Cisco ASA Device May Be Compromised by Hackers About the new Vulnerability Cisco CVE-2024-20353 Cisco CVE-2024-20359 As you may heard about...Read More
Cisco Hypershield: AI driven Security Cisco Hypershield is a game-changing security tool that protects modern apps and dynamic compute envi...Read More
PAN-OS: OS Command Injection Vulnerability in GlobalProtect Vulnerability : CVE-2024-3400 For certain PAN-OS versions and feature configurat...Read More
Intermittent VPN flapping issues Virtual private networks, or VPNs, are becoming increasingly important for businesses who has remote worke...Read More
Part 2: Cisco ASA/FTD Clustering Spanned EtherChannel Routed Mode In our example 2, we are going to talk about the ASA Clustering with Spann...Read More
Part 1: Cisco ASA/FTD Inter-Site Clustering In our example 1, we are going to talk about the ASA/FTD Clustering with Individual Interface Ro...Read More
Site-to-Site VPN NAT Exempt Before we are going to talk about the Site to site VPN NAT Exempt, we need to know what exactly is NAT Exempt a...Read More
Active/Passive HA Setup in Palo Alto Firewall High availability (HA) is a setup in which two firewalls are grouped together and their config...Read More
Cisco Secure Firewall: Clustering Basics Clustering allows you to bring together many Firepower Threat Defense devices into a single logical...Read More
Cisco FTD High Availability (HA) requirements and Configuration Cisco secure firewalls (FTD/NGFW) High Availability (HA) is a feature that e...Read More