Tags » Firewalls

Cisco ASA Useful cli commands

Debugging the ssl engine:

*See logged in client vpn users

show vpn-sessiondb webvpn

*Log off a vpn user

vpn-sessiondb logoff name <username>

*See allowed encryption protocols for tunneling traffic… 54 more words

Cisco ASA

New Requirement! - Network Engineer - Wiltshire, Perm

Skills: Network Engineer. Based in Swindon, Wiltshire my client is looking for an Network Engineer. You must have experience in Switching and Routing, VLAN configuration and management, Firewalls management, Wireless technologies, backbone network environment and full understanding of TCP/IP, OSPF and other protocols, Dell/Cisco Ethernet switches, VMWare, Ethernet –over cooper/Fibre including physical meda . 125 more words


Understanding the Terms and Verbage - Security & Protection [TechSpeak]

Hello Readers,

I wanna start this blog with a bit about terms used for computer as it relates to security and protections.   It is always important to understand the buzz words on the internet about the “latest” infection, Malware, Spyware, Ransomware….etc.  417 more words

How to Block Whatsapp & P2P on Cyberoam?

As you all know,Whatasapp and torrent downloader are cross platform application available on web which leads to excessive bandwidth usage within organisation.

Lets block it at firewall for avoiding bandwidth wastage. 120 more words


Adding/ Removing rules in iptables

I have been fascinated about IT security and firewalls. I was able to get some hands on exposure to firewall scripting if you like, during my Masters that I just completed. 198 more words

How to create Application - Filter Policy in Cyberoam?

Create a application filter policy for restricting uses from accessing unwanted application within the organisation.

to do so,login to cyberoam’s web admin console and look for application filter and go to its policy area. 154 more words


How to create Web-filter Policy in Cyberoam?

Web-filter policy allows you to mange the type of traffic you want to allow in your network.We have two different type of traffic blocking method based on its attributes. 253 more words