Network Security

Engage with peers and experts on network security topics such as Secure Firewall Threat Defense, Adaptive Security Appliance, Secure Firewall Management Center, and Security Cloud Control.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

assume a scenarioenterprise network has proxy servers for internet browsing and perimeter firewalls are deployed for customer applications hosted in internet As most of the IT companies are moving towards cloud services, firewall security has become ...

NDP by Level 1
  • 1437 Views
  • 2 replies
  • 0 Helpful votes

Hi All,I have configured two ASA firewal in failover mode - Active and Standby and two ASA is working in failover mode too, but whenever I fire a command  " sh failover" in active ASA  then it shows - This host  is Active and another is failed. I hav...

Good Morning, I have a general question related to how ASA's work.  I'm pretty sure I know the answer to my own question but another engineer said something the other day with such confidence I just want to make sure.  My background is in networking ...

If you need to block IDK malicious IPs and what not, obviously the list could grow very large over time. Also, I know simply blocking a targeted attack may not be effective at preventing DOS/DDOS etc. What would be the best ways to block IPs on lets ...

Hi all, I am looking for a firewall which can do scheduled based filtering to certain traffic like Netflix at certain times of the day and things like controlled access to Youtube, and other stuff like that. I was looking at Meraki which is fairly si...

Hello, we have 2 ASA 5585X runnin asa 9.10(1)7and ASDM 7.10(1).We currently have the Gig0/1 interfaces on both devices with separate IP's in the same subnet for mgt purposes.We have created an IP on the mgt0/0 port on the primary ASA for OOB manageme...

Hello everyone, I have a question about Inspection on ASA :- I have 2 router connected to 2 inside interface of ASA (R1 connected to inside1 and R2 connected to inside2)- Inside 1 have security level of 100 & Inside 2 have security level of 80- Then ...

Hi gurus As you can see I am very very new to Cisco IOS, so go easy on me. I have multiple ACL rules, they are all named and they all have many entries on each on, is there a way to check-with one command-where and what statement an specific IP add...

Review Cisco Networking for a $25 gift card