collapse

Search


User Info

 
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Recent Posts

Pages: [1] 2 3 ... 10
1
<a href="You are not allowed to view links. Register or Login">link</a> Looking for a reliable SMM service to drive traffic and skyrocket your rankings quickly? Aida.biz is the ultimate solution! This platform stands out as one of the best in the industry, offering high-quality services to help you grow your online presence effortlessly.    Aida.biz provides a wide range of SMM services, including likes, followers, views, and engagement boosts across major social platforms like Instagram, Facebook, YouTube, and TikTok. Whether you're an influencer, marketer, or business owner, Aida.biz delivers real, targeted traffic to help you climb the rankings faster than ever.    What makes Aida.biz the top choice? It’s simple: speed, affordability, and reliability. With instant delivery and competitive pricing, you can get the visibility you need without breaking the bank. Plus, their secure payment system and 24/7 customer support ensure a smooth experience every time.    If you're ready to dominate your niche, Aida.biz is the go-to platform. Sign up today and watch your traffic and rankings soar!
2
Security / Urgent TON crypto currency will priced more than $20 (up to 400%)
« Last post by Anthonycob on April 21, 2025, 04:30:13 PM »
<a href=https://cryptolake.online/crypto3>Latest cryptocurrency news</a>
3
Routing and Switching / Re: IPs Assigning
« Last post by MC on February 08, 2025, 09:40:23 AM »
What are you trying to accomplish?
4
Routing and Switching / IPs Assigning
« Last post by khani143 on January 29, 2025, 09:38:07 PM »
Hello guys please see the picture and i need to purchase public ips of Own router and Firewall
5
Security / Re: ISE 3.3: Certificates | Interfaces - Fiber vs Copper on behalf of Chris L.
« Last post by MC on October 15, 2024, 08:15:19 PM »
I can't see how using 10G interfaces on an ISE appliance would affect a use of certificate so you should be fine.
6
We're migrating ISE 2.4 to ISE 3.3 by running in parallel by adding new 3715's. Then, we'll just cut over. Certificates deployed as you specified - access.ise.domain.com and *.ise.domain.com. We've got CIMC and G0 primary | G1 backup interface for GUI mgmt on the PAN/MnT on 3615s. The 3715s will be PSN dedicated in a Medium deployment. We're leveraging the 10Gbps capability of fiber on the boxes. Will the certificate delivery work fine for RADIUS, AAA, portal services over the 10Gbps interfaces on fiber?
7
Security / Re: Using Firepower with a router on behalf of Irvin
« Last post by Administrator on September 30, 2024, 08:00:18 AM »
In the Firepower lab, there is actually a lab router in front of it that connects to the internet. You can deploy Firepower in several modes but routed mode is the most common. You may or may not put a router in front of it depending on requirements and size of your deployment. In a Data center, you will most likely have a dedicated internet router. Hope this helps.
8
Security / Using Firepower with a router on behalf of Irvin
« Last post by Administrator on September 30, 2024, 07:59:56 AM »
Hello I would like to know if you have any videos deploying Firepower with a router. At the moment I am watching the Firepower 6.7 FDM and it looks like the firepower is replacing the router. Is this best practice? I am all new to firewalls and I find your material very useful and I thank you. Could you please let me know. Thank You
9
Security / Re: FTD - Access Control Policy - Implicit Deny any any
« Last post by MC on April 21, 2024, 09:13:05 PM »
Pre-filter is like an interface ACL. It can only match IP/Port/Protocol and is stateless so it should only be used to match simple traffic and has rules that are fairly static.

For ACP, traffic is matched by zone pair first so their orders do not really matter. Within the same zone pair, more specific rules should go to the top. ACP is always stateful.
10
Security / Re: FTD - Access Control Policy - Implicit Deny any any
« Last post by LoboPR on April 19, 2024, 11:27:19 AM »
Ok,

So what would be like the best practice:

First Pre-filters - Like you mention on the video training. Then
ACP:
1- Allow inbound traffic to static NAT (inside Servers)
2- Monitor - all Traffic (for discovery)
3- Allow outgoing traffic from users (Url, application, malware and IPS)
4- Deny Any Any
 
Does the stateful feature still apply?
If I allow a packet to go out, would the return traffic make it in?)
Pages: [1] 2 3 ... 10
SimplePortal 2.3.7 © 2008-2025, SimplePortal