Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

I have to upgrade the PIX OS from 6.3(1) to 7.X.There are few crypto ( site-site)configs with preshared keys.I remember that I had faced issues on the 1700/2600 old routers when upgrading the IOS, the preshared keys seems to be not working.I used to ...

rkumares by Cisco Employee
  • 1136 Views
  • 5 replies
  • 0 Helpful votes

We?re looking for software that will help us audit and keep track of firewall policies. We are constantly doing audits on our firewalls, whenever there is a change. We would also would need to link to documents to change control documentation unles...

Hi All,1. We've one web server which is accessible from outside.RuleAny Web Server http/httpsI am seeing lot of drops by clean up rule on daily basis from the web server to internet sites. On running snoop i see when web server is sending to Intern...

I configure a IPSec Tunnel to Nortel Contivity switch out of my network. The problem is: when I use "show crypto ipsec sa" and "show crypto isakmp sa" commands, the outfut is as following:firewall# show crypto ipsec sa interface: outside Crypto m...

Hi friends,Just wanted to know basically if a requirement is supported in the FWSM or not. There is a FWSM 3.1 blade on the 6500. The main intention of purchasing it was to protect traffic to and from Server VLAN's. There are totally about 12-13 serv...

gautamzone by Level 1
  • 1873 Views
  • 16 replies
  • 0 Helpful votes

Hi,We are planning on putting Active/Standby pairs of ASA CSC bundles at three of our sites. We would also like to use these pairs as SSL head end devices.The question is whether we really need to purchase two sets of SSL licenses (and for that matte...

I have worked on PIX's for years and still have a hard as hell time understanding ACL's on a pix, specifically the direction to apply and how they are inspected.If you read the books it always says inbound acl's are used to go from a lower to higher ...

boshardy1 by Level 1
  • 984 Views
  • 4 replies
  • 0 Helpful votes

Hi all, I use Catalyst 6513 (Router IOS) + IDSM-2 and use Cisco VMS 2.3 to manage IDSM-2. I upgrade IDSM-2 from version 4 to version 5. However, after updating completely, I use Cisco VMS 2.3 to query to IDSM-2, I see a error: "status: Error importin...

mylove142 by Level 1
  • 1373 Views
  • 14 replies
  • 0 Helpful votes

Hello all,I have an ASA5510 running 7.2 and asdm 5.2.I am trying to setup a Web server on the DMZ. I need it to be able to communicate with an internal mail server. I followed the example in the getting started guide, but am running into a problem....

Hi,I am after deploying an IDSM on a 6500 SW which already has FWSM module. I want to monitor VLANs which are already protected by the FWSM; so I have some questions:1- How would I be able to span or configure VACL for VLANs which are behind the FWSM...

I would like my IDSM-2 to run in a Promiscuous Mode ( and not INLINE mode)How can i configure it so that it works on the - " Block Nothing,Monitor Everything" principle.I need the blade to "Never" block the upstream devices like routers and Firewall...

rpsrekhi3 by Level 1
  • 648 Views
  • 1 replies
  • 0 Helpful votes

I'm looking into configuring an asa5510 with a dsl modem connected to it's outside interface and a bunch of pc's connected to the internal interface through a 3560 switch.the internal network will be a 172.16.x.x network with /24.if I did not want an...

vgoradia by Level 1
  • 829 Views
  • 1 replies
  • 0 Helpful votes