Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello,I have a 6 Cisco 1130 APs connected to a 4507 Switch.Everything is ok until i enable CDP on switchports connected to APs.As soon as i enable CDP, the APs become in accessible , i.e i cant get to the web interface using the Ap IP.Once i remove t...
I have a ASA 5510 configured for SSL Web VPN.I need to add Microsoft terminal service web client (TSweb) as a link in the Web VPN portal.I can use the normal MS remote desktop client with 127.0.0.1:xxx but the non technical users are having hard time...
Hello,I just want to clarify if i use "same-security-traffic permit inter-interface" to allow communicate between 2 subnets, do these traffic get inspected by the ASA ?For an example i have,interface Ethernet0/0duplex fullno nameifsecurity-level 100n...
Can ASA 5510 do VLAN routing between multiple VLANS? I have a customer with 2960 48 port switch and ASA 5510. Ideally we want the ASA 5510 to act as a L3 device in addition to firewall.I read the Cisco docs and found out 802.1q VLAN/sub interfaces ar...
I am trying to configure IDS 4215 to do inline vlan pair with a Cisco 3750 Layer 3 switch.We have 4 vlans in the 3750, vlan 100 for workstations,vlan 200 for servers, vlan 250 for ip phones and vlan 150 for firewalls.All vlans have corresponding SVI ...
Thats correct . I have configured port forwarding , so 127.0.0.1:40201 is forwarded to 10.150.20.21:3389.This set up works perfectly with the normal RDP client , its the web interface based on tsweb thats giving me headache. Thanks
Unfortunately it did not work.Here is what i did.From the WEB VPN main portal page open http://10.150.20.21/tsweb which is the terminal server web client login page.Then on the terminal service login ,i typed in 127.0.0.1:40201 which is the port for...
Thank you.I will try the chnages today and let you guys know.I made all three interfaces same security level 100 and used "same-security permit inter-interface".I assume with this approach i dont have to create NAT/access lists But that did not make ...
Ok it did not go well.Here is what i didIn ASA 5510 running 7.0interface Ethernet0/0duplex fullno nameifsecurity-level 10no ip address!interface Ethernet0/0.1description Management VLANvlan 1nameif MGMTsecurity-level 95ip address 10.150.10.1 255.255....
Thank you for the reply.Hmm, that means traffic from one vlan to another must be inspected by the ASA.Is there any way to bypass the traffic inspection between vlans ? same security level for vlans perhaps ?