Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Clients on our LAN access websites using web proxy servers. One website (that is accessible from other LANs) does not work either through the proxy or directly.I can see conns (state table entries) between the clients and the site but no I flag to sh...

plwalsh by Level 1
  • 539 Views
  • 3 replies
  • 0 Helpful votes

I have some users behind my FWSM who want to be able to initiate VPN using the Cisco VPN client to external locations.UDP and TCP are allowed outbound, and the FWSM obviously handles the return traffic. So the IKE tunnel establishes OK and authentic...

Hi,Have this issue that I need help with...I have 2 525Pix's running 6.3(5) in failover...The primary runs at a constant 60%-100% CPU usage and my inside and outside interfaces are running packet errors...When show proc the only process' that is high...

marius_vt by Level 1
  • 760 Views
  • 2 replies
  • 0 Helpful votes

We have a pair of redundant 515e firewalls. A couple months ago users started complaining of slow performace between network segments. The common denominator seems to be segments seperated by the PIX's. We also discovered if we try to FTP files fr...

I have a pix 501 and am needing to do some port forwarding. I have a DVR (being used for security cameras) it has an internal IP address of 192.168.1.150 I need to have port forwarding setup for 3000 - 3007 and 8800Is it possible to do this through...

scramer13 by Level 1
  • 450 Views
  • 1 replies
  • 0 Helpful votes

Hello,Is it possible for a host attached to interface A of a cisco ASA to build a connection to inteface B of the same ASA?If so how?I would like a laptop computer to be able to VPN to the external interface of an ASA firewall regardless of whether i...

aa by Level 1
  • 458 Views
  • 2 replies
  • 0 Helpful votes

I have a client who does not want to stop users from installing applications but wants to protect against trojan/worms/rootkit etc.It would seem these two competing philosophies would not be easily inmplemented within CSA.Is there a base rule module ...

jmutuski by Level 1
  • 412 Views
  • 1 replies
  • 0 Helpful votes

We tried turning on the VA capabilities of MARS and it appears that they were crashing a number of services on a number of servers.Where can I get a log of what was scanned, what type of scan was performed, and when it was performed?Also how can I se...

slug420 by Level 1
  • 475 Views
  • 1 replies
  • 0 Helpful votes

New to the ASA series. I am installing a 5505 later today. Company has two buildings connected via fiber. ASA will go behind the router and into a switch connecting the two. Main goal is to protect an iSeries webserver on their internal network. ...

Review Cisco Networking for a $25 gift card