• Scanning outbound emails

    We have been compromised and one email account is internally sending out a lot of spam. We shut it down and another machine popped up infected and doing the same thing. How can we scan all out bound emails for spam just like incoming email? We use a barracuda 300 spam firewall.

    ITKE434,765 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • watch guard to cacti

    How can i monitor watchguard in cacti

    Erick5 pointsBadges:
  • firewall design

    i want to design a firewall for a college.so plz suggest me sum ideas regarding to this subject and if you have any another idea related to this subject that also wil be accepted

    Asu30 pointsBadges:
  • how to make HTTP protocol stateful?

    How to make HTTP protocol statefull ? i need whole information about GET ,POST ,Cookies,Plug-in...and other way to make HTTP statefull?

    Afrouz15 pointsBadges:
  • ssg-320 Address Labels

    Can I use a Address Label for a MIP in a SSG-320 configuration ... when I assign an IP address the DMZ zone and use it in a policy it no longer works ... if I use the (MIP x.y.z.q) Label Generated in the Global zone it works fine .... I would like to use the Labels I built

    Bradwaller5 pointsBadges:
  • Routing of traffic between separate compainies both using private 10 net addresses

    We have two different networks in two towns that wish you route traffic using existing 10.x.x.x network traffic. There is no conflict with the addresses we wish to use. There is of course a firwall in place on both sides. Is it possible to route all 10 net traffic between sights using one VPN, or...

    Bunny115 pointsBadges:
  • Juniper firewall

    Sir , How to configure a Juniper firewall as  Transparent Bridge . How can we configure a juniper firewall for full configuration. regards techtest

    Ksr1234320 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41060 pointsBadges:
  • Are there any Firewalls in MAC?

    Are there any Firewalls in MAC? If Yes, How are they differnent from Windows Firewall. If No, How does MAC handle the risks of Attacks and intrusions?  

    Mayurkhe295 pointsBadges:
  • FOG, DHCP from a Cisco 5510 ASA

    Hey, I am trying to set up fog to be able to image computers on my network. We previously had it set up working properly through a dedicated windows DHCP server, but recently we implemented changes and are now providing DHCP through a cisco 5510 ASA. It was working by itself without any...

    Tlarz5 pointsBadges:
  • how to block user save their file into the server by use PIX 525 firewall

    i having problem,which user from other site saving file into the server.Can we block it by use pix 525 firewall.Please let me know the configuration.Thanks

    Lukes5 pointsBadges:
  • CISCO ASA 5505 software update

    This may is trivial but I ask it anyway. I found out on the cisco webpage that the cisco asa have a new ASDM and ASA Version. I know how to upload images into the flash, but that is the next step to activate these image plus to get the images?

    Maddock10 pointsBadges:
  • Reboot Juniper Firewall in Cluster

    Can anyone tell me how to reboot a Juniper Firewall that is in a cluster netwrok. Preferable using the CLI. I appreciate any input, Thank you so much.

    Dscott5 pointsBadges:
  • Cisco ASA DMZ with DynDNS Host

    Hello everbody, I have set-up my Asa with three VLans (outisde, inside and a DMZ), nearly the same configuration as used in the Cisco Documentation. I have managed to create the NAT and Access rules so I can communicate between the inside and the dmz. But I am not able to manage to get access from...

    Maddock10 pointsBadges:
  • Can what I do on my PC be monitored via a cable tap?

    Can what I do on my PC be monitored via a direct manually split cable tap on my roof? I have Zonealarm running but it typically asks for GHP services to IP addresses I dont recognize and asks for server and trusted zone access status inexplicably and often

    Dannyg135 pointsBadges:
  • Firewall rules don’t work

    We have a McAfee SIG 3200 appliance, and rules are pretty much clear cut - Deny this, allow that! The 'deny' and 'allow' are applied to the different categories we have created for the different levels of access groups. whilst the rules remain unchanged, restricted sites (like yahoo, youtube etc)...

    Kikileta10 pointsBadges:
  • How does enabling Windows Firewall affect working of Anti Virus Software?

    a. How does enabling Windows Firewall affect working of Anti Virus Software? What Functionality to test in Anti Virus Software if the Windows Firewall is enabled and What Functionality to test if Windows Firewall is Disabled?

    Mayurkhe295 pointsBadges:
  • How to allow outside access to internal pc securely

    Hi all, I need to allow an outside service engineer connect to a machine tool (PC attached) to run diagnostics on my network. What's the best way to allow him temperorily access to this internal pc? This will probably only happen a few times a month, so access doesn't have to be enabled...

    Pandub130 pointsBadges:
  • Unable to send mails in Lotus Notes webmail

    please let me knew which ports should be opened in checkpoint firewall to communicate with lotus note web mail.

    Edwinbelle5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following