Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

According to document, quoted and link below, "You have a 14-day evaluation period to review and assess the migration changes that are made to the threat defense devices before CDO automatically commits them. During this evaluation period, if you are...

SIMMN by Spotlight
  • 1105 Views
  • 2 replies
  • 1 Helpful votes

Good Day All,I found a vulnerability on my 4321 router regarding this:"The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can allow a remote, man-in-the-middle attacker to bypass integrity ch...

dacruzer1 by Level 1
  • 60100 Views
  • 27 replies
  • 0 Helpful votes

Hi AllI did a factory reset on the box, and it boot to 6.6.7 which is located on disk. After login the "Loading please wait..." times out with "application installation failed. Launching fxos console!"From ROMMON I can boot via USB into 7.0, copy the...

We are facing issue continues IPsec GRE tunnel flapping in case of backhaul link flapped. CPU going at the higher side and GRE Tunnels which are not enabled with crypto are stable. We have DC DR SolutionBranch to DC GRE tunnel created for ipsec.DC co...

I have FMC and configured hairpin NAT to access to web server with public IP from internal LAN, and it works fine when I try to access to web server with public ip from internal LAN, but problem is when I try to enter to web server with internal IP f...

111.png 222.png 333.png 444.png

HiIf I NAT a range on our FTD to a Pool of addresses before it goes across a VPN do I need any extra ACLs, I am seeing the traffic on the peer FTD and its now sourced from the new NAT pool, ?? Thanks

Hi, I need some advice. I have an ACL1 with four internal VLANs as source (VLAN1, VLAN2, VLAN3, VLAN4). All of them have permitted access via tcp/80 and tcp/443 to destination ANY (WAN). ACL2 permits VLAN3 to access a host in VLAN10 via tcp/21. The p...

mcgiga by Level 1
  • 398 Views
  • 2 replies
  • 0 Helpful votes