Greetings........Imagine a network of 3 routers;x,y,z connected in a triangle kind of a mesh. X Y ZX connected to Y connected to Z connected to X back again.What i hope to know is ; is...
Greetings........Imagine a network of 3 routers;x,y,z connected in a triangle kind of a mesh. X Y ZX connected to Y connected to Z connected to X back again.What i hope to know is ; is...
I update my IDSM to version 3.0(2) S6 and add it into CSPM v2.3.3i with S11. But when I try to block host I obtain the message The status of blocking IP address 192.168.65.40 for 1440 minutes on host "m3c-ids" is:Error: The command failedThe IDSM ha...
How do I allow all outside addresses NOT to be translated to inside on a PIX520?I do not want addresses to be translated at all.Each should appear on the inside as it is on the outside.I only want to restrict access by ports using access-lists.Reason...
When you configure the command 'qos pre-classify' are the DSCP bits copied to the tunnel header in addition to the TOS bits?
I'm a starter! Okay, one (2.2.2.2) of the servers on the DMZ needs to access the Internet. The server's DNS is pointing to a DNS server (1.1.1.1) on the outside of the PIX. I don't understand why this doesn't work, I thought that everything is allow ...
Using NAT & Global to access Internet and DMZ from Inside - that works fine. Trying to access the Inside network from a DMZ, all the examples I have seen show a Static mapping to a single host on the Inside and an ACL to open access to that host from...
Hi:I create the AAA users trough the AccountAction table in an Oracle database, and everything is OK.My authentation policy in the AAA server is that the users are first authenticated to an external ODBC database.Now, how can i specify this authentic...
hi,Looking to acquire some tools for doing security vulnerability/assessment tests on routers and firewalls only. Most of the products to be assessed are Cisco, but there are some others. What commercial tools are others using to perform these tasks?...
Is the cisco IDS box a good way to protect a network and how easy is it to maintain.How does someone keepup with all the new DoS attacks?
We have had troubles with students in our dorms trying to break into lab computers running Windows NT and 2000. This patch is open because we need to allow the students access to their dorm machines when they are in the labs - but we do not want to ...
Hi I have a little trouble with some acl´s a have NAT on a router 1750 , well I want to avoid that anybody could do telnet or ftp to my network and the same from inside to outside i have a network 172.16.10.0 that translate to 204.1.1.0 somebody coul...
I'm looking for info , tips, configuration examples, docs on how to securely configure a cisco IOS perimeter router with and/or without firewall feature set.Any help is greatly appreciateed
Anyone got a good example of an access list that will block all or the required ports in to make a cisco route look invisible to an ISP (ie for dialup).ie block / hide ports and the connected router.Any help would be great.
I have updated two of our sensors with the goner.a custom signatures, but now the custom filters on these sensors have disappeared. I have to regress the sensors to a previous IDS configuration to get the filters back, but that configuration hasn't g...
I have a misconfigured Pix 515, and need to clear the flash in it.The pix-login authentication is set to TACACS+ forboth telnet and console access. But since the Ip address on the interfaces are wrong due to misconfiguration, i cant fix a connection ...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
Subject | Author | Posted |
---|---|---|
04-05-2024 11:31 AM | ||
03-26-2024 01:41 AM | ||
02-28-2024 12:11 PM | ||
02-27-2024 07:31 AM | ||
02-19-2024 12:31 AM |