Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I am looking to find a way of automating the configuration of a couple hundred routers (4400's). I was thinking Prime Infrastructure might work with templates etc. I need to validate that by playing with it but has anyone used any other automation to...
Hello all..I am looking to create an MPLS lab for a project I have coming up that will leverage dual ISP's. One is easy, it will all be Ethernet while the other is not. I need to find a means of simulating T1/Bonded T1's etc. I was looking at using a...
I am at a site and have an interesting HSRP situation between two 7200 routers. These routers are running v15.0(1)M3 (AdvSecurity) IOS and configured interfaces are both G0/2 on each router.They are laid out as shown in the attached drawing, nothing ...
I have a design I am looking at putting together for a customer. There are two sites involved, AT&T has handed off Ethernet to me at my main site for a 100MB Opt-E-Man circuit.They want to use this for DR to their other site. I was thinking going cor...
I am looking to expand my current DMZ which really hasn't been leveraged for much but I plan to reconfigure it and leverage it across three sites. I am wondering what is the best was to approach what I am looking to do?Some site details1. Three sites...
My question would be, why would you want to install AMP for Endpoints on a DC that will always be inline to the NGIPS (AMP for Networks)?
Or do you not have a NGFW w/ FPS running?
Remember, AMP for Endpoints is there to protect those clients that ar...
No, that is not a valid subnet mask and you would not be allowed to input that into the ASA anyway for that reason.What you need to do is a create an object-group and then underneath that input all of your individual hosts then you reference that in ...
In the future HS69, if you want to check for shunned hosts (obviously you will see in the logs as well) you can use the following commandssh shunsh threat-detection shun