IOS-XE Policy Based Routing
Policy-Based Routing (PBR) can be used to gain more precise control over how traffic flows through the networks. PBR allows organizations to direct specific types of traffic over a preferred…
Policy-Based Routing (PBR) can be used to gain more precise control over how traffic flows through the networks. PBR allows organizations to direct specific types of traffic over a preferred…
The ASA inspection engine is required for services that embed IP addressing information in the user data packet or open secondary channels on dynamically assigned ports. Application Inspection uses the…
The Cisco ASA firewall, Service Policies use the Modular Policy Framework (MPF) to provide a flexible way to configure ASA features, such as connection settings, inspection, QoS, redirection to service…
IKEv2 normally uses a single Diffie-Hellman (DH) key exchange during the IKE_SA_INIT phase to derive a shared secret between the VPN peers. Multiple Key Exchanges lets the peers perform more…
This post describes how to configure a Cisco Firepower Threat Defence (FTD) Firewall using local/on box management via Firepower Device Manager (FDM) for redundant/dual ISP connections, using the SLA Monitor…
Cisco Secure Firewall FTD uses LDAP attribute maps for authorisation of Remote Access VPN and applying different settings such as Group Policy, IP pool, DHCP network scopes, ACL etc based…