collapse

Search


User Info

 
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Recent Posts

Pages: [1] 2 3 ... 10
1
General Discussion / kraken сайт
« Last post by Bernardpat on February 11, 2025, 02:28:09 AM »
Kraken магазин You are not allowed to view links. Register or Login  - это огромный анонимный маркетплейс с огромным ассортиментом товаров и услуг в СНГ. На площадке представлены сотни категорий, в которых можно найти предложения от тысяч продавцов. Главное подобрать подходящее, сравнить отзывы, количество продаж и другие особенности. После чего оформить заказ и максимально быстро получить его. Главное, что Kraken гарантирует анонимность и безопасность каждому пользователю, и вы можете доверять проекту. Ссылка на Кракен онион - You are not allowed to view links. Register or Login  . Это рабочее на данный момент зеркало Kraken, которое можно использовать для покупок. Потому переходите на сайте и окунитесь в мир тысяч товаров и услуг. А при возникновении любых вопросов, администрация проекта поможет в их решении.
2
Routing and Switching / Re: IPs Assigning
« Last post by MC on February 08, 2025, 09:40:23 AM »
What are you trying to accomplish?
3
Routing and Switching / IPs Assigning
« Last post by khani143 on January 29, 2025, 09:38:07 PM »
Hello guys please see the picture and i need to purchase public ips of Own router and Firewall
4
Security / Re: ISE 3.3: Certificates | Interfaces - Fiber vs Copper on behalf of Chris L.
« Last post by MC on October 15, 2024, 08:15:19 PM »
I can't see how using 10G interfaces on an ISE appliance would affect a use of certificate so you should be fine.
5
We're migrating ISE 2.4 to ISE 3.3 by running in parallel by adding new 3715's. Then, we'll just cut over. Certificates deployed as you specified - access.ise.domain.com and *.ise.domain.com. We've got CIMC and G0 primary | G1 backup interface for GUI mgmt on the PAN/MnT on 3615s. The 3715s will be PSN dedicated in a Medium deployment. We're leveraging the 10Gbps capability of fiber on the boxes. Will the certificate delivery work fine for RADIUS, AAA, portal services over the 10Gbps interfaces on fiber?
6
Security / Re: Using Firepower with a router on behalf of Irvin
« Last post by Administrator on September 30, 2024, 08:00:18 AM »
In the Firepower lab, there is actually a lab router in front of it that connects to the internet. You can deploy Firepower in several modes but routed mode is the most common. You may or may not put a router in front of it depending on requirements and size of your deployment. In a Data center, you will most likely have a dedicated internet router. Hope this helps.
7
Security / Using Firepower with a router on behalf of Irvin
« Last post by Administrator on September 30, 2024, 07:59:56 AM »
Hello I would like to know if you have any videos deploying Firepower with a router. At the moment I am watching the Firepower 6.7 FDM and it looks like the firepower is replacing the router. Is this best practice? I am all new to firewalls and I find your material very useful and I thank you. Could you please let me know. Thank You
8
Security / Re: FTD - Access Control Policy - Implicit Deny any any
« Last post by MC on April 21, 2024, 09:13:05 PM »
Pre-filter is like an interface ACL. It can only match IP/Port/Protocol and is stateless so it should only be used to match simple traffic and has rules that are fairly static.

For ACP, traffic is matched by zone pair first so their orders do not really matter. Within the same zone pair, more specific rules should go to the top. ACP is always stateful.
9
Security / Re: FTD - Access Control Policy - Implicit Deny any any
« Last post by LoboPR on April 19, 2024, 11:27:19 AM »
Ok,

So what would be like the best practice:

First Pre-filters - Like you mention on the video training. Then
ACP:
1- Allow inbound traffic to static NAT (inside Servers)
2- Monitor - all Traffic (for discovery)
3- Allow outgoing traffic from users (Url, application, malware and IPS)
4- Deny Any Any
 
Does the stateful feature still apply?
If I allow a packet to go out, would the return traffic make it in?)
10
Security / Re: FTD - Access Control Policy - Implicit Deny any any
« Last post by MC on April 18, 2024, 07:45:28 PM »
1. Access Policy in FTD has a configurable default rule at the bottom. You can set it to deny or allow.

2. There is no concept of Security Level in FTD. All interfaces would show as 0 on CLI. You need to create a zone, assign to each interface, and come up with an Access Policy that will control traffic between zone. By default, traffic is not allowed between interfaces.
Pages: [1] 2 3 ... 10
SimplePortal 2.3.7 © 2008-2025, SimplePortal