I have a Firepower 2110 that I've registered to a FMC. I configure interfaces, push platform settings, access-control policies, etc, through the FMC.
I then break the SFtunnel communication by installing a new security pack version from the FXOS ...
Hello Everyone, I have the following configuration in place: crypto ipsec ikev2 ipsec-proposal INTERIM protocol esp encryption aes protocol esp integrity sha-1 crypto dynamic-map DYNMAP 65535 set pfs group5crypto dynamic-map DYNMAP 65535 set ikev2 i...
Hopefully someone from Cisco can chime in on this. When TCP intercept is enacted via embryonic connection limits and SYN cookies are used, does the ASA act as a full proxy, with separate front and back end connections, or does it 'splice' the connec...
Unfortunately I cannot share much of the configuration details other than that I have a ASA 5510 with 256MB RAM running 7.2(3) code. I was troubleshooting a sharp spike in memory utilization (from 41% used to 91% used in the span of 2 hours) when I ...
So lets say we have the following configuration:=============================================Interface Gigabitethernet0/1nameif insidesecurity-level 100speed 1000duplex fullip address 192.168.1.1 255.255.255.0Interface Gigabitethernet0/2nameif dmzsec...
There is no definitive answer to this. Your explanation of the scenario is so vague that it makes it impossible to determine anything. What is "real life" if we don't know the device's purpose?The ASA (the first generation line) will almost always ...
You only need 1 debug for this.debug crypto isakmp 254Post the output from this when you try to connect, along with the sanitized output of:show run cryptosh run tunnel-groupsh run group-policysh run ip local pool and we can get a better idea of wher...
It's something local to your workstation. I use Windows 7 as my office workstation and have tested hundreds of client VPN configurations without issue. There are also probably 50+ other technicians in my office who run Windows 7, do the same type o...
Are you sure you changed the VPN idle timeout under the correct group policy? I've configured tunnels to ISG's running ScreenOS many times without issue. Enable logging or turn on the ISAKMP debugs on the ASA and see if you can see a delete message...