Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Can we do virtual firewalling on any of the ASA solutions? Which ones and what are the advantages/disadvantages?On the FWSM, I know we can do virtual firewall. Can we do the same on ASA?Thanks

londint by Level 7
  • 915 Views
  • 1 replies
  • 0 Helpful votes

Recently I installed the latest IPS update & noticed all signatures show alarm action only. I thought sdf "action" were pre set by Cisco.Should any sigs be changed to reset or drop? How do you determine which sigs to change? Should an ACL be used wit...

ms4561 by Level 1
  • 537 Views
  • 1 replies
  • 0 Helpful votes

i have an asa 5510 which suppose to have the following rules1. part of the inside users should be able to access the internet.2. part of the inside users should be able to access a network on the DMZ3. Part of the inside users should be able to acces...

Can a Cisco 851 handle being an edge router for a 3005 concentrator with say 20 remote users accessing a concentrator or for 5 VPN connections to a concentrator?All the router would be acting as a pass-through, filtering with an Infrastructure access...

Using CTA 2.0 with supplicant I've got posture validation to work fine. The client connects to the switchport, posture validation is done and "healthy" pops up on the client. The switchport however is not assigned to the right VLAN. The port gets mem...

1.Anyboday know how can I do extened Ping from PIX ?for example after I created VPN tunnel between 2 PIX, I want to ping beween 2 inside interface ? Router no problem to do so.2. Dose PIX have the command like router:"show crypto engine connection ac...

pengfang by Level 4
  • 1746 Views
  • 5 replies
  • 0 Helpful votes

is it ok to use two seperate subnets for NAT purpose? actually it is at one of our new clients.. this is something totally new i have seen....ip address outside 67.88.68.198 255.255.255.224ip address inside 192.168.0.1 255.255.255.0global (outside) 1...

Hi,Can anyone tell me how i could change the encryption that our client to site uses from des/md5 to 3des/sha and if there is a common standard for what is considered to most secure.ThanksJ Mack

johnnymac by Level 4
  • 961 Views
  • 3 replies
  • 0 Helpful votes

How do we increase the timer for internet authentication. We want to be able to live a connection up instead of re-authenticating after a connection is idle for a while. Currently when a connection is not being used for a while after successful authe...

bipot by Level 2
  • 1018 Views
  • 1 replies
  • 0 Helpful votes

If a organisation wants to connect to a service provider's mpls using a catalyst, how do you ensure end to end qos? I want to create seperate vlans for voice and data on the local loop, but how do i rate limit and allocate bandwidth to each vlan?

srinivasibg by Community Member
  • 603 Views
  • 2 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card