Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
hi all,can someone please tell me the use of pix command authorization set on acs. i understand the use of shell command authorization. i am sorry if the question is too silly. i am completely new to this area.thanks in advance.regardskirti.
hi all,i need some help in configuring downloadable acls on asa.i have configured a downloadable acl on the asa as follows - permit tcp host 2.1.1.2 host 1.1.1.2 eq 80. i get authenticated successfully , but i get an error saying acl authorizaion den...
hi all,i am configuring cut-thru proxy on asa.the config guide says that the authorization acl should be a subset of the acl used for authentication.in my scenario i am using telnet to auhenticate the user and i want to authorize traffic from 2.1.1.2...
Hi All,my scenario is as shown below :R1>>ASA1>>internet>>ASA2>>R2i have established the ipsec tunnel between the two ASA's. now, when i run ospf on both these ASA's ,they do not become neighbors. as per the cisco doc ASA allows OSPF unicast to work ...
i need some help in configuring the idsm2. I have configured the 6509 switch to capture network traffic using SPAN. i have mentioned vlan as source, for the source SPAN traffic. but after specifying the capture destination on the 6509 (a physical por...
thanks for your reply . but unfortunately i am not looking for that solution . i completely understand the acl required to permit rdp traffic, (as mentioned in the link.)what i need to know is , how to stop unauthorized access from getting across the...