Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Cisco Fire Power Services (6.2.1) are running on ASA 5555x (9.10(1)), from couple of months we are not getting any data under Analysis->Connections>Events. So far we tried rebooting FMC vm and ASA firewalls but still on luck, please advise how to rec...
Hello everyone, we are in a process to deploy Cisco Client-less VPN in our production environment but during our testing we face some challenges, please help me to answer below concerns.SSL Vulnerabilities with no workarounds and fixes provided by Ci...
Using Cisco ISE 2.3, how to setup device authentication(AAA) services with MFA(PortalGuard) PortalGuard is integrated with Active directory so we need different authorization polices for AD users/groups as required.
We have multiple data and voice VLANs and accordingly separate DHCP scopes are defined in Microsoft based DHCP server. On core switch, for each vlan interface (svi) ip helper-address command is configured with correct DHCP server. Now randomly user ...
I am facing certificate mismatch issues on my Cisco AnyConnect VPN setup on ASA 5516X ver 9.5(1).
I have setup SSL certificate on my ASA from a trusted CA. (godaddy) with the help of following article and didn't encounter any error during certificate...
Use "Solarwinds Kiwi CatTools" to back your configurations; backup need to setup using SNMP and this tool generate backup configs files with PSKs in plain text. -- Muhammad Zahid
What's the issue you are facing? is it blocking legitimate connection or not blocking any ssh request at all ?Verify either any traffic hitting to your acl "show access-list VTY_ACL"
Enable Secret: hashes your enable password so that even if someone has access to the configuration and could copy / paste the code into a Cisco Password Cracker they still wouldn't be able to figure out what the correct password is.Service password-e...
Object-group doesn't support in in standard ACLs, you can add host or network subnet in standard ACL to filter VTY access, try following config example. ip access-list standard VTY_ALLOW permit 10.1.1.1 permit 10.2.1.0 0.0.0.127line vty 0 15 transpor...
You can view your "vpn" context complete configs including PSK's from system context using command “more disk0:/vpn.cfg”.Make sure you are executing it from system context or first “changeto context system” - Muhammad Zahid