Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi,I am faccing the following problem.When I ping the inside interface IP the following result ,please help me to resolve the issue.Reply from 10.1.1.100: bytes=32 time<1ms TTL=255Reply from 10.1.1.100: bytes=32 time<1ms TTL=255Reply from 10.1.1.100:...

Lavanholy by Level 1
  • 421 Views
  • 2 replies
  • 0 Helpful votes

I'm looking for a way to monitor the number of site to site vpn tunnels on an ASA5510. There is an OID for the global number of IPSec tunnels but that includes the remote access tunnels, which I don't really care about those dropping.Anyone know of ...

I have an ASA 5510 set up with dynamic VPN from the Internet and have a working config to give VPN users access to the Internet through the tunnel while using VPN. I need to do a second dynamic VPN from the DMZ interface with access to the internal...

rtyktor by Level 1
  • 356 Views
  • 1 replies
  • 0 Helpful votes

Today, in the newest versions of IOS, the guest vlan is just for devices that don't speak EAP. With this user of Windows XP, for example, they don't enter in Guest VLAN (because Windows XP speak EAP!!). How do I do for the users guest be addressed fo...

My company recently purchased 35 ASA 5500 series device to replace Sonicwall FireWalls. To make the Cisco deployment a painless one, I have decided to install a 5520 in parallel with the sonicwall at the corporate office. The cisco will be given th...

I have one PIX 501 whose configuration am trying to copy to TFTP before upgrading the activation key to allow for VPN-3DES, however, i find that i cant runcopy flash tftpand the only available commands are "copy capture: <capture-name> tftp:"How does...

zeu7 by Level 1
  • 3140 Views
  • 2 replies
  • 0 Helpful votes

According to CISCO doc, the signatures can be classified as exploit, connection and string-based.Are the exploit signatures based on known vulnerabilities or exploit pattern, or both?After tuning alerts on the relevant contexts, would manually matchi...

mai2mai2m by Level 1
  • 681 Views
  • 2 replies
  • 0 Helpful votes

Hello, I'm interested in slicing up a 5550 into about 100 virtualized dedicated firewalls for customers. Has anyone done a config similar to this? I'm looking to provide basic fw functionality.-Regards

by Not applicable
  • 642 Views
  • 3 replies
  • 0 Helpful votes

I try to configure active/standby with ASA5520 Version 8.0(2). In configuration guide I read: The if_name argument assigns a name to the interface specified by the phy_if argument. The phy_if argument can be the physical port name, such as Ethernet1,...

isk-admin by Level 1
  • 640 Views
  • 3 replies
  • 0 Helpful votes

The following command snmp-server host 1.1.1.1 means that it will send the traps to NMS 1.1.1.1 only Should i use the following too for more securityaccess-list 50 permit 1.1.1.1 access-list 50 deny any log snmp-server community CISCORO RO 50

Review Cisco Networking for a $25 gift card