Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

How do I backup a PIX flas IOS to a tftp server?When I try the copy falsh to tftp it does not allow me throwing a syntax error.How do I find out the file name of the PIX flash, it does not show me the file name using the sh flash command.Pls help.Tha...

mahavirsj by Level 1
  • 365 Views
  • 3 replies
  • 0 Helpful votes

I would like to add a PIX 501 Firewall to our existing network. Currently our ISP has provided a 1720 router that has a static IP address. That router is then connected to an HP Procurve switch. We already have a DHCP server in place that is provi...

I'm having some problems browsing my Windows networks through a PIX. Here's the scenario: I used to have all of my vlans connected to an RSM on a 5500 switch. On Saturday morning I shut down all of the RSM interfaces and inserted a PIX (with vlans ...

r.crist by Level 1
  • 331 Views
  • 1 replies
  • 0 Helpful votes

Resolved! ASA and UDP

Can someone answer how ASA creates "state" with UDP traffic? I have seen the matrix document of the approved UDP services, but I would like a better understanding of what makes it work.TIADave

I have applied the following access-list on my pix 515 (OS- 6.1(4) ) inside interface.access-list acl_in deny udp any any eq tftp access-list acl_in deny tcp any any eq 135 access-list acl_in deny udp any any eq 135 access-list acl_in permit ip any a...

I am just started to configure the PIX Firewall.But I am in confusion.Here is the conf file.PIX Version 6.2(2)nameif ethernet0 backbone_251 security0nameif ethernet1 inside security100nameif ethernet2 intf2 security10nameif ethernet3 intf3 security1...

ishwar by Level 1
  • 456 Views
  • 3 replies
  • 0 Helpful votes

we usually create a dmz by using a pix. however, one of my customers uses a switch to create a dmz rather than a pix. customer does that by creating 3 vlans.i was wondering what is the difference between the two.

jackko by Level 7
  • 620 Views
  • 3 replies
  • 0 Helpful votes

I have PIX 520 with ver 6.1(4). The issue is when i am sending mails with attachment from the mail client behind PIX, the mail is not reaching the recipeint but the same is reaching without attachment. If I bypass the PIX, mail with attachments are d...

venugopal by Level 1
  • 454 Views
  • 1 replies
  • 0 Helpful votes

Do IDS signatures override ACLs previously set?If I permit echo-reply in my ACL, but I set the IDS to drop echo-reply packets, what will the PIX do? Does the ACL or the IDS have precedence in PIX?

I recently started a position where the previous network admin shredded a great deal of network information. I have been told that the previous admin had the network locked down too tight. To make a long an interesting story short I have a Cisco 506 ...

Laslo by Level 1
  • 547 Views
  • 4 replies
  • 0 Helpful votes

Hi, I have just updated to VMS 2.2 and IDSMC 1.2 on Windows 2k SP3 and want to install all three latest patches available. When I go to install the patches I get the follwing warning message:This Point Patch is not intended for this version of ids...

pfligman by Level 1
  • 1063 Views
  • 2 replies
  • 0 Helpful votes

Hello all,I am trying to sniff a session between a server on an "inside" segement and a server on a "DMZ" segment. The server on the inside is being NAT translated to the same address on the DMZ like so:static (inside,DMZ) 10.1.1.1 10.1.1.1 netmask 2...

ggombas by Level 4
  • 883 Views
  • 4 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card