We use AWS and Cisco Secure Firewall Threat Defense Virtual (formerly FTDv or NGFWv).Some of our data transfers use SFTP (SSH). Can we do DPI? Can we do it without changing the source/destination fields?Background info would be appreciated.Thanksjc
A friend spec'd out a new network, and insisted on having Network and Host IDS devices. Aren't those concepts now overtaken by AMP and NextGen Firewalls? Do we still say NIDS? Thanks.
I've got to extend our voice VLAN over a WAN backbone. One of the old documents (2013) says L2TP does not support CDP ,LLDP, STP, or VLAN trunking, unless you use a L3 switch. My current design is: A1 switch with VoIP access portsA1 routerbackbon...
Can someone give me the CLI commands to configure the IP addresses on a new FTD 2100? Evidently, it involves "scope" commands. My ISP uses 192.168.1.x for DHCP IP addresses, so I need to manually assign my local PC a different subnet (NOT 192.168.1...
Marce1000. Per the link you sent me, it states: Support for L2 protocol tunneling (Cisco Discovery Protocol, Spanning Tree Protocol, VLAN Trunking Protocol, and Link Layer Discovery Protocol) requires that the device is a switch. This switch needs...
I've worked on many programs that are air-gapped, and once inside the secured network, devices can never be brought out, (without an act of God). It should be pretty simple to get a FDM on-prem license, but it's taken me weeks to get it figure out (...
Thank you Marvin and BB, I was expecting the FDM to be similar to ASA, it is not. In the FDM, you can not use the CLI to perform most functions, nor can you use it to review what the GUI builds. Cisco changing the recent nomenclature from SourceFire...