Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

I have a possible spam relay from a PC in my internal network. I have tried to lock down the PIX firewall so only port 25 traffic would be allowed out from the exchange server.My attempt blocked both incoming and out going legitimate mail.Could some...

gv by Level 1
  • 794 Views
  • 1 replies
  • 0 Helpful votes

Hi All,I have two 5520 in A/S statefull failover, sw: 7.2(1). My problem is that the secondary node after some days or week takes over the resources and become active. It show that there was an interface check error, nut as I checked there was not. A...

We have a physical interface that has 2 vlans on it. On show interface, there is the following:21450335 invalid VLAN ID errors, 61212 native VLAN errorsThe invalid VLAN ID errors are incrementing by about 120 a minute....does anyone have any ideas wh...

PIX running 6.3(4)All, I have tried to NAT out an internal IP using (ip's slightly changed):static (inside,outside) 12.15.27.24 172.16.251.251 netmask 255.255.255.255 0 0to allow access to a external PPTP server. When I run a debug icmp trace (after...

watcher60 by Level 1
  • 887 Views
  • 2 replies
  • 0 Helpful votes

Can we do virtual firewalling on any of the ASA solutions? Which ones and what are the advantages/disadvantages?On the FWSM, I know we can do virtual firewall. Can we do the same on ASA?Thanks

londint by Level 1
  • 833 Views
  • 1 replies
  • 0 Helpful votes

Recently I installed the latest IPS update & noticed all signatures show alarm action only. I thought sdf "action" were pre set by Cisco.Should any sigs be changed to reset or drop? How do you determine which sigs to change? Should an ACL be used wit...

ms4561 by Level 1
  • 464 Views
  • 1 replies
  • 0 Helpful votes

i have an asa 5510 which suppose to have the following rules1. part of the inside users should be able to access the internet.2. part of the inside users should be able to access a network on the DMZ3. Part of the inside users should be able to acces...

Can a Cisco 851 handle being an edge router for a 3005 concentrator with say 20 remote users accessing a concentrator or for 5 VPN connections to a concentrator?All the router would be acting as a pass-through, filtering with an Infrastructure access...

Using CTA 2.0 with supplicant I've got posture validation to work fine. The client connects to the switchport, posture validation is done and "healthy" pops up on the client. The switchport however is not assigned to the right VLAN. The port gets mem...

1.Anyboday know how can I do extened Ping from PIX ?for example after I created VPN tunnel between 2 PIX, I want to ping beween 2 inside interface ? Router no problem to do so.2. Dose PIX have the command like router:"show crypto engine connection ac...

pengfang by Level 1
  • 1568 Views
  • 5 replies
  • 0 Helpful votes

Hi,Can anyone tell me how i could change the encryption that our client to site uses from des/md5 to 3des/sha and if there is a common standard for what is considered to most secure.ThanksJ Mack

johnnymac by Level 1
  • 871 Views
  • 3 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card