Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hi,we want to monitor periodically the memory utilization of our PIX firewalls. I did not find any recommendation what amount of free memory in percentage should be the threshold to look for. In the TAC documentation it is mentioned that the free mem...

r.sharafi by Level 1
  • 590 Views
  • 2 replies
  • 0 Helpful votes

We currently have a /30 external subnet to the internet (2 IP address in reality, 1 on outside of PIX, 1 on perimeter router). We want to allow 4 inside machines outbound using a variety of protocols and SMTP traffic inbound to the mail server. One o...

g.leonard by Level 1
  • 319 Views
  • 1 replies
  • 0 Helpful votes

A mutlicast server and a PIM router located at PIX outside interface. The client is protected by the PIX at inside interface. Client cannot connect receive the stream from the server. However, if the client locate at the outside interface, it can rec...

v.chow by Level 1
  • 658 Views
  • 5 replies
  • 0 Helpful votes

Hello, i m trying to initiate a Telnet session from a Pix Firewall console running 6.3.1 software to a remote device but the firewall IOS did not recognize the command Telnet even if type only the ip address of the remote device without the com...

teltac by Level 1
  • 352 Views
  • 1 replies
  • 0 Helpful votes

As the title suggests, I am trying to create two VPN tunnels over a single ISDN circuit. But, I am wondering how to apply two crypto maps to that single interface, and how the interface will know which one to use. If anyone has any experience or ad...

b.withrow by Level 1
  • 1119 Views
  • 1 replies
  • 0 Helpful votes

Hi All,I have two problems with my PIX 501:1. Enrolling works well. The pix has a certificate and uses it with VPN/SSL connections. But after a reload, the pix certificate is lost and it has regenerated a self signed certificate again!Yes, I did wri...

BertK88 by Level 1
  • 606 Views
  • 3 replies
  • 0 Helpful votes

We have been running into the problem with vendors that we initiate FTP sessions to. We do not allow inbound access and passive connections will not work with their FTP server. They use Microsoft FTP servers and they have port security setup on th...

d.cruz by Level 1
  • 475 Views
  • 3 replies
  • 0 Helpful votes

We have some developers that have an application that they say needs to have the TCP timeout set to 4 hours (talking to some mainframe somewhere)and I need some ammunition/arguments that will show them how this is not a secure thing to do.

rnance by Level 1
  • 626 Views
  • 2 replies
  • 0 Helpful votes
Review Cisco Networking for a $25 gift card