Can we do virtual firewalling on any of the ASA solutions? Which ones and what are the advantages/disadvantages?On the FWSM, I know we can do virtual firewall. Can we do the same on ASA?Thanks
Can we do virtual firewalling on any of the ASA solutions? Which ones and what are the advantages/disadvantages?On the FWSM, I know we can do virtual firewall. Can we do the same on ASA?Thanks
Recently I installed the latest IPS update & noticed all signatures show alarm action only. I thought sdf "action" were pre set by Cisco.Should any sigs be changed to reset or drop? How do you determine which sigs to change? Should an ACL be used wit...
i have an asa 5510 which suppose to have the following rules1. part of the inside users should be able to access the internet.2. part of the inside users should be able to access a network on the DMZ3. Part of the inside users should be able to acces...
Can a Cisco 851 handle being an edge router for a 3005 concentrator with say 20 remote users accessing a concentrator or for 5 VPN connections to a concentrator?All the router would be acting as a pass-through, filtering with an Infrastructure access...
Hi All,I have a quick question which might be so simple, does any of the Cisco IPS series products support failover?Regards,Haitham
Using CTA 2.0 with supplicant I've got posture validation to work fine. The client connects to the switchport, posture validation is done and "healthy" pops up on the client. The switchport however is not assigned to the right VLAN. The port gets mem...
Is there anyone that has implemented a Cisco VPN concentrator with a Cisco Radius Server that passes VPN login credentials to a Windows Domain Controller for authentication? If so, I need to know if anyone else is having authentication problems with ...
1.Anyboday know how can I do extened Ping from PIX ?for example after I created VPN tunnel between 2 PIX, I want to ping beween 2 inside interface ? Router no problem to do so.2. Dose PIX have the command like router:"show crypto engine connection ac...
is it ok to use two seperate subnets for NAT purpose? actually it is at one of our new clients.. this is something totally new i have seen....ip address outside 67.88.68.198 255.255.255.224ip address inside 192.168.0.1 255.255.255.0global (outside) 1...
Hi,Can anyone tell me how i could change the encryption that our client to site uses from des/md5 to 3des/sha and if there is a common standard for what is considered to most secure.ThanksJ Mack
Hi there,I would need to configure a read only access to my PIX via ASDM. What is the best way of achieving that?Regards,Paul
How do we increase the timer for internet authentication. We want to be able to live a connection up instead of re-authenticating after a connection is idle for a while. Currently when a connection is not being used for a while after successful authe...
Hi Friends,is there any networking system better than VPN?
If a organisation wants to connect to a service provider's mpls using a catalyst, how do you ensure end to end qos? I want to create seperate vlans for voice and data on the local loop, but how do i rate limit and allocate bandwidth to each vlan?
Hello,One of my vendors has a cisco ASA5520 and we are trying to build a VPN tunnel between ASA 5520 and Nortel 4500 contivity box.It passes phase 1 and during phase 2 i get this error message----------3|Dec 06 2006|11:51:39|713119|||Group = 1.1.1.1 ...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
| Subject | Author | Posted |
|---|---|---|
| 05-05-2026 09:59 AM | ||
| 05-02-2026 06:09 AM | ||
| 04-30-2026 12:46 AM | ||
| 04-24-2026 07:04 AM | ||
| 04-22-2026 11:56 AM |
| User | Count |
|---|---|
| 9 | |
| 2 | |
| 2 | |
| 1 | |
| 1 |