the ipsec tunnel to the DMZ Network 192.168.116.0.VPN clients get Addresses from 192.168.113.0.There...

Hi, I am using ASA 5505 in the production and three Site to SIte Tunnel are connected with FW. The ASA 5505 CPU and RAM utilisation is getting to high. CPU is on 77 % and RAM is on 200 MB. I execute sh processed command and the details is attached. P...

I have a question about ASA and FWSM capabilities.The thing is like this.When I have an ASA or a FWSM configured with contexts. They can do tunnels of IPSEC (L2L or remote)?There is any limitation?Can some one help me?Thanks in advance, Rui

rcapao by Level 1
  • 558 Views
  • 3 replies
  • 0 Helpful votes

I tried adding a distribute list command under the EIGRP routing process on an ASA, as I've done with routers before, that prevents the default route 0.0.0.0 0.0.0.0 from being propagated to EIGRP neighbors. Except, it seems with the ASA, that inste...

Hi,Im putting the command bellow at my 5440 ASA:static (DMZ,LAN) tcp 172.16.16.1 50005 192.168.1.10 www netmask 255.255.255.255and the firewall is forwarding all traffic to 172.16.16.1 on port 50005 for the server 192.168.1.10 on port 80. All right. ...