Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi friends,Just wanted to know basically if a requirement is supported in the FWSM or not. There is a FWSM 3.1 blade on the 6500. The main intention of purchasing it was to protect traffic to and from Server VLAN's. There are totally about 12-13 serv...

gautamzone by Level 1
  • 1696 Views
  • 16 replies
  • 0 Helpful votes

Hi,We are planning on putting Active/Standby pairs of ASA CSC bundles at three of our sites. We would also like to use these pairs as SSL head end devices.The question is whether we really need to purchase two sets of SSL licenses (and for that matte...

I have worked on PIX's for years and still have a hard as hell time understanding ACL's on a pix, specifically the direction to apply and how they are inspected.If you read the books it always says inbound acl's are used to go from a lower to higher ...

boshardy1 by Level 1
  • 904 Views
  • 4 replies
  • 0 Helpful votes

Hi all, I use Catalyst 6513 (Router IOS) + IDSM-2 and use Cisco VMS 2.3 to manage IDSM-2. I upgrade IDSM-2 from version 4 to version 5. However, after updating completely, I use Cisco VMS 2.3 to query to IDSM-2, I see a error: "status: Error importin...

mylove142 by Level 1
  • 1147 Views
  • 14 replies
  • 0 Helpful votes

Hello all,I have an ASA5510 running 7.2 and asdm 5.2.I am trying to setup a Web server on the DMZ. I need it to be able to communicate with an internal mail server. I followed the example in the getting started guide, but am running into a problem....

Hi,I am after deploying an IDSM on a 6500 SW which already has FWSM module. I want to monitor VLANs which are already protected by the FWSM; so I have some questions:1- How would I be able to span or configure VACL for VLANs which are behind the FWSM...

I would like my IDSM-2 to run in a Promiscuous Mode ( and not INLINE mode)How can i configure it so that it works on the - " Block Nothing,Monitor Everything" principle.I need the blade to "Never" block the upstream devices like routers and Firewall...

rpsrekhi3 by Level 1
  • 617 Views
  • 1 replies
  • 0 Helpful votes

I'm looking into configuring an asa5510 with a dsl modem connected to it's outside interface and a bunch of pc's connected to the internal interface through a 3560 switch.the internal network will be a 172.16.x.x network with /24.if I did not want an...

vgoradia by Level 1
  • 802 Views
  • 1 replies
  • 0 Helpful votes

I have a ASA 5510 configured for SSL Web VPN.I need to add Microsoft terminal service web client (TSweb) as a link in the Web VPN portal.I can use the normal MS remote desktop client with 127.0.0.1:xxx but the non technical users are having hard time...

wasanthak by Level 1
  • 1316 Views
  • 5 replies
  • 0 Helpful votes

The network is setup as described below:Site 1:DSL ModemPIX 506 (Handles PPPoE Authentication)Cisco 2620 with T1 to site 2Site2:Cisco Cable ModemPIX 506 (Gets DHCP address through cable modem)Cisco 2620 with T1 to site 1I have the network setup route...

hatfieldm by Level 1
  • 898 Views
  • 1 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card