Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello, I have this issue with configuring an SFTP repository with different port number than the default TCP 22. Because of its security issues FTP has been disabled from all the servers and SFTP is the default. In addition the default port n...
Hi,we are having a problem while users try to change their expired AD password. we use Cisco Anyconnect NAM for wired network access and for wireless we use the default supplicant. Users cant change their password from both wired and wireless networ...
Dear Community,Due to excessive malicious attempts to our network we decided to block traffic that come from specific countries on our Firepower Threat Defence. But we are still having attempts that bypassed the geolocation rule. the log shows that t...
Hello,Starting from the last three weeks these IP Addresses are attempting to VPN into our network. In the ISE LiveLogs we can see that there are multiple attempts from these ip addresses. These IP addresses were added to the prefilter block rule on ...
Hi,I was using a CA signed wildcard certificate for the Admin portal of Cisco ISE. it was succesfully installed but when i browse to the admin portal it shows not secure certificate is not valid. i stil can see the wildcard certificate in the certifi...
@Arne Bier Thank you for your response. The "Enable Password Change " has been selected and users have been successfully changing their password until recently. Allow password change retries has been set to maximum on all allowed protocols.
these traffics are not destined to the FTD itself rather they are going through the FTD to the internal networks. so they should have been blocked unless we missed something.
Thank You @Aref Alsouqi @MHM Cisco World for the support but what we did is exactly as mentioned in the link. The traffic that we wanted to block was the traffic that is destined to our internal network and to our DMZ. But still we are getting those...
The outside interface is the vpn concentrator and the endpoint that is making the remote connection will get ip from the ravpn pool. But the screenshot that i shared is neither the outside interface nor the ip from the pool rather it is the ip addres...