Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Anyone know if the 2 are compatible for IKEv2?According the MerakiNOTE For IKEv2Meraki Appliances build IPsec tunnels by sending out a request with a single traffic selector that contains all of the expected local and remote subnets. Certain vendors ...
Looking to deploy a pair of Firepower appliances at different locations, separated by a layer 2 link, in individual interface mode.I know this is supported on the ASA, and it is my understanding firepower supports it using FlexConfig.However i am not...
We are attempting to integrate webdialer with a customer C# directory service. This service was previously integrated with an Avaya solution, now being migrated to Cisco.Basically, we are looking to connect to CUCM to retrieve the user device informa...
I am working to integrate web dialer into an environment using SOAP. We currently use SAML ADFS for internal applicatins. I am trying to figure out how to capture the taken that is needed, to pass to CUCM, for SSO to work with CUCM. CUCM is already ...
I just installed PCA 12.1 and i am unable to remain logged in. I continue to get an error saying"Either the server is down or Server will restart in a few minutes. Close your Browser and Relaunch it after the server reboots" and am then logged out. ...
Hi All,i appreciate everyone's input.My question was in regards specifically to MX IKEv2 with a Fortigate firewall.At its most basic config, the tunnel would not come up.I did find that it is a compatible configuration, however there was a gotcha... ...
SD-WAN is similar to google maps, or waze GPS app. The app builds a route, and uses the traffic volume, transit time, and alternate paths, to find the best route to the destination. But like these apps, you can also enter additional criteria such as ...
this is not the same thing. test security-policy-match does not take into consideration the entire packet life, it only checks to see if there if there is a matching security profile. you can create a deny all at the top, followed by an allow, and ...