Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Hello everybody. Could someone help me with this running-config. I would like to do port-forwarding with my AS5506W. My private server is on 10.10.30.2. Find below my running-config on ASA. I have done all that is the running-config but it is still n...

Diogene by Level 1
  • 2785 Views
  • 8 replies
  • 0 Helpful votes

I currently have an ASA 5525 and I want the updates made to my servers, services to be carried out, but I get this error Inbound TCP connection denied from x.x.x.x / 443 to x.x.x.x / xxxx flags RST on interface outsideTry to create the access list ru...

Hi there, Dear Members,i am using Cisco ASA 5520 firewall in my company, i am using the ACL to block some specific traffic for some clients, which is working fine, now i want to block specific websites through ASDm, can anyone help me how can i do th...

Cash2106 by Level 1
  • 7750 Views
  • 26 replies
  • 0 Helpful votes

Hello everyoneI'm trying to migrate a QoS configuration from cisco ASA 9.8.4 to FTD 6.6.1 (using FDM or FMC ).The issue is about the ACL for QoS match is using a time-range and that point is very important for the migration.1- In FMC I checked the Qo...

Resolved! FTD 2100 HA Pair

HiWe have a Pair of FTD 2100 in HA I have been tasked with breaking this HA pair as we are reverting to single device, i cant seem to find any decent documentation on this can anyone point me to this and also provide instructions on breaking the pair...

benolyndav by Level 4
  • 4021 Views
  • 12 replies
  • 0 Helpful votes

Hi there, I have been trying to implement DSCP filtering on a ASA 5506-X, using class maps.  But have not been able to get it configured and working.  It seems that the commands to do it are there, but looking at general DSCP filtering examples, I'm ...

BK2021 by Level 1
  • 1279 Views
  • 5 replies
  • 0 Helpful votes

Resolved! SSH Algorithm

Hello Our internal network security team has idntified Vulnerability regarding the SSH server within the catalyst switches.As per the Vulnerability team SSH is configured to allow MD5 and 96-bit MAC algorithms for client to server communication.These...

sameermunj by Level 1
  • 18497 Views
  • 10 replies
  • 0 Helpful votes

Do the Firepower appliances have the ability to show the L7 apps used by a rule similar to Palo Alto's Usage feature? From what I've found, the only way to see the app used by a rule is to check the event explorer and filter on the rule name. This us...

Scott_22 by Level 1
  • 1631 Views
  • 0 replies
  • 0 Helpful votes