Jump to content

Search the Community

Showing results for tags 'ASA'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 47 results

  1. The following are included in the linked archive: CSR1000v 16.2.2 (csr1000v-universalk9.16.2.2-ext.qcow2) CSR1000v 3.17 (csr1000v-universalk9.03.17.00.S.156-1.S-ext.qcow2) XRv 6.0.1 (iosxrv-k9-demo-6.0.1.qcow2) OS XRv 9000 6.0.1 (xrv9k-fullk9-x.qcow2-6.0.1) ASAv 9.5.2 (asav952-204.qcow2) IOSv 15.6(2)T (vios-adventerprisek9-m.vmdk.SPA.156-2.T) IOSvL2 15.2(4055)E (vios_l2-adventerprisek9-m.vmdk.SSA.152-4.0.55.E) NX-OSv 7.3.0 (titanium-final.7.3.0.D1.1.qcow2) All downloaded from Cisco's VIRL downloads. Link and Password: [Hidden Content]
  2. Has anyone got "Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide" to study and learn? Thanks
  3. Just download ASA-5500-x Next-Generation Firewalls others are incomplete [Hidden Content]
  4. Hi Guys, Just a quick question, possibly a newbie question, so I do apologise. I am relatively new to setting up and configuring an ASA so I am self teaching myself. My question is, if you update your ASA IOS or ASDM version, does that change your ASA Licence in any way? My ASA is a Cisco 5540 and it is running an older version of ADSM, 7.5 if I remember correctly, and ASA 9.1.7. As it was bought 2nd hand, and if I try to update the software, I have read that your licence key would no longer be valid. The ASA currently has a Premium licence and I don't wish to lose that. Any help would be greatly appreciated!! Thanks all!!
  5. i have NATing conflict to publishing services . as show on below configuration still not publishing Configurations: o On router Static route to gateway 80.49.116.169 o Dynamic NAT on mobily router Access-list Static route with private IP between ASA and mobily router. NATing on ASA with public IPs . router ip nat inside source list natlist interface FastEthernet4 overload ip route 0.0.0.0 0.0.0.0 80.49.116.x/29 ! ! ip access-list extended natlist permit ip 192.168.2.0 0.0.0.255 any permit ip 192.168.22.0 0.0.0.255 any permit ip 40.80.100.0 0.0.0.255 any ASA object network Public_DMZ_1 host 80.49.116.160 nat (DMZ_1,outside) source dynamic DMZ_1_Network Public_DMZ_1
  6. Hi Ladies, could somebody share ASA 8.2(5) in qcow2 format with us.I tried a lot to get this image but not luck so far. Thanks in advance. Itree
  7. For Cisco ASA Firewall 5500 series.this image is different than previous images and requires more memory.for Cisco ASA 5520 it was asking for 2 Gigs RAM so for Cisco ASA 5510 it should work with 1 Gigs RAM.for 5540/5550 the 2 GB RAM is enough to run the image warning:with less than the required RAM.it would issue warning and it may impact the performance of the Cisco ASA or it may crash as well so before putting adequate RAM.do not install this image. Cisco ASA 917-K8 IOS password:h4x0r
  8. Anyone have access to these. Cisco has taken away my access >.<
  9. I'm running a IOU23 and I want to use ASA image. I got the ASA image v 9 from this forum and I'm trying to upload it in my topology using manage---- upload--- ios tab. And nothi happens. Can someone explain how can I upload the ASA image to use it in my lab?
  10. Hey all I have a Cisco ASA 5510 with the public interface connecting to a router owned by the ISP. The network between the router and the firewall uses the public IP addresses 203.0.113.0/28. We bought a new public IP address block (192.0.2.16/28) and the ISP router routes this range to our public IP address (203.0.113.2). Is it possible to use our new address range for static NAT and if so, can I use all 16 IP address for NAT? Since the ISP router routers all 16 IP addresses from 192.0.2.16 through 192.0.2.31 to my firewall, can I create NAT commands like (config)# static(inside,outside) 192.0.2.16 172.0.16.5 netmask 255.255.255.255 tcp 0 0 udp 0 I would assume this to be possible but I am unable to test this on the production firewall and don't have a lab setup.
  11. Guys, I was trying to build one Security GNS3 topology..Topology is loading and i am getting 2 Qemu screens.. but after that Qemu is getting closed. PLease check my GNS3 configuration and give me some solutions. My Lap is i3 with 2 GB RAM. autostart = False version = 0.8.2-BETA [qemu 127.0.0.1:10525] workingdir = work udp = 20000 [[5520]] ram = 256 netcard = e1000 options = -hdachs 980,16,32 initrd = asa802-k8.initrd.gz kernel = asa802-k8.kernel kernel_cmdline = auto console=ttyS0,9600 bigphysarea=16384 ide1=noprobe [[iDS-4215]] image1 = disk1 image2 = disk2 nics = 3 ram = 1024 netcard = e1000 options = -smbios type=1,product=IDS-4235 [[ASA ASA2]] e0 = SW2 f1/10 e1 = SW1 f1/9 e2 = SW2 f1/11 x = -79.0 y = 254.0 z = 1.0 hx = 9.0 hy = 19.0 [[ASA ASA1]] e0 = SW2 f1/8 e1 = SW1 f1/8 e2 = SW2 f1/9 x = -78.0 y = 193.0 z = 1.0 hx = 11.0 hy = 16.0 [[iDS IDS1]] e0 = SW1 f1/7 e1 = SW2 f1/7 x = -69.3406204335 y = 133.477705423 z = 1.0 hx = 3.67157287526 hy = 14.5979797464 [127.0.0.1:7200] workingdir = work udp = 10000 [[3745]] image = C:\GNS3\Image\c3745-adventerprisek9-mz.124-25d.bin idlepc = 0x6148b534 sparsemem = True ghostios = True [[ROUTER R4]] model = 3745 console = 2003 aux = 2100 wic0/0 = WIC-2T f0/0 = SW1 f1/4 f0/1 = SW2 f1/4 slot1 = NM-4T s1/0 = FR2 4 x = -83.0 y = -101.0 z = 1.0 hx = 18.5 hy = 18.0 [[ROUTER R2]] model = 3745 console = 2022 aux = 2102 wic0/0 = WIC-2T f0/0 = SW1 f1/2 f0/1 = SW2 f1/2 slot1 = NM-4T s1/0 = FR2 2 x = -81.0832611207 y = -236.960461481 z = 1.0 hx = 19.0857864376 hy = 20.2548339959 [[ROUTER R3]] model = 3745 console = 2023 aux = 2103 wic0/0 = WIC-2T f0/0 = SW1 f1/3 f0/1 = SW2 f1/3 slot1 = NM-4T s1/0 = FR2 3 s1/1 = FR2 13 x = -78.2548339959 y = -166.249783362 z = 1.0 hx = 19.0857864376 hy = 20.2548339959 [[ROUTER R1]] model = 3745 console = 2021 aux = 2101 wic0/0 = WIC-2T f0/0 = SW1 f1/1 f0/1 = SW2 f1/1 slot1 = NM-4T s1/0 = FR2 1 x = -79.6690475583 y = -310.499566724 z = 1.0 hx = 17.6715728753 hy = 18.8406204335 [127.0.0.1:7201] workingdir = C:\GNS3\Work udp = 10100 [[3745]] image = C:\GNS3\Image\c3745-adventerprisek9-mz.124-25d.bin idlepc = 0x6148b534 sparsemem = True ghostios = True [[ROUTER R5]] model = 3745 console = 2011 aux = 2104 wic0/0 = WIC-2T f0/0 = SW1 f1/5 f0/1 = SW2 f1/5 slot1 = NM-4T s1/0 = FR2 5 x = -81.0 y = 19.0 z = 1.0 hx = 19.5 hy = 19.0 [[ROUTER R6]] model = 3745 console = 2012 aux = 2105 wic0/0 = WIC-2T f0/0 = SW1 f1/6 f0/1 = SW2 f1/6 slot1 = NM-4T s1/0 = FR2 6 x = -65.8578643763 y = 76.8284271247 z = 1.0 hx = 20.5 hy = 21.8284271247 [[FRSW FR2]] 1:102 = 2:201 1:103 = 3:301 1:104 = 4:401 1:105 = 5:501 1:113 = 13:311 2:201 = 1:102 2:203 = 3:302 2:204 = 4:402 2:205 = 5:502 2:213 = 13:312 3:301 = 1:103 3:302 = 2:203 3:304 = 4:403 3:305 = 5:503 4:401 = 1:104 4:402 = 2:204 4:403 = 3:304 4:405 = 5:504 4:413 = 13:314 5:501 = 1:105 5:502 = 2:205 5:503 = 3:305 5:504 = 4:405 5:513 = 13:315 6:51 = 21:51 6:100 = 21:100 6:101 = 21:101 6:201 = 21:201 6:301 = 21:301 6:401 = 21:401 13:311 = 1:113 13:312 = 2:213 13:314 = 4:413 13:315 = 5:513 21:51 = 6:51 21:100 = 6:100 21:101 = 6:101 21:201 = 6:201 21:301 = 6:301 21:401 = 6:401 1 = R1 s1/0 2 = R2 s1/0 3 = R3 s1/0 4 = R4 s1/0 5 = R5 s1/0 6 = R6 s1/0 13 = R3 s1/1 21 = BB1 s1/1 x = 174.403679018 y = -297.205627484 z = 1.0 [[ROUTER SW1]] model = 3745 console = 2008 aux = 2106 wic0/0 = WIC-2T slot1 = NM-16ESW f1/0 = nio_gen_eth:\Device\NPF_{6592AF0E-4A79-4077-8AF2-A2680D4A7E2C} f1/1 = R1 f0/0 f1/2 = R2 f0/0 f1/3 = R3 f0/0 f1/4 = R4 f0/0 f1/5 = R5 f0/0 f1/6 = R6 f0/0 f1/7 = IDS1 e0 f1/8 = ASA1 e1 f1/9 = ASA2 e1 f1/12 = BB2 f0/0 f1/13 = SW2 f1/13 f1/14 = SW2 f1/14 f1/15 = SW2 f1/15 symbol = multilayer_switch x = -350.5 y = -41.5 z = 1.0 hx = 7.41421356237 hy = 14.5441558773 [[ROUTER SW2]] model = 3745 console = 2009 aux = 2107 wic0/0 = WIC-2T slot1 = NM-16ESW f1/1 = R1 f0/1 f1/2 = R2 f0/1 f1/3 = R3 f0/1 f1/4 = R4 f0/1 f1/5 = R5 f0/1 f1/6 = R6 f0/1 f1/7 = IDS1 e1 f1/8 = ASA1 e0 f1/9 = ASA1 e2 f1/10 = ASA2 e0 f1/11 = ASA2 e2 f1/12 = BB3 f0/0 f1/13 = SW1 f1/13 f1/14 = SW1 f1/14 f1/15 = SW1 f1/15 symbol = multilayer_switch x = 208.5 y = -40.5 z = 1.0 hx = 2.34314575051 hy = 15.5441558773 [127.0.0.1:7204] workingdir = C:\GNS3\Work udp = 10400 [[7200]] image = C:\GNS3\Image\c7200-adventerprisek9-mz.124-24.T5.extracted.bin.BIN ghostios = True [[ROUTER BB3]] console = 2015 aux = 2108 slot0 = C7200-IO-FE f0/0 = SW2 f1/12 slot1 = PA-8T s1/0 = BB1 s1/0 x = 337.931890781 y = -135.209019353 z = 1.0 [[ROUTER BB2]] console = 2013 aux = 2109 slot0 = C7200-IO-FE f0/0 = SW1 f1/12 slot1 = PA-4T+ x = -355.902812468 y = -154.539971795 z = 1.0 [127.0.0.1:7203] workingdir = C:\GNS3\Work udp = 10300 [[7200]] image = C:\GNS3\Image\c7200-adventerprisek9-mz.124-24.T5.extracted.bin.BIN ghostios = True [[ROUTER BB1]] console = 2011 aux = 2110 slot0 = C7200-IO-2FE slot1 = PA-8T s1/0 = BB3 s1/0 s1/1 = FR2 21 x = 291.720779388 y = -245.909596204 z = 1.0 [GNS3-DATA] m11 = 0.707106781187 m22 = 0.707106781187 [[NOTE 1]] text = [[ROUTER SW2]]\n model = 3725\n console = 2009\n wic0/0 = WIC-2T\n f1/0 = Lo2\n slot1 = NM-16ESW\n f1/1 = R1 f0/1\n f1/2 = R2 f0/1\n f1/3 = R3 f0/1\n f1/4 = R4 f0/1\n f1/5 = R5 f0/1\n f1/6 = R6 f0/1\n f1/7 = IDS3 e1\n f1/8 = ASA1 e0\n f1/9 = ASA1 e2\n f1/10 = ASA2 e0\n f1/11 = ASA2 e2\n f1/12 = BB3\n f1/13 = SW1 f1/13\n f1/14 = SW1 f1/14\n f1/15 = SW1 f1/15 x = 337.997041407 y = -65.7401153702 z = 2.0 [[NOTE 2]] text = [[ROUTER SW1]]\n model = 3725\n console = 2008\n wic0/0 = WIC-2T\n slot1 = NM-16ESW\n f1/0 = Lo1\n f1/1 = R1 f0/0\n f1/2 = R2 f0/0\n f1/3 = R3 f0/0\n f1/4 = R4 f0/0\n f1/5 = R5 f0/0\n f1/6 = R6 f0/0\n f1/7 = IDS3 e0\n f1/8 = ASA1 e1\n f1/9 = ASA2 e1\n f1/10 = Lo3 (vlan 23)\n f1/12 = BB2\n f1/13 = SW2 f1/13\n f1/14 = SW2 f1/14\n f1/15 = SW2 f1/15 x = -528.915872327 y = -47.3553390593 z = 2.0 [[NOTE 3]] text = [[FRSW FR1]]\n 1:102 = 10:201\n 1:103 = 11:301\n 1:104 = 13:401\n 1:105 = 14:501\n 10:201 = 1:102\n 11:301 = 1:103\n 13:401 = 1:104\n 14:501 = 1:105\n 1 = R1 s0/0\n 10 = R2 s0/0\n 11 = R3 s0/0\n 13 = R4 s0/0\n 14 = R5 s0/0 x = -511.945309579 y = -292.01428535 z = 2.0 [[Cloud C3]] symbol = computer x = -357.769119346 y = 114.749783363 hx = 16.2573593129 hy = 7.52691193456 z = 1.0 connections = SW1:f1/0:nio_gen_eth:\Device\NPF_{6592AF0E-4A79-4077-8AF2-A2680D4A7E2C} [[Cloud C4]] symbol = computer x = 202.259451354 y = 191.11731573 z = 1.0
  12. 4 Questions in ASA Section: 1. ASA1 Initialization 2. ASA2 Initialization 3. ASA2 NAT 4. ZBF on R3 Problems . 1. ASA1 Initialization a. 2 Context with 2 Interfaces each , nothing mentioned about Redundant Interface. but the question says use unique mac address for each context interface. ???? Big Confusion. 2. ASA2 Initialization a. Question says there is partial configuration, but there is NOTHING ..... so u loose marks 3. ASA2 NAT a. Double NAT on both ASA for WebServer traffic (80,443) ... no issues 4. ZBF on R3 a. confusion on which interface is Internal and external ..... wrong configuration causes OSPF problems.
  13. Guys... I am trying to practice the Active / Standby failover scenario in GNS3. Every time when I try to configure standby address on the interface it gives me following error message... "Cannot configure standby IP address because this unit lack failover license support." When I looked into the "licensing" part, it said the Failover license is "disabled". May I know how to enable it? Any one please help... I am running version 8.4 (2) on ASA 5520...
  14. Looking for these two things: Latest (2/21/13) ASA CSD image: csd_3.6.6234-k9.pkg Cisco NAC guest server UPGRADE file 11/27/2012 nac-guest-upgrade-2-1-0.bin
  15. [hide][Hidden Content]] ad_agent-v1.0.0.32.1-build-598.installer.exe
  16. Dear All, For new lab please help me confirm the below things, 1. In IPS, what is the direction of the configure signature a. To-service b.From-Service 2. In ASA section ZBF is the below correct and final or the final arrangement is different interface FastEthernet0/0.1 zone-member security internal interface FastEthernet0/0.2 zone-member security internal interface FastEthernet0/1 zone-member security external 3. Is the NAT question same as old lab or it is different ? 4. What about the backup interface should it be the part of OSPF or not ? Mentioning that I have finalized these solutions from my behalf and willing to share the whole configuration what so ever with any body. Also I have verified solution for the very old lab which was not coming and which the new lab is predecessor off. Thanks
  17. Hi Everyone I am looking for the new ASA 9.1.2 release - asa912-k8.bin & asdm-713.bin Description: Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. Release: 9.1.2.ED Release Date: 14/May/2013 File Name: asa912-k8.bin Size: 26.21 MB (27482112 bytes) MD5 Checksum: 4388e8972e63a40c917653bbf6909406 Description: Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, and 9.1. Release: 9.1.2.ED Release Date: 14/May/2013 File Name: asdm-713.bin Size: 17.26 MB (18097844 bytes) MD5 Checksum: 92b9ebd9f8abddc7ee3c904752c99354
  18. Cisco ASA Second Generation's OS 9.x EBOOK [hide][Hidden Content]]
  19. Hi Thanks to ccie4lab Video Series Length:275 minutes Below are the topics included in this training package: Video Series (Cisco ASA 8.4 & later using ASDM) Updates - Cisco ASA OS version 9.X Concepts and Design Initial Access Interfaces configured using VLAN tags WAN Interface and Default Gateway Cisco ASA Upgrade Cisco ASDM image upgrade Base Configuration Device Access using Telnet or SSH Disabling Proxy-ARP DHCP Static Routes PAT using WAN Interface NAT Port Redirect using WAN interface (single port, multiple ports) Static NAT Firewall Policies Firewall Policies using Object Groups ACL Manager for Firewall Policies Client IPSec VPN Cisco SSL VPN using Tunnel Mode (SVC) SSL VPN Web Portal Customization SSL VPN Troubleshooting Site-Based VPN (LAN-to-LAN) Tools: Ping, Traceroutes Viewing Firewall Connections Packet Capture Netflow and SNMP Backup and Restore Putting firewall to Factory Defaults Enabling Anti-Spoofing Basic Application Inspection Rate Limiting (Policing) EIGRP Routing OSPF Routing Active/Passive Failover [*]Workbook Solution: Cisco ASA and Other Cisco Firewalls (IOS, FWSM) Cisco ASA 5500 Series Base Configuration Device Access (SSH, Telnet) NAT (Static, PAT, NAT Port Redirect) HTTP and ASDM ASA Image Stateful Firewall DHCP Server OSPF Routing PPPoE LDAP integration with Active Directory for Remote Access Remote Access: SSL VPN (Tunnel Mode/SVC) Remote Access: Client IPSec VPN Remote Access: L2TP over IPSec Site-Based VPN without Remote Access Site-Based VPN with Remote Access IP SLA with Dual ISP Rate Limiting (Policing) Active/Passive Failover Troubleshooting Cases [*]Cisco PIX, Cisco IOS Firewalls, FWSM Cisco PIX: Remote Access using Client IPSec VPN Cisco PIX: PPTP (VPDN) Cisco PIX: Active/Passive Failover Cisco PIX: Authentication Proxy Cisco FWSM for Catalyst 6500 Series Cisco ACL: Guest/DMZ ACL Policy Cisco ACL: Outbound ACL Policy Cisco ACL: RFC 1918 Filtering Cisco IOS Firewall: Reflexive ACL Cisco IOS Firewall: Context-Based Access Control (CBAC) Time-Based ACL Zone Based Policy Firewall (ZFW) [*]Equipment Used in Training Package Cisco ASA 5500 Series (ASA 5505, ASA 5510) Cisco PIX 500 Series (PIX 515) Cisco IOS Routers: CIsco ISR 800, Cisco ISR 2800 Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series [Hidden Content] magnet torrent link [Hidden Content]
  20. Hi All. I going crazy here :-) Below is the config from my ASA5520, and I just cannot connect to the ASDM. From the browser I put in 192.168.1.1 and the page just times out, no page available at all. Any help please :-) Thanks everyone. ciscoasa# show run : Saved : ASA Version 8.2(5)48 ! hostname ciscoasa enable password v9jZqu/1TPaW0 encrypted passwd 2KFbNIdI.KYOU encrypted names ! interface GigabitEthernet0/0 shutdown no nameif no security-level no ip address ! interface GigabitEthernet0/1 shutdown no nameif no security-level no ip address ! interface GigabitEthernet0/2 shutdown no nameif no security-level no ip address ! interface GigabitEthernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 nameif management security-level 100 ip address 192.168.1.1 255.255.255.0 management-only ! ftp mode passive pager lines 24 logging asdm informational mtu management 1500 no failover icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-731.bin no asdm history enable arp timeout 14400 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy http server enable http 192.168.1.0 255.255.255.0 management no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd address 192.168.1.2-192.168.1.254 management dhcpd enable management ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept webvpn ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options ! service-policy global_policy global prompt hostname context no call-home reporting anonymous Cryptochecksum:80854f6d93a65a0031fc6bcb8069ad26 : end ciscoasa# ciscoasa# show flash --#-- --length-- -----date/time------ path 76 15464448 Aug 17 2014 04:41:00 asa825-48-k8.bin 77 25088760 Aug 17 2014 05:15:46 asdm-731.bin 3 4096 Aug 17 2014 04:43:54 log 8 4096 Aug 17 2014 04:44:04 crypto_archive 9 4096 Aug 17 2014 04:44:08 coredumpinfo 10 43 Aug 17 2014 04:44:08 coredumpinfo/coredump.cfg 255320064 bytes total (214401024 bytes free) ciscoasa#
  21. Hi, Can anybody please explain the process of processing a crypto map on an interface ? Crypto Map priortiy ? Flow of packet from Engine to interface and then processing of crypto map ? I am trying to do S2S between R1 & R2 and Remote access between a client (connected to ISP) and R1, and if the priority/line entry of Crypto Map (Remote Acess) is > Crypto Map (S2S) then VPNs stop working properly. (e.g. for RA crypto map entry is at line 10 and for S2S crypto map entry is at 111)
  22. Hi Im a bit confused with the firepower services. I just got a 5515-x from work and won't to try and learn firepower with it. What files do I need and how to I install them? Is there a crack license or a trial? Regards.
  23. Download Latest Cisco ASA Firepower Full Video Series !! Video List: SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2) SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 1) SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2) SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1) SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 3) SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 2) SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 1) SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 3) SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 2) SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 1) SEC0225 - ASA Firepower 6.0 Multiple Domain Management (Part 2) SEC0225 - ASA Firepower 6.0 Multiple Domain Management (Part 1) SEC0224 - ASA Firepower 6.0 New Features and Web Interface Update (Part 2) SEC0224 - ASA Firepower 6.0 New Features and Web Interface Update (Part 1) SEC0180 - ASA FirePower Backup and Restore SEC0179 - ASA FirePower External User Authentication SEC0178 - ASA FirePower Traffic Profile SEC0177 - ASA FirePower Event Correlation and Remediation (Part 2) SEC0177 - ASA FirePower Event Correlation and Remediation (Part 1) SEC0176 - ASA FirePower Compliance Enforcement with Whitelist SEC0175 - ASA FirePower IPS Custom Rule SEC0174 - ASA FirePower IPS Advance (Part 2) SEC0174 - ASA FirePower IPS Advance (Part 1) SEC0173 - ASA FirePower IPS Basic (Part 2) SEC0173 - ASA FirePower IPS Basic (Part 1) SEC0172 - ASA FirePower Malware Detection (Part 2) SEC0172 - ASA FirePower Malware Detection (Part 1) SEC0171 - ASA FirePower File Type Filtering (Part 2) SEC0171 - ASA FirePower File Type Filtering (Part 1) SEC0170 - ASA FirePower URL and Web Category Filtering (Part 2) SEC0170 - ASA FirePower URL and Web Category Filtering (Part 1) SEC0169 - ASA FirePower Custom Application Detector (Part 2) SEC0169 - ASA FirePower Custom Application Detector (Part 1) SEC0168 - ASA FirePower Application Filtering (Part 2) SEC0168 - ASA FirePower Application Filtering (Part 1) SEC0167 - ASA FirePower Security Intelligence (Part 2) SEC0167 - ASA FirePower Security Intelligence (Part 1) SEC0166 - ASA FirePower Object and Access Control (Part 2) SEC0166 - ASA FirePower Object and Access Control (Part 1) SEC0165 - ASA FirePower Network Discovery (User with AD User Agent) (Part 2) SEC0165 - ASA FirePower Network Discovery (User with AD User Agent) (Part 1) SEC0164 - ASA FirePower Network Discovery (Host and Application) (Part 3) SEC0164 - ASA FirePower Network Discovery (Host and Application) (Part 2) SEC0164 - ASA FirePower Network Discovery (Host and Application) (Part 1) SEC0163 - ASA FirePower Introduction to FireSight Web Interface (Part 2) SEC0163 - ASA FirePower Introduction to FireSight Web Interface (Part 1) SEC0162 - ASA FirePower Software Update SEC0161 - ASA FirePower Device Management and License Install SEC0160 - ASA FirePower FireSight Basic Configuration (Part 2) SEC0160 - ASA FirePower FireSight Basic Configuration (Part 1) SEC0159 - ASA FirePower FireSight System Installation SEC0158 - ASA FirePower Service Installation Cheers [hide][Hidden Content]]
  24. Neil21

    ASA

    Cisco ASA Firewall Fundamentals - 3rd Edition: Step-By-Step Practical Configuration Guide Using the CLI for ASA v8.x and v9.x
  25. I recently purchased a Cisco ASA 5550 which came with the Cisco ASA-SSM-40 which is the AIP Security Service Module I would like to upgrade this to the latest version which is as follows: Intrusion Prevention System (IPS) Recovery Software - 7.1(7)E4 IPS SSM_40 Recovery Image File IPS-SSM_40-K9-r-1.1-a-7.1-7-E4.pkg 25-FEB-2013 37.37 MB [Hidden Content] Intrusion Prevention System (IPS) Signature Updates - S947 E4 Signature Update S947 IPS-sig-S947-req-E4.pkg 11-OCT-2016 1.54 MB [Hidden Content] Intrusion Prevention System (IPS) System Software - 7.1(7)E4 IPS-SSM_40 System Image File IPS-SSM_40-K9-sys-1.1-a-7.1-7-E4.img 25-FEB-2013 37.32 MB [Hidden Content] Intrusion Prevention System (IPS) System Upgrades - 7.1(7)E4 IPS SSM_40 Service Pack Upgrade IPS-SSM_40-K9-7.1-7-E4.pkg 25-FEB-2013 39.14 MB [Hidden Content]
×
×
  • Create New...