I have some users on a subnet outside our internal network - our wireless users. They are behind a 3640 running PAT/NAT (one to many NAT) - such that each user receives a 10.x.y.z address from the 3640's DHCP abilities and their source address is always one shared routable IP address. My question is - how vulnerable to hacking are all of these workstations with the 10.x.y.z to random hacking from someone out on the Internet? I am having a debate and would appreciate some input!
Thanks. What about a non-statefu non-pixl device - something like a 3640 router with PAT? Or a typical home user with one of the Linksys cable/DSL routers with PAT? How safe are these devices from being attacked?
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...