Network Security

Engage with peers and experts on network security topics such as FTD, FMC, FDM, CDO and ASA.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Cisco CyberSecurity

Labels

Forum Posts

We have a site that requires access to a single outside address.   No access is required outside to inside.This inside does require certain ports to accessed whcih are listed configed in the attached config.      We are unable to access the vendor at...

Hi guys,I am wondering whether the vpn feature of asa5510 can be used in transparent modeor not . My expected diagram is included in attachement.In the diagram, Both firewall need to be established with vpn peering.Sent from Cisco Technical Support i...

gkadudfo1 by Level 1
  • 295 Views
  • 1 replies
  • 0 Helpful votes

This is more liked a router question. But I need to implement it on an ASA5515-X, let see if it's possible to do so.How can I only route one internal host to use a backup WAN link?I check the "route" command on ASA, doesn't seem to be an option...Tha...

Keithshum by Level 1
  • 980 Views
  • 9 replies
  • 0 Helpful votes

Здравствуйте знатоки Cisco! Обчитавшись про блокировку URL ( https://supportforums.cisco.com/docs/DOC-21128#__URL_______URL__  )решил настроить это добро, благо подвернулась ASA 5505 с Sec+Раньше работал с tik'ами поэтому  в  Cisco новичек обчитанный...

sudo20121 by Level 1
  • 673 Views
  • 3 replies
  • 0 Helpful votes

Running 8.2(2) on an ASA5510I've created a DMZ using the 172.30.0.0/24 subnet and set up NAT so that I can access the server from the outside.  Everything works great.  What do I need to do to allow people behind the INSIDE interface to get to the se...

Guys we have a scenario in which we have. Ce router connected to the wan (MPLA cloud) on the LAN side it's connected to Asa  the connectivity is router connected to the switch and Asa is connected to the switch as ......we have IPSec VPN to the data ...

We have reconfigured our network and have decommissioned a few ASA 5505s.  I would like to allow these devices to be repurposed but do not want to allow any other business units to be able to recover and access our configuration information.  I have ...

nschutte by Level 1
  • 913 Views
  • 3 replies
  • 0 Helpful votes