Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi,I have a 3005 Concentrator that I can not http to it anymore; I checked and I'm allowing http to be able to manage the concentrator through the outside interface, I was able to manage it before and suddenly I can not. I checked under managed proto...

u.naranjo by Level 1
  • 969 Views
  • 3 replies
  • 0 Helpful votes

a few months ago, i found documents on how to step by step make a pix, in my case a 515, connect over a tunnel to other firewalls from other manufacturers, it had detailed instructions on what to set on the pix and what to do on the other end... anyo...

jparis by Level 1
  • 405 Views
  • 2 replies
  • 0 Helpful votes

Anyone here a big fan of the show pipe featuresAt the end of show <command>, use the pipe character '|' followed by:begin|include|exclude|grep [-v] <regular_exp>, to filter show output.Very useful if you have large object-groups and only want to list...

hugodrax by Level 1
  • 1082 Views
  • 2 replies
  • 0 Helpful votes

Hi, Is it possible to configure PIX so that it can work on Hostnames. I have to allow certain workstations outbound access through PIX. I want to do this by using hostnames of the machines in the access-list that provides outbound access through pix.

amodi by Level 1
  • 341 Views
  • 1 replies
  • 0 Helpful votes

Best practice question...Is it better to perform PAT via a NAT overload on a bastion router with a static statement on the PIX, or setup PAT on the PIX using one global IP address?Other alternatives?***Router Example***Router Setupip nat pool FirstPA...

dlockerby by Level 1
  • 1482 Views
  • 4 replies
  • 0 Helpful votes

I'm currently doing a school project that involves the use of a PIX firewall between the ISP and the edge router of the network. The purpose is to make the network as secure as possible using only the PIX. Ideally, I'd like it if an attacker could no...

cscott by Level 1
  • 604 Views
  • 2 replies
  • 0 Helpful votes

Hi ...I am New to Security.I have a router(2600),Linux Proxy with 200 users.I wanna to enable my firewall with linux proxy.here is my configPIX Version 6.3(1)-------------------------------------------interface ethernet0 autointerface ethernet1 auto ...

synjay by Level 1
  • 996 Views
  • 6 replies
  • 0 Helpful votes

i know this sounds like a really stupid question and i'm sorry, but what is the easiest way to remove lines from the config on a pix 515 either through the console or from PDM, i'm running a pix 515 ios 6.3(3) and pdm 3nevermind- i got it...

jparis by Level 1
  • 371 Views
  • 1 replies
  • 0 Helpful votes

I have a problem,Traffic from private subnets is not able to reach internet.The traffic is being nated at PIX.Can anyone check the configuration and let me know where the problem lies.

rags123 by Level 1
  • 564 Views
  • 1 replies
  • 0 Helpful votes

Can you configure the Pix-525 ver 5(3) to do policy-based routing? I know how to do this on the routers, but i'm not sure if the firewall can do the same.Thanks.

loss by Level 1
  • 558 Views
  • 1 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card