Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
In part I of "Script an ASDM Session", we looked at how to MiTM an ASDM session in order to understand how to leverage the ASDM web interface for our own automation needs. In this article, I will disect a small python app that I wrote demonstrating h...
In my BRKSEC-2031 session at the Orlando Cisco Live 2018, I talk about how to leverage the XML(ish) API that ASDM uses to communicate with an ASA (both legacy and NGFW ASAs).IntroductionPart 1 of this blog post will be a short "how to" on performing ...
Working in Network Security for a service provider, we are often asked to monitor connections for which we have no administrative access. Examples of this are leased-line connections like MPLS circuits, but could also be extended to VPN tunnels. This...
Hello,
When you connect via ASDM, ASDM will spin up an additional TCP connection to the outside interface that is independant of the main ASDM connection. As a result, you will not be able to use the RFC 1918 address as the IP of the SFR. You will ne...
Glad to hear it Wayne,
I see the rules you posted are:
access-list outside_access_in extended permit icmp any any
access-list dmz_access_in extended permit icmp any any
These rules affect ICMP packets going through the device but not to the device....
Hello A,
Good job on the intra/inter interface sysopts. It's usually the first tripping stone.
I would issue a packer-tracer with your host ips and the detailed keyword and see how the firewall is treating your packet.
I know one thing that mig...
Hello,
The shun command is used independently of threat-detection.
shuns, when entered manually, are ephemeral and not saved in running-config. So if your shun list has been cleared out, that just means that the ephemeral shun list has been cleare...