I am trying to forward a range of ports ex. 1024-2048 to (1) internal address using statics? Is there an easy way?
I am trying to forward a range of ports ex. 1024-2048 to (1) internal address using statics? Is there an easy way?
I am thinking of configuring an ASA as an Edge Device for+ Content Filtering with SmartFilter+ Inspecting Mail and General Traffic with the CSC Module+ terminate RA VPN (AES)+ and using the statefull firewall featuresWhat i am a bit concerned about i...
Hello,on a Cisco 836 CBAC is enabled on the inside Eth0 interface for incomming traffic. If on the outside interface BRI0 for ISP connection used all incomming ip traffic is blocked for returning traffic from initiated inside.Is CBAC working with dy...
Hi,I've recently upgraded my pix 525 from 6.3 to 7.2. Now I need to take a spare interface (ethernet4) enable this interface and create sub interfaces to use to communicate to my inside network by mapping to inside vlans.In 6.3, I would do the follow...
I am trying to set up static single (1) and range (2) port forwarding on PIX 506E device using the following commands; however it is not working. What am I missing?Single Port Forwarding 1. static (inside,outside) tcp 24.172.x.x 5631 192.168.1.215 5...
Hello-I am charged with configuring a PIX 515 (running v6.3.5) to allow inbound access to multiple web servers as well as FTP servers. My ip addressing is as follows:Outside- 12.x.x.x/28inside- 206.x.x.x/24All IP Addresses on the outside subnet are ...
Hi Guys,Picture the scene, customer has two ASA5510-BUN-K9. They do not have Security Plus license that is required for A/A HA.In order to enable this, is it simply a software upgrade or is another license required? Seems like a daft question but it'...
According to Bryan from Cisco System TAC:Step 1: Launch ASDMStep 2: Click on the Configuration button at the top of the pageStep 3: Click on the Security Policy button on the left.Step 4: Click on the Service Policy Rules TabStep 5: If you don't have...
Linux_FTP_Server---(DMZ)Pix(ExTERNAL)---Linux_FTP_clientPix is running version 7.2(2). DB has priority of 70. EXTERNAL has priority of 0.Pix DB interface IP is 10.102.160.19/28Pix EXTERNAL interface IP is 192.168.1.4/24Linux_FTP_Server is 10.102.16...
i need to config ipsec site-site vpn betweent cisco 3745 router and watchguard firebox700.after configuration, i check the phaseI between 3745 and firebox700 already setting up,C3745 gives log below:Feb 25 2007 08:25:29: %CRYPTO-6-IKMP_MODE_FAILURE: ...
Hello,Is it possible to configure the ASA5520 to support both easy and site-to-site VPN on the same outside interface!!!!incase your answer is YES.. how could we do it !!Regards,
Hello, I work with a software company. We currently have 160 user's. We have > Cisco 515e Firewall ( We dont have failover firewall ) Cisco 1841 Router 3 COM layer II switches 1 quantity of Cisco catalyst 3560 layer III switch 1 linux running proxy...
Hi,configured ASA for allowing ftp requests to my ftp server residing behind the ASA,problem is when a internet client is doing ftp to the ftp server, he can able to connect, but he can't able to transfer the files after few seconds i get a message d...
Hi,I am implementing ASA's with SSM modules and I wanted confirmation that they can inspect http and block embedded traffic such as Internet Radio from being tunnelled through HTTP.The Cisco documentation hints at this, but I would like confirmation....
Hi There,I have configured site-to-site VPN between PIX and Juniper FW; I am checking the VPN link status and it is showing as up when monitoring via ASDM, however I cannot ping or access to the remote site. I am already having 2 ACLs allowing traffi...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
| Subject | Author | Posted |
|---|---|---|
| 11-07-2025 02:11 AM | ||
| 11-03-2025 09:48 AM | ||
| 10-31-2025 12:20 AM | ||
| 10-30-2025 12:44 PM | ||
| 10-30-2025 09:18 AM |
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 2 | |
| 2 |