Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

Resolved! ASA 5516-X syslog

Hi All Cisco fans. I have a question abot log below you can find my running config of logs messages. and my question is? when I type show logging i see only logs for VPN session, non of the current wornings info etc.My asa freez night before i cannot...

Hello, We have a server on our internal network that we are currently using port forwarding to allow accessibility from the outside and I am considering placing it in a DMZ to limit potential attack surface. The problem is that clients on the inside ...

The installation manual suggests to connect the firewall in between the modem and the router. In my case the ISP has combined that in one device. Do I now connect it before the modem/router or after?

Bob33 by Level 1
  • 1949 Views
  • 3 replies
  • 0 Helpful votes

Hi Guys, just want to double check with you. In FTD, I have 2 subnet and if I need to have intervlan for those 2 VLAN, do I still need to configure an identity NAT or any NAT?My target is doing intervlan routing between the 2 VLAN without any IP chan...

Resolved! NGIPS Vs

DearsI want to know more on the NGIPS of Cisco, hence what i know the NGIPS are signature less and they detected on the pattern based , actually can anybody share with me an example how threat will be detected by a pattern algorithm, If it is pattern...

adamgibs7 by Level 6
  • 5737 Views
  • 13 replies
  • 0 Helpful votes

I get that Level 100 is fully trusted, level 0 is fully untrusted, and how you can go from security zone 100 to zone 0, but not the reverse.   However, my old understanding was that once you manually assigned FW rules, the zones became irrelevant.  T...

jimmycher by Level 1
  • 1467 Views
  • 5 replies
  • 0 Helpful votes