Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
MR33 hooked up to an MX64.
(see pic) So I'm sharing my wireless with someone in my apt building. I am limiting his bandwidth to 5Mb but have Speedburst enabled (MR33 - firewall and traffic shaping). When checking the historical graph data, it appear...
ASA 5505, 9.1.4
I few days ago I noticed continual activity on my WAN interface light. It's definitely coming from the outside as my cable modem activity light is also blinking consistently. This has happened previously with brute force attacks on my...
Was this due to the leap second? Our network engineers are floored that so many of our firewalls rebooted between 2 and 6am this morning.Anyone else experienced this?
ver 9.1I was able to get an internal servers RDP (changed RDP port on server) open on a non-standard port to the outside. However, I now want to change the server back to the standard 3389 internally but still require the non-standard port to be used...
We reached out to Cisco support and they just pointed us to this article.http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa
Vance,How is the appliance able to filter 443 sites if it doesn't decrypt the packets? Sorry if I'm asking simple questions. I'm really a novice at Cisco.Thanks!
Thanks Vance.How about internally?Do users that have the cert the WSA uses, and have full access to the firewall/appliance, have the ability to decrypt usernames and passwords being sent over HTTPS?