Jump to content

Search the Community

Showing results for tags 'asa'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 55 results

  1. Cisco Adaptive Security Virtual Appliance (ASAv) - 83,3MB Use Vmware Workstation (tested with version 10) to open the .vmx, answer I copied it. At first boot the VM detects that its a clone and reboots. Ignore the "ovf environment unavailable" error. This ASAv is unlicensed and unconfigured (configure it through console)! VM configuration: 1 vCPU, 2GB RAM, 4 Network adapter (Host only) Adjust the parameters of the VM for your needs. Enjoy! Password for Unzip : CiscoASAv2014 [hide][Hidden Content]]
  2. Hi, I'm preparing the ccie security v6 lab, I'm following a very interested webinar series provided by Cisco and here is the link [Hidden Content] i'm using eve-ng as lab platform with combination of vmware esxi. and i'm looking for candidate like me to discuss and share experience. thanks Mod note (mavis): Contact the Topic Starter via PM to join the study group.
  3. Can someone help with Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, 3rd Edition?? MOVED TOPIC Topic is moved to Cisco Other Section of TRAINING OFFERS & REQUESTS sub-forum and REQ prefix added Kindly open topic in appropriate section with suitable prefix.
  4. Hi all can somebody share these valuable videos Trainer Profile on UDEMY - [Hidden Content] Thanks & Regards, CCIE619
  5. enjoy [hide][Hidden Content]]
  6. Hello Guys I Want Reimage My Firepower SSP20 Module in ROMMON I SET tftp parameter , after copy image from tftp to moudule see this Error inorder i erase module disk Bad magic number (0x0) what is the solution?? Thnks
  7. Hi every one, i need these images please share it. thanks IPS Image For ASA 5585 IPS-SSP_10-K9-sys-1.1-a-7.1-11-E4.img IPS-SSP_20-K9-sys-1.1-a-7.1-11-E4.img
  8. Hi Everyone I need These IMG and Package Please help me to download that IPS-SSM_10-K9-sys-1.1-a-7.1-10-E4.img IPS-SSM_20-K9-sys-1.1-a-7.1-10-E4.img IPS-SSM_40-K9-sys-1.1-a-7.1-10-E4.img asa904-smp-k8.bin asa916-smp-k8.bin ASA5585-SSP-IPS10 Recovery Image File IPS-SSP_10-K9-r-1.1-a-7.3-4-E4.pkg ASA5585-SSP-IPS20 Recovery Image File IPS-SSP_20-K9-r-1.1-a-7.3-4-E4.pkg
  9. Rest API package for ASA Description: Rest API package for ASA Release: 1.3.1 Release Date: 20/Mar/2016 File Name: asa-restapi-131-lfbff-k8.SPA Size: 56.27 MB (59005344 bytes) MD5 Checksum: 7eb92278854d0df404766c85185a9397 SHA512 Checksum: eeb4e456a4482b8a5d959a93d3b8cdfa... [hide][Hidden Content]]
  10. Please share full package or at least the web-install (*.pkg) images. Thx
  11. The CCIE Security V4 Lab Preparation course is part lecture, part hands-on demonstration, and focuses both on developing a structured approach to CCIE lab strategy and advanced hands-on scenarios. This course will help candidates who are nearing their CCIE lab dates to refine and consolidate their technical knowledge into an organized and effective strategy for passing their lab exams. The goal of this class is for students to finish fully prepared to take and pass their CCIE Security Lab Exam within four weeks of completing the course. More Info: [Hidden Content] [Hidden Content]
  12. [Hidden Content] CCIE Security Workbook Bundle The most popular way to prepare for your CCIE exam is with hands-on training. Our workbooks are designed to give you the skills you need to master the technologies covered in the blueprint. Workbook Bundle Includes: CCIE Security v4 Technologies Workbook CCIE Security v4 Practice Labs Workbook CCIE Security v4 Technologies Workbook INE’s CCIE Security v4 Technologies Workbook is an online interactive compilation of hands-on lab scenarios that guides you through all the technologies covered by the Version 4 blueprint and offers the building blocks for becoming a true expert and obtaining your CCIE. Whether you are preparing for the CCIE lab exam, have an upcoming security implementation project with ASA firewalls, IOS routers and switches, web security appliances, an intrusion prevention system, and access control system or Identity Services Engine, or simply want to gain real experience with these cutting-edge technologies, this workbook is for you. The tasks in this workbook are all individually focused advanced technology labs that present topics in an easy-to-follow, goal-oriented, step-by-step approach. It consists of nearly 300 scenarios with detailed breakdowns and thorough verifications to help you completely understand the technologies. The workbook is divided into multiple sections, covering each major technology from the CCIE Security Lab Exam blueprint. With a clear understanding of these security fundamentals, you will be able to predict advanced and sometimes subtle interactions when configuring multiple technologies together. CCIE Security v4 Practice Labs Workbook The CCIE Security v4 Practice Labs Workbook is an online interactive compilation of five detailed full-scale labs based on the actual CCIE Security Lab Exam. It follows a structured design that covers all topic domains from the current blueprint, and it is scoped to test you on your knowledge of the interaction between different technologies within a given network topology as well as building the network and making it functional according to given requirements. This workbook is an essential part of your final test preparation phase, after you have gained a solid understanding of all concepts from CCIE Security v4 Technologies Workbook The workbook structure closely simulates the lab exam experience; each lab should be completed within 8 hours, and all tasks total 100 points. Each task is assigned specific point values, and just like the CCIE lab exam, points are awarded only if the solution meets all given requirements and violates no restrictions. No partial credit is awarded for any task, and you must achieve a minimum score of 80 points to pass a lab. The maximum number of points possible for each core domain topic correlates to the real lab exam: System Hardening and Availability: 14% Threat Identification and Mitigation: 14% Intrusion Prevention and Content Security: 20% Identity Management: 16% Perimeter Security and Services: 20% Confidentiality and Secure Access: 16% Troubleshooting is built in to the current exam version, which contains multiple task interdependencies, so verification is critical for passing the lab exam. Excellent troubleshooting skills are critical, requiring in-depth knowledge of each individual technology. To help ensure your success, a detailed solutions guide accompanies each scenario, explaining configurations while helping you build solid verification and troubleshooting skills to pass the exam. [Hidden Content]
  13. Looking for the following items- FirePOWER Software Module for ASA5500 X-series asasfr-5500x-boot-5.4.0-763.img asasfr-sys-5.4.0-764.pkg Cisco_Network_Sensor_Patch- FireSIGHT Management Center Virtual Appliance Sourcefire_Defense_Center_Virtual64_VMware-5.4.0-763.tar.gz Sourcefire_3D_Defense_Center_S3_Patch-5.4.1-59.sh Thanks!
  14. If someone can share asa916-10-k8.bin for the ASA5520 would be much appreciated. Thanks!
  15. If someone has asa916-8-k8.bin would be much appreciated. thanks!
  16. How to reolve this. I need to connect the IOU switch with ASA
  17. Hi, here is Cisco asa924-5-k8.bin. Enjoy [Hidden Content]
  18. Hello! I am searching for the interim version of ASA 8.4.6 -5 asa846-5-k8.bin Please share! Regards, Guizmo
  19. Hi Thanks for your advice. I upload asa on ESXi but after running asa I got below error Error: CPU resource allocation is less than the minimum requirement limit of 1000MHz: If this condition persists, the performance will be lower than normal. May you give me any suggestion? Best
  20. Looks like my link was taken down. Here is a scanned copy. Quality is good (and can be made readable/searchable by using NitroPdf. [hide][Hidden Content]] Extract it first. "Right click" and select "Extract Here" with 7 zip if you have 7zip installed. It is password protected. Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, 3rd Edition (2014) By Jazib Frahim, Omar Santos, Andrew Ossipov www.ciscopress.com/store/cisco-asa-all-in-one-next-generation-firewall-ips-and-9781587143076 Cisco® ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Identify, mitigate, and respond to today’s highly-sophisticated network attacks. Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution. Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT. You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs– all designed to help you make the most of Cisco ASA in your rapidly evolving network.
  21. Hi Please Lets share here emulated images of vWLC, NAC, ISE, WSA, ASA, IPS, etc under this post PS: Please share Licenses also I will update this post when you share links. Please share emulations which you have Please help to me to update this post Cisco ACS Cumulative Patch [Hidden Content] ACS [Hidden Content] [hide][Hidden Content] [Hidden Content] [Hidden Content]] Cisco ACS 5.4 patch 6 [Hidden Content] ACS 5.3 [Hidden Content] ACS and 9 cumulative patch [Hidden Content] ACS [hide][Hidden Content]] ACS patch 5-2-0-26-11 [Hidden Content] ACS 4.2.1 [Hidden Content] vWLC [Hidden Content] NAC (.iso) [hide][Hidden Content]] ISE (.iso) [Hidden Content] WSA (shared below by dingdongccie ) [hide][Hidden Content]] WSA Trial License [Hidden Content] vWAAS: (This is OVA image of CiscovWAAS-750 Model) (I didn't download it, it is not my upload, thanks to mavis for magnet link) [hide]magnet:?xt=urn:btih:1CB1C2766D591C4C41729C1E4D7CA7569597C384&dn=Cisco-vWAAS-750-5.3.3.ova [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]] Cisco Wireless Control System 7.0.240 For Windows [Hidden Content] [Hidden Content] ASAv 9.41 [Hidden Content] ASA 8.42 Vmware Image [hide][Hidden Content]] ASA 8.02 Vmware image [hide][Hidden Content] [Hidden Content] [Hidden Content]] IPS ver 6 [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] IPS ver 7 [Hidden Content] IPS on vmware [Hidden Content] IME 7 [Hidden Content] [Hidden Content] Cisco Prime Infrastructure 3.x [Hidden Content] UNETLab Images [Hidden Content] UPDATED: 30 April 2016
  22. Hi there, i have a problem with Routing on ASA 5505 (the image is: Cisco Adaptive Security Appliance Software Version 8.2(2), with Base licence: Licensed features for this platform: Maximum Physical Interfaces: 8 VLANs: 3, DMZ Restricted). Here is a brief explanation of the topology: ASA Interface Ethernet 0/0 nameif outside switchport access vlan 11 ASA Inteface VLAN 11: description Outside Interface for Internet IP: A.A.A.2/30 <- DC endpoint Upstream IP: A.A.A.1/30 There is a Cisco Switch connected to one of ASA Ethernet ports, forming Public/DMZ VLAN (ID 500) segment. ASA Interface Ethernet 0/2 nameif public switchport access vlan 500 ASA Inteface VLAN 500: description Public/DMZ VLAN IP: B.B.B.1/26 Cisco 3750 Interface VLAN 500: IP: B.B.B.2/26, - default gateway: B.B.B.1, - IP Routing enabled on Switch. From the Cisco Switch I can access the Internet with Source IP: B.B.B.2. Now I have asked from DC additional subnet: C.C.C.0/26 and they have it routed correctly towards the ASA Outside interface IP: A.A.A.2. I have created additional Public2 VLAN on the Switch with IP address of: C.C.C.1/26. It's going to serve as default gateway because of the ASA 3 VLAN limitation with Base licence. On the ASA 5505 i've added the route to this Public2 VLAN: #route public C.C.C.0 B.B.B.2 1 Now the problem is that from the Switch with Source IP: C.C.C.1 i can ping ASA 5505 Public VLAN IP: B.B.B.1 so the routing between subnets B.B.B.0/26 and C.C.C.0/26 is working OK on both the ASA 5505 and the Switch. But I can't access the Internet from the Switch with Source IP: C.C.C.1.
  • Create New...