Jump to content

Search the Community

Showing results for tags 'firewall'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 26 results

  1. Hi guys, I am looking to build a practice lab for FTD/FMC but I dont have any supporting files to do that. Please if anyone have already build a lab, kindly share the topology or unl file and supporting files. I have heard there is evaluation licence period of 90 days in FTD, does anybody knows how to leverage that ?
  2. i have NATing conflict to publishing services . as show on below configuration still not publishing Configurations: o On router Static route to gateway 80.49.116.169 o Dynamic NAT on mobily router Access-list Static route with private IP between ASA and mobily router. NATing on ASA with public IPs . router ip nat inside source list natlist interface FastEthernet4 overload ip route 0.0.0.0 0.0.0.0 80.49.116.x/29 ! ! ip access-list extended natlist permit ip 192.168.2.0 0.0.0.255 any permit ip 192.168.22.0 0.0.0.255 any permit ip 40.80.100.0 0.0.0.255 any ASA object network Public_DMZ_1 host 80.49.116.160 nat (DMZ_1,outside) source dynamic DMZ_1_Network Public_DMZ_1
  3. A Palo Alto Networks Certified Network Security Engineer (PCNSE) is capable of designing, deploying, configuring, maintaining and troubleshooting the vast majority of Palo Alto Networks-based network security implementations. Passing the PCNSE7 and exhibiting solid professional behavior, are the requirements for becoming a PCNSE7. The formal certification exam is hosted and proctored by the third-party testing company Pearson VUE. Either exam should be taken by anyone who is prepared to demonstrate a deep understanding of Palo Alto Networks technologies. Candidates can be anyone who uses Palo Alto Networks products, including customers, partners, system engineers, systems integrators and support engineers. Exam Blueprint [Hidden Content] Recommended Training Palo Alto Networks strongly recommends, you attending our Essentials I (201), Essentials II (205), and Panorama (221) classes. Courses do not cover everything that a PCNSE7 needs to know, but they’re the most efficient way to start learning. When you have the basics mastered, you should spend time on our platform practicing using the information in the 7.0 versions of the Administrator’s Guides.
  4. For Cisco ASA Firewall 5500 series.this image is different than previous images and requires more memory.for Cisco ASA 5520 it was asking for 2 Gigs RAM so for Cisco ASA 5510 it should work with 1 Gigs RAM.for 5540/5550 the 2 GB RAM is enough to run the image warning:with less than the required RAM.it would issue warning and it may impact the performance of the Cisco ASA or it may crash as well so before putting adequate RAM.do not install this image. Cisco ASA 917-K8 IOS password:h4x0r
  5. Anyone planning to or already attempted the Palo Alto Certified Network Security Engineer (CNSE) exam based on the below cheat sheet? Vendor Palo Alto Networks Certification Palo Alto PCNSE Exam Code PCNSE6 Exam Title Palo Alto Networks Certified Network Security Engineer 6 No. of Questions 153 Last Updated 12/01/2015 Product Type Q & A with Explanation [Hidden Content]
  6. Hi Guys can you please share asav 9.31 qcow image. Thanks in Advance
  7. Please i need ASA 8.2 for UNL or GNS, anyone please
  8. Does anyone have the files to install this in a virtual Machine. I am going to start my studies for this firewall certification. thank you.
  9. routeHub - Fortinet: FortiGate Next-Generation Firewall Training Format: PDF/MP4 Size: 3.02GB One Course: FortiGate Next-Generation Firewall Training Last Updated: September 2015 [Hidden Content]
  10. How to reolve this. I need to connect the IOU switch with ASA
  11. Hi, here is Cisco asa924-5-k8.bin. Enjoy [Hidden Content]
  12. Hello community, Great forum with great people.glad to be a part of it.I just purchased one Cisco ASA 5520 with AIP-40 module and the sensor came with 6.0(6)E4 Image.this AIP-SSM40 module is ugpradable to the latest my firewall is not having any service contract associated.so if someone generous can bring time to post these files it would be a great help. IPS SSM_40 Recovery Image File IPS-SSM_40-K9-r-1.1-a-7.1-11-E4.pkg Link:[Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest IPS SSM_40 Service Pack Upgrade IPS-SSM_40-K9-7.1-11-E4.pkg Link:[Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest IPS-SSM_40 System Image File IPS-SSM_40-K9-sys-1.1-a-7.1-11-E4.img Link:[Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest I am upgrading the Cisco ASA5520 to asa916-10-k8.bin and after getting AIP-SSM40 image.I will upgrade it.the most required file is the first one- IPS SSM_40 Recovery Image File.thanks a lot.
  13. I have the IPS-sig-S990-req-E4.pkg file. I just need the IOS-S9**-CLI.pkg file to go with it. If anyone has this available, can you please let me know how I could get it from you. I need to put this on my 2911 router for my SOHO. Need it for studying and for firewall capabilities.
  14. IPTABLES TUTORIAL: iptables is the open source firewall , default it is integrated with linux kernel itself. usually backend is called as netfilter. iptables is the tool which helps us to manage the netfilter firewall. it has all the functionalities what commercial firewall has like natting, filtering. by writing the efficient rules in the iptables we can save our environment from external threats. it is also stateful firewall. what is stateful firewall? stateful firewall ultimately track the state of the packets which is moving through our firewall machine. in tcp stack implementation if you analyze the tcp header we have one field called fragment id. when packet been fragmented it will be assigned with common fragment id. example if you blocked the icmp packets in your firewall and if it is not stateful firewall what happen?. if the packet exceeds the actual mtu size then it will be fragmented by our stack. and the first packet only consist the protocol field with the flag set as mf(more fragments 1). then other than first packet another packet does not have the protocol field. only all the packets shared the common fragment id. so stateless firewall block the first packet , because it holds icmp in it protocol field. other then first packet all packets allowed by our firewall. because all other packets does not have the protocol header. but what stageful firewall will do, if any packet matches the rule it will track both the protocol field and fragment id field in one table ,which is called stateful table. here all the tracked packet infos has been maintaining by our firewall. in our case it will track the first icmp packet fragment id, and if any packets arrived with the same fragment id it will be discarded. this is the mechanism how stateful operates. iptables packet processing mechanism: 1. look for the state table whether the arrived packets info available or not. 2. if matches then do the action(drop/accept/log) 3. if info not available in the state table then look for the routing table. 4. if routing to the local destination then look for the filter table to take the necessary action. 5. if routing is to the external destination then look for the nat table. and if it is snat then post-routing will be done. 6. if it is dnat then pre-routing will be performed. tables in iptables: 1. mangle table 2. nat table 3. filter table each table contain some chains to take the decision : 1. mangle table a. input b. output c. forward d. pre-routing e. post-routing 2. nat table: a. pre-routing b. post-routing 3. filter table: a. input b. output c. forward next part will be posted once i prepared..thanks for reading...
  15. Hi, I have the ASAv 9.6 installed on vmware 12 and for some reason it is in a continuous boot loop. I have tried to tweak the settings of the vm but had no luck. Is anyone having this problem to, can this be solved? thanks
  16. Hi Guys, due to increased demand in the job market for even Network engineers to know firewall technologies, I've decided to learn Checkpoint because my company has it. But my organization has very haphazardly deployed the Firewalls, or at least it seems to be like that. I've learned a lot of the theory but am looking for real world deployment to help me "fake" my experience and also increase my understanding better. I have questions such as 1. How many security gateways can a management server handle and what is the usual best practice? 2. How are the log servers configured and setup in the real world? In my home lab, the logs just get saved on the management server but I know it's not realistic considering the log size. 3. I installed and practiced GAIA on Vmware and practiced the labs. How is GAIA installed in the real world? I did see some old Nokia devices running IPSO software in my company but I want to know about GAIA. 4. What is the placement location of Checkpoint security gateways in an enterprise network without any hosted servers (no need for DMZ)?
  17. Requesting IOS for Cisco ASA 5520 firewall.
  18. routeHub - SonicWALL Firewall and VPN Training Series Format: PDF/MP4 Size: 438.3MB Only one course: SonicWALL Firewall and VPN Training Last updated: September 2015 [Hidden Content]
  19. SALE only 1$ (actual 69$). Checkpoint CCSA Certification Course at Udemy. Grab it NOW before its over. [Hidden Content]
  20. can anyone suggest me which firewall should I go for...we are into small business...user count will be 40-60...we need a firewall solution with content filtering and reporting ...in my previous company we have used cyberoam...can I go for cyberoam again...because I can integrate with AD for user authentication(SSO) and content filtering and reporting features also excellent when I compare to other firewalls..i don't know about the security ...how best it is..
  21. Hi Can any one help with following suggession: How to monitor the hit count on ANY ANY rule in ASA
  22. Hi could I get some working links for "Cisco ASA 1000V Cloud Firewall" Thanks! CLOSED AS OUTDATED Thanks and regards
  23. The effective firewall administration is very important job in one organization. if policies are not effective and not in a proper manner then maintenance of the firewall will be very difficult. So i will give you the details to manage the efficient tips to perform the firewall administration to be easy. 1. Try to reduce the rules as much as possible. 2. Avoid the duplicate entries, if you make it then some time it will make you perplexed. 3. Use proper names for the objects. 4. place the top most used rules at the top of the rule base. 5.at the end of the rule base add clean-up rule. Clean-up rule : clean up rule prevent the unwanted traffic matched other than our rule base. 6. take a routine backup, to minimize the down time during the DR time. 7. Create the multiple administrator, and allow juniors to have only READ-ONLY mode. 8.use the description feature to have the hint about the rule. 9.If you are using UTM then frequently chichi the update status. 10. Keep your firmware is up to date.
×
×
  • Create New...