Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Two questions really.Q1. What is a safe peak for a cluster (Active/Standby) pair of ASA 5520's?During different times of the day, I can see major peaks that push the ASA cluster into the high 80's and low 90% utilization.Q2. To combat these peaks, I'...
Two questions really.Q1. What is a safe peak for a cluster (Active/Standby) pair of ASA 5520's?During different times of the day, I can see major peaks that push the ASA cluster into the high 80's and low 90% utilization.Q2. To combat these peaks, I'...
Do others separate Server hardware in the DMZ from the inside? We use a separate Internet router, separate DMZ servers. But do we allow DMZ servers to share internal HW.Example A: Blade chassis with servers (WEB) running on VLANS in the DMZ and other...
Thanks! I immediately reposted it in the Security section and tried to delete this one in Application.As for the peaks, they last for 3-5 minutes each day at specific times that are predictable. If the application responsible for these peaks is not r...
Vulnerability Assesment teams use two products to analize rules on the PIX and ASA Firewall's."CIS Level 1 & 2 Benchmarks and Audit Tool for Cisco IOS Routers and PIX firewalls."http://www.cisecurity.org/bench_cisco.html"Nipper - Cisco Security Appli...
Teamviewer is not a point to point remote access tool, as such it requires all the clients to connect to the teamviewer.com management servers. As a result, this allows you to create ACL DROP rules agaist the known IP's that they use to do this sessi...
Simple answer, yes, use extended access lists to control traffic crossing the ASA. However, thats assuming your design is the normal 2 interface Transparent mode.Deatils...Since you using the Bridge / Transparent mode, your well aware that you are ef...