Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi,We are having a problem trying to get ACS 4.0 for Windows to authenticate wireless users on an RSA Token server.Our Cisco 1200 series AP is configured for WPA2 and LEAP authentication. It points at the ACS server for RADIUS authentication. Now thi...
Just to add to that. Using MPF, you can be as granular as to allow IM traffic whilst blocking file-transfers.The link mj11 provided is a good starting point. Post your MPF config (class-maps/policy-maps) if you have any problems.John
The default inspection policy-map doesn't really add much to your security policy as its only concerned with opening dynamic ports through the firewall and handling embedded IP addresses which need to be translated (e.g. NetBIOS).The only adverse eff...
CSM seems to be more of a configuration tool. I'm specifically interested in the monitoring capabilities of IME. Looks like a good alternative to MARS.
Ah I guess you're using a named authorization method rather than the default one which is why it need applying to the VTY lines. The default method would apply to all lines where not already configured.