Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi,I have a 3005 Concentrator that I can not http to it anymore; I checked and I'm allowing http to be able to manage the concentrator through the outside interface, I was able to manage it before and suddenly I can not. I checked under managed proto...

u.naranjo by Level 1
  • 1033 Views
  • 3 replies
  • 0 Helpful votes

a few months ago, i found documents on how to step by step make a pix, in my case a 515, connect over a tunnel to other firewalls from other manufacturers, it had detailed instructions on what to set on the pix and what to do on the other end... anyo...

jparis by Level 1
  • 453 Views
  • 2 replies
  • 0 Helpful votes

Anyone here a big fan of the show pipe featuresAt the end of show <command>, use the pipe character '|' followed by:begin|include|exclude|grep [-v] <regular_exp>, to filter show output.Very useful if you have large object-groups and only want to list...

hugodrax by Level 1
  • 1185 Views
  • 2 replies
  • 0 Helpful votes

Hi, Is it possible to configure PIX so that it can work on Hostnames. I have to allow certain workstations outbound access through PIX. I want to do this by using hostnames of the machines in the access-list that provides outbound access through pix.

amodi by Level 1
  • 398 Views
  • 1 replies
  • 0 Helpful votes

Best practice question...Is it better to perform PAT via a NAT overload on a bastion router with a static statement on the PIX, or setup PAT on the PIX using one global IP address?Other alternatives?***Router Example***Router Setupip nat pool FirstPA...

dlockerby by Level 1
  • 1623 Views
  • 4 replies
  • 0 Helpful votes

I'm currently doing a school project that involves the use of a PIX firewall between the ISP and the edge router of the network. The purpose is to make the network as secure as possible using only the PIX. Ideally, I'd like it if an attacker could no...

cscott by Level 1
  • 686 Views
  • 2 replies
  • 0 Helpful votes

Hi ...I am New to Security.I have a router(2600),Linux Proxy with 200 users.I wanna to enable my firewall with linux proxy.here is my configPIX Version 6.3(1)-------------------------------------------interface ethernet0 autointerface ethernet1 auto ...

synjay by Level 1
  • 1122 Views
  • 6 replies
  • 0 Helpful votes

i know this sounds like a really stupid question and i'm sorry, but what is the easiest way to remove lines from the config on a pix 515 either through the console or from PDM, i'm running a pix 515 ios 6.3(3) and pdm 3nevermind- i got it...

jparis by Level 1
  • 410 Views
  • 1 replies
  • 0 Helpful votes

I have a problem,Traffic from private subnets is not able to reach internet.The traffic is being nated at PIX.Can anyone check the configuration and let me know where the problem lies.

rags123 by Level 1
  • 635 Views
  • 1 replies
  • 0 Helpful votes

Can you configure the Pix-525 ver 5(3) to do policy-based routing? I know how to do this on the routers, but i'm not sure if the firewall can do the same.Thanks.

loss by Level 1
  • 657 Views
  • 1 replies
  • 0 Helpful votes

I need clarification on the pix failover.Each PIX will have it's own inside and outside ip addresses. You can't use the same ip on both units (correct?). We currently use a 255.255.255.252 ip address with our ISP on the outside interface, this means...

i have a question about how a pix handles routes as per below:route inside 10.0.0.0 255.0.0.0 10.0.0.1route dmz1 10.21.21.0 255.255.255.0 10.21.21.1is the pix able to distinguish between the most specific route like a router or will it get confused. ...

ciscoacs by Level 1
  • 583 Views
  • 2 replies
  • 0 Helpful votes