Hello team, Can you confirm if the Security Choice EA is Subscription only? Or is there perpetual products included also? Thanks!
Hello team, Can you confirm if the Security Choice EA is Subscription only? Or is there perpetual products included also? Thanks!
This topic is a chance to clarify your questions about Cisco Threat Response, from its components and new features to the resources to get started. During the session, the Threat Response team will answer questions about how Cisco Threat Response can...
Hi all,We have some Cisco ws-3850-24xs switches. As per one of the VA findings , the switches are using SSL certificates that are signed by a weak hashing algorithm. We are unable to get external CA to issue certificates. Please be kind enough to let...
Hello everyone, 1)I already got a ACL for ssh applied to vty lines.ip access-list standard vty-accesspermit xx.xx.xx.xx logline vty 0 4access-class vty-accesstransport input ssh 2) ACL to use with CoPP access-list 101 permit tcp xx.xx.xx.xx yy.yy.yy...
Hello, I have a Cisco ASA 5516-x with the Thread Defense license bundle installed on it, the bundle includes FirePOWER, Advanced Malware Protection (AMP) and Cisco Threat Grid, and URL filtering. I would like to get a second 5516-x appliance so I ca...
Hello everyone,If you use the example ACL 121 for CoPP best pratice :access-list 121 permit tcp <NOC block> <router receive block> eq telnetaccess-list 121 permit tcp <NOC block> eq telnet <router receive block> established access-list 121 permit tcp...
When you have multiple isakmp polities defined, how do you know which policy your crypto map is using? For example:crypto isakmp policy 1 hash md5 authentication pre-share!crypto isakmp policy 5 encr 3des authentication pre-share group 2crypto isakm...
Hello, When you have 2 devices(PC/Phone) connected to a single switch port and using Switchport Protected command on interfaces, how can we get IP Phone call other IP phones on the same switch while not letting PCs have connectivity to other PCs?
Hi All- We are looking at various methods of network segmentation. We initially implemented DACLs. My security guy is somewhat suspect of this as the DACL seems to only allow limits on traffic leaving the interface, not on traffic entering the inte...
customer have a radius server and he would like to use it to authenticate access to a switch , i did the belowaaa new-modelradius-server host 1.1.1.1 auth-port 1812 acct-port 1813radius-server key ciscoaaa authentication login default group radius w...
So we'll be having a deployment next week and we recommended our client to upgrade their firmware version to a much stable version. We would like to ask a stable version for our security appliance, our security appliance's model is ASA5525-K9 without...
Hey everyone ! I want to protect the Router for BGP session request from 3rd partys( malicious person ), also protect for ICMP flooding.My goal is to achieve this with CoPP. I use a ISR 4300 Series Router with IOS XE 16.9One Interface is connected to...
Hello all, With "ip arp inspection vlan X" you enable Dynamic ARP inspection that determines the validity of an ARP packet based on valid IP-to-MAC address bindings stored in a trusted database, the DHCP snooping.My problem Is that I don´t undestand ...
Hi Team, I have a question in reference to the multicast switching.As we know that, for multicast switching, we need only IGMP protocol to take the forwarding decision. For same broadcast domain, why we need to enable any multicast routing protocols ...
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:
Subject | Author | Posted |
---|---|---|
04-05-2024 11:31 AM | ||
03-26-2024 01:41 AM | ||
03-14-2024 11:57 PM | ||
02-28-2024 12:11 PM | ||
02-27-2024 07:31 AM |