Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

I have a building that we would like to put behind a firewall. Basically here is out it is laid out. A 6509 is the main switch of the building with multi vlans. We are going to take a port out of the 6509 run into 3750-12 then into a pix 525 then bac...

noelw by Level 1
  • 330 Views
  • 1 replies
  • 0 Helpful votes

Hi allI have some doubs about users license on ASA.When i purchase a CSC-SSM-10 or CSC-SSM-20, there are up to 1000 users licensed. What are they users from ????If all my users are located behind a proxy, what user (proxy ip) or users (all users) are...

hperez by Level 1
  • 443 Views
  • 1 replies
  • 0 Helpful votes

Hi allI have some doubs about users license on ASA.When i purchase a CSC-SSM-10 or CSC-SSM-20, there are up to 1000 users licensed. What are they users from ????If all my users are located behind a proxy, what user (proxy ip) or users (all users) are...

hperez by Level 1
  • 466 Views
  • 1 replies
  • 0 Helpful votes

Hi all,we want to upgrade many PIXs fromold version 6.x to 7.x.What we really have a lot is VPN surrounding all our network. A lot of dynamic VPNs as well. Every PIX is in failover pair.So my question is what problems we can expect and what we should...

johnleeee by Level 1
  • 594 Views
  • 4 replies
  • 0 Helpful votes

HiI need some advice, I need some good software that can take the ASA syslog an make in into something readable, preferably graphs on a HTTP interface.And I am looking for something that does not cost as much as CS-MARS.any sugestions on what works ...

arnis by Level 1
  • 746 Views
  • 3 replies
  • 0 Helpful votes

Hi,I have configured a username with privilege level 2 on my PIX but have not defined any commands for Level2.Even then i observe that when i logon with those credentials iam able to go to the configure mode and by an large execute all the commands.W...

rpsrekhi3 by Level 1
  • 1217 Views
  • 2 replies
  • 0 Helpful votes

I'm looking at 2294 alerts from 1012 sources... I think there is a problem here.Default configuration doesn't log anything (the sig is a meta). Turning on verbose alerts or logging just gives me the tail end of the conversation, which appears to be ...

jkell by Level 1
  • 1768 Views
  • 15 replies
  • 0 Helpful votes

PIX 515E, 7.1(2) Existing Citrix clients on Inside, can connect to a Citrix Server on the outside. This is an older CITRIX version, been running for over 3 years without issues.New installs of the client fail, seem the Citrix license key is not trans...

rsmith by Level 3
  • 715 Views
  • 2 replies
  • 0 Helpful votes

I didn't get much traction with my last attempts to understand event summarization, so I'll give a real example. I've modified the ftp authorization failure sig (6250-0) as follows:Event Counter------------------ Event Count: 10 Event Count Key: Atta...

mhellman by Level 7
  • 562 Views
  • 2 replies
  • 0 Helpful votes