I've been using it for several months now. I did a bit of research before I installed it here and I found that most people with Cisco are using it.
I've also installed D-Shield on the same machine and it sends reports back to D-Shields server about the hack attempts and then sends emails to the Abuse/Security address for the Owners of the originating domain/IP subnet.
We Log our Data to a SQL Server so we can Query it when ever we like. The SQL Server We have a Scheduled task so to cleans up the log table and keeps the last X days of log.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
[toc:faq]Introduction:This document describes details on how NAT-T
works.Background:ESP encrypts all critical information, encapsulating
the entire inner TCP/UDP datagram within an ESP header. ESP is an IP
protocol in the same sense that TCP and UDP are I...