Member since ‎04-14-2015

User Statistics

  • 3 Posts
  • 0 Solutions
  • 0 Helpful votes Given
  • 0 Helpful votes Received

User Activity

How the access to / from the ASA device controlled? 1. What about traffic originating from the ASA? Example Syslog traffic, SNMP trap, TACACS etc. going to devices to the "inside" interface. Do we need any kind of access list or how do we control thi...
Community Statistics
Member Since ‎04-14-2015 10:43 AM
Date Last Visited ‎08-18-2017 03:53 AM
Posts 3