ASA5510 - SSL Access to Other Networks Visible to the SSL Host ASA
We have three locations in our WAN, each on their own ASA5510. The networks are: 10.10.10.0/24, 10.10.20.0/24, and 10.10.30.0/24. The ASA that hosts the SSL VPN connection is at 10.10.30.1. The ASA is configured so that any host in this network can access any host in the other two networks. The SSL VPN is able to access all nosts in the 10.10.30.0 network also, but not in the other two. I've tried a few access-lists and NAT-exempt statements, but with no luck. The "same security traffic permit . . . " is allowed for both inter- and intra-interface. Any ideas?
the Cisco CPN Client for a long time to connect to a VPN Server. Now I've got a new machine with a Windows 7 64 bit. The Cisco VPN Client isn't avaiable in a 64 bit version. Cisco suggests to use Cisco AnyConnect instead because there'a 64 bit version ava...
May 2016Splunk is a powerful tool for analyzing information in your organization by collecting, storing, alerting, reporting, and analyzing machine data. With Cisco platform Exchange Grid (pxGrid) Splunk is able to proactively act on received network secu...
Happy to announce that we have an updated version of our Enabling AMP on Content Security Products - Best Practices (v3.0). Please feel free to review if you have questions regarding deployment of AMP (File Reputation and File Analysis).
Updated: July 2018
New: Updated format , Netflow configuration examples per platform (End of Table)
Note: Remember the table is scrollable horizontally to view other columns, not only vertically
IOS / IOS XE