Network Security

Engage with peers and experts on network security topics such as FTD, FMC, FDM, CDO and ASA.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

It appears that the ASA device is now seeing the URL Server as down. It was previously redirecting traffic and seemed to have stopped. The URL-server stats show the URL-server as down, but I can ping the server from the ASA and the all of the webse...

rhcsgcsc by Level 1
  • 464 Views
  • 1 replies
  • 0 Helpful votes

I am monitoring CSA Agents on the CiscoWorks Security Monitor. I notice that most alerts, specifically the alerts triggered by web server exploit attempts, don't record the Source IP address and Port of the attacker. I understand the difference bet...

RichardSW by Level 1
  • 572 Views
  • 3 replies
  • 0 Helpful votes

Hi folks-I hv PIX515E with version 6.3(3)running for the past 2 yrs w/o any major issues.Recently I understand that there is IKE vulnerability issue & this is applicable to all versions below 6.3(5) and hence planning to upgrade the PIX IOS to 6.3(5)...

sikkander by Level 1
  • 474 Views
  • 1 replies
  • 0 Helpful votes

Does anyone know if it is possible to change the message displayed in the icon tray when a CSA event occurs? Customer would like to change the balloon from the stock message to "Please contact xyz and extenion 123."Thank you!

piltze by Level 1
  • 611 Views
  • 4 replies
  • 0 Helpful votes

When a master blocking sensor issues a shun to a pix it shuns x.x.x.x / 0.0.0.0 which will block any host with address x.x.x.x making a connection to your PIX. However if we take the case of an IE exploit you want the SIG to fire and the shun to bloc...

d-g-c by Level 1
  • 368 Views
  • 1 replies
  • 0 Helpful votes

I need to upgrade the IDSM-2 Modules in my 6513 switches from ver. 4.x to 5.0.1. (a major upgrade). The procedures indicate "the system will be restarted at the end of the upgrade...". My question is which system will restart? Will just the IDSM-2...

jkussow by Level 1
  • 476 Views
  • 1 replies
  • 0 Helpful votes

Is there a generic step by step way for one to start his network off using IPS/IDS? We have 2 4235 1 FWSM and some PIXs and VPN concentrator soon to be monitored by CMS. Do I set the IDS device to report all information and then tweak from there? A...

dpatkins by Level 1
  • 423 Views
  • 1 replies
  • 0 Helpful votes

Hello. I have question obout IDSM-2 which is using 98% of the memory.Output from sh ver:Using 1944629248 out of 1979682816 bytes of available memory (98% usage)Using 4.3G out of 17G bytes of available disk space (27% usage)It is normal that it is usi...

-cybermen by Level 1
  • 558 Views
  • 1 replies
  • 0 Helpful votes