Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
This is an open question to other administrators of Cloud Web Security who are now transitioning to Umbrella. How will you transition your web filtering given that Umbrella uses a first match policy and done approach and CWS uses the cumulative rule ...
We are faced with the prospect of migrating from Cloud Web Security (CWS) to Cisco Umbrella. We have purchased the apex licenses for the enterprise and have our basic policies built in the cloud. We have been assured by Cisco (more than once), that o...
We currently have a pair of 5585x ASAs with the ASA5585-SSP-IPS10 blade that will be end of life sometime in early 2018. Given that our peak concurrent connections exceeds the 500,000 limit mentioned in an earlier post, would it be more cost effectiv...
We have been running the Cisco Botnet fliters for some time now and we are seeing thousands of dropped packets all pointing to backplane1.janrainbackplane.com, port 443 on a wide variety of ip addresses. I can find no information within the other...
I have a remote site that is normally connected to our wide area network. Their current failover solution is a ISDN BRI dialer that is not very reliable. They have a separate DSL connection to the internet. I have proposed a site to site vpn tunnel b...
If you have an open ip from your ISP provider and your current meshed topology is internet facing,apply an open public ip address to the router and place it in parallel to the ASA. Then you can drop a tunnel on the ASA and bring it up through the rou...
There are two potential issues with your configuration, first I would turn on sip inspection in policy-map global_policy
class inspection_default
inspect sip
then do a packet-tracer to see if the packet exits the firewall on port 5060. If it does, b...
Your packet tracer shows that the inbound out rule is correct, port 80 traffic will leave the firewall. Your capture does show hits against the acl, 33 to be exact. You can get a better idea of how the acl is performing by issuing:
show access-list
...
Can you explain what it is you are trying to accomplish? What type of phones? Which ports need to be opened? What external resource (server or servers) are you trying to reach? Will the phones be in a separate vlan internally?
By l2tp server do you mean this is an individual user using an l2tp client to create a vpn connection to the firewall or is it a site to site tunnel between two devices using l2tp?
If it is an individual user, then within the properties of the group ...