• FOG, DHCP from a Cisco 5510 ASA

    Hey, I am trying to set up fog to be able to image computers on my network. We previously had it set up working properly through a dedicated windows DHCP server, but recently we implemented changes and are now providing DHCP through a cisco 5510 ASA. It was working by itself without any...

    Tlarz5 pointsBadges:
  • how to block user save their file into the server by use PIX 525 firewall

    i having problem,which user from other site saving file into the server.Can we block it by use pix 525 firewall.Please let me know the configuration.Thanks

    Lukes5 pointsBadges:
  • CISCO ASA 5505 software update

    This may is trivial but I ask it anyway. I found out on the cisco webpage that the cisco asa have a new ASDM and ASA Version. I know how to upload images into the flash, but that is the next step to activate these image plus to get the images?

    Maddock10 pointsBadges:
  • Reboot Juniper Firewall in Cluster

    Can anyone tell me how to reboot a Juniper Firewall that is in a cluster netwrok. Preferable using the CLI. I appreciate any input, Thank you so much.

    Dscott5 pointsBadges:
  • Cisco ASA DMZ with DynDNS Host

    Hello everbody, I have set-up my Asa with three VLans (outisde, inside and a DMZ), nearly the same configuration as used in the Cisco Documentation. I have managed to create the NAT and Access rules so I can communicate between the inside and the dmz. But I am not able to manage to get access from...

    Maddock10 pointsBadges:
  • Can what I do on my PC be monitored via a cable tap?

    Can what I do on my PC be monitored via a direct manually split cable tap on my roof? I have Zonealarm running but it typically asks for GHP services to IP addresses I dont recognize and asks for server and trusted zone access status inexplicably and often

    Dannyg135 pointsBadges:
  • To block Skype messenger traffic from an organisations internal network?

    Hello All, I am trying to figure out how one can block skype from an organisations internal network? The threat here is it has the ability to change the port on which it is communicating. Normally ports 80 and 443 are open on a firewall for web browsing.

    Rahul Shrivastava330 pointsBadges:
  • Firewall rules don’t work

    We have a McAfee SIG 3200 appliance, and rules are pretty much clear cut - Deny this, allow that! The 'deny' and 'allow' are applied to the different categories we have created for the different levels of access groups. whilst the rules remain unchanged, restricted sites (like yahoo, youtube etc)...

    Kikileta10 pointsBadges:
  • How does enabling Windows Firewall affect working of Anti Virus Software?

    a. How does enabling Windows Firewall affect working of Anti Virus Software? What Functionality to test in Anti Virus Software if the Windows Firewall is enabled and What Functionality to test if Windows Firewall is Disabled?

    Mayurkhe295 pointsBadges:
  • How to allow outside access to internal pc securely

    Hi all, I need to allow an outside service engineer connect to a machine tool (PC attached) to run diagnostics on my network. What's the best way to allow him temperorily access to this internal pc? This will probably only happen a few times a month, so access doesn't have to be enabled...

    Pandub130 pointsBadges:
  • Unable to send mails in Lotus Notes webmail

    please let me knew which ports should be opened in checkpoint firewall to communicate with lotus note web mail.

    Edwinbelle5 pointsBadges:
  • how can I remove Anti spoofing feature in the check point

    I need to remove the anti spoofing feature from my checkpoint /....what to do for it

    Ritesh2r5 pointsBadges:
  • What is a good firewall appliance for 200 users?

    Looking for a good firewall appliance for around 200 users at my company.

    JimmyIT1,725 pointsBadges:
  • Do I have to use proxy with PIX firewall?

    i have pix 515E firewall and cyber roam device which is using as a proxy.do i have to use proxy with pix firewall

    Intrnetworking30 pointsBadges:
  • Problem removing anti-spoofing on R60

    Hi There I've removed the anti-spoofing on one of the interfaces to a firewall, but when I go to install the policy I get the error message below:   The Topology information must be configured for object *****, interface eth-s*p*c*, in order to use the Anti-Spoofing feature. Can anyone assitt?...

    Manliz2000275 pointsBadges:
  • Cisco ASA5510

    I need to find out if there is a command to shutdown Cisco ASA5510 firewall rather then walking up to the firewall and pulling the power plug ... thanks

    Kwt712555 pointsBadges:
  • Trust and Untrust in Firewalls

    Concept of Trust and Untrust in firewalls ?

    Nikhild865 pointsBadges:
  • Error messages when connecting Outlook to Blackberry Desktop re-connector

    I'm currently using Exchange Server 2003 and ESoft Instagate 604 as my firewall and spam filter for the organization. I set up a single site connector that has the Exchange server as the bridgehead, and I point the connector to the IP address of the Instagate box. This works fine but I have three...

    Exchange Ask the Experts580 pointsBadges:
  • Next-generation firewalls: What are your thoughts?

    Shamus McGillicuddy recently delved into the topic of next-generation firewalls, and I wanted to know -- how many of you have implemented next-gen firewalls in your environment? Do you see this as being a legitimate trend for the future, or is it just a lot of hype?

    JennyMack4,280 pointsBadges:
  • ASA 5505 “Prioritize which IP get licenses”

    Greetings, Is there a way to prioritze which ip addresses get to use a license for outside internet access?  I have 10 user license and with 10 users, but my servers and printers, etc. are consuming licenses. 

    PitchSinew20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following