Introducing Cisco Firepower 2100 Series Next-Generation Firewall. With threats like ransomware, when you’re breached, your network’s not ‘up’. Cisco Firepower 2100 Series NGFWs deliver business resiliency through superior threat defense. When advanced threat functions are enabled, Firepower NGFW sustains throughput performance versus competing designs. Cisco also improves IT efficiency with simplified management. Keep your network optimized, and data safe, with Firepower.
David Ulevitch and Jason Lamar intro the new NGFWs:
* Registerfor the March 1, NGFW briefing to hear Dave Stuart and team provide details and demos
* Registration for the Security Customer Connection Program is required. Registration is quick and easy to complete. After that, make your way to the Security track and you'll find this webinar and all upcoming offerings.
We know you have questions
Let's start a conversation! Simply reply to this post or start a new discussion. Your peers and Cisco product teams would be interested in hearing what you think and what questions you have on our recent announcements or anything Cisco Security related.
I've inherited an ISE deployment and In our AD there is a ISE service account who is a domain admin.Going through the ISE guides, I can that the service account need specific permission in AD, and I guess they've used a domain admin (the dirty way). ...
I have a FTD2130 HA pair running firmware 220.127.116.11. I have some public facing servers configured with 1to1 static NAT rules on the FTD and associated Access Control Security Policy rules, for example:Source Server#1 192.168.100.100, destination ANY &l...
We are using Cisco ISE to do EAP-TLS authentication from a 3rd party solution. The vendor's documentation states "The NAS ID will be sent in the RADIUS NAS-Identifier attribute of the Access-Request. The RADIUS server uses it to identify this Mobility ser...
Hello Experts, I am am setting up an asa 5508 in transparent firewall. Created a BVI interface and join two inside interfaces to bridge. I am after to create an ACL that can permit only one host per interface Interface BVI ...