Quantcast
Channel: ASA Archives – CiscoZine
Browsing all 88 articles
Browse latest View live

Cisco ASA and PIX Security Appliances Multiple Vulnerabilities

Some vulnerabilities have been reported in Cisco ASA and PIX appliances, which can be exploited by malicious people to disclose sensitive information, and by malicious users and malicious people to...

View Article



June 2012: four Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published four important vulnerability advisories: Buffer Overflow Vulnerabilities in the Cisco WebEx Player Cisco Application Control...

View Article

September 2012: eleven Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published eleven important vulnerability advisories: Cisco IOS Software Network Address Translation Vulnerabilities Cisco IOS Software...

View Article

January 2013: five Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities Multiple...

View Article

Cisco ASA < 8.4.4.6 | 8.2.5.32 Ethernet Information Leak

This is the Cisco ASA ethernet information leak exploit that leverages the vulnerability noted in CVE-2003-0001. Versions prior to 8.4.4.6 and 8.2.5.32 are affected. Multiple platform ethernet Network...

View Article


Image may be NSFW.
Clik here to view.

November 2012: two Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published two important vulnerability advisories: Cisco IronPort Appliances Sophos Anti-Virus Vulnerabilities Cisco Secure Access Control...

View Article

Image may be NSFW.
Clik here to view.

NAT and PAT: a complete explanation

Network address translation (NAT) is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. There are two different types of NAT: NAT...

View Article

Image may be NSFW.
Clik here to view.

Using route maps for conditional NAT

As explained in a previous article, NAT is the process of modifying IP address information in IP packet headers, while route maps are mainly used to redistribute and manipulate routes (OSPF, BGP,...

View Article


Image may be NSFW.
Clik here to view.

Cisco Unity Express Multiple Vulnerabilities

The Cisco Unity Express software contains two important vulnerabilities: CVE ID: CVE-2013-1114: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an...

View Article


Image may be NSFW.
Clik here to view.

NAT Virtual Interface aka NVI, what is that?!

Not everyone knows that from IOS version 12.3(14)T, Cisco has introduced a new feature called NAT Virtual Interface; NVI removes the requirements to configure an interface as either NAT inside or NAT...

View Article

Image may be NSFW.
Clik here to view.

February 2013: four Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published four important vulnerability advisories: Cisco Unified Communications Manager Multiple Denial of Service Vulnerabilities Cisco...

View Article

Image may be NSFW.
Clik here to view.

Cisco Video Surveillance Operations Manager 6.3.2 – Multiple vulnerabilities

Part of the Cisco Video Surveillance Manager product suite, the Cisco Video Surveillance Operations Manager enables the efficient and effective configuration and management of video throughout an...

View Article

Image may be NSFW.
Clik here to view.

March 2013: seven Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published seven important vulnerability advisories: Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection...

View Article


Image may be NSFW.
Clik here to view.

PBR: Route a packet based on source IP address

Everyone knows that the routing table lists the routes to particular network destinations, but is it possible define the next-hop based on source ip, packet size or other criteria? Obviously yes!...

View Article

Image may be NSFW.
Clik here to view.

April 2013: ten Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published ten important vulnerability advisories: Multiple Vulnerabilities in Cisco NX-OS-Based Products Cisco Device Manager Command...

View Article


Image may be NSFW.
Clik here to view.

Using IP SLA to change routing

Cisco IP SLAs is a part of Cisco IOS that allows Cisco customers to analyze IP service levels for IP applications and services by using active traffic monitoring for measuring network performance. With...

View Article

Image may be NSFW.
Clik here to view.

Reload in X? Why don’t you rollback or replace the configuration?

Do you remember the article ‘How to schedule a reload‘? This feature (reload in ‘x’) is useful when you must apply a critical configuration on a remote device, for instance new route or new acl. In...

View Article


Image may be NSFW.
Clik here to view.

May 2013: two Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published two important vulnerability advisories: Cisco TelePresence Supervisor MSE 8050 Denial of Service Vulnerability Multiple...

View Article

Image may be NSFW.
Clik here to view.

June 2013: five Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Multiple Vulnerabilities in Cisco Web Security Appliance Multiple Vulnerabilities in...

View Article

Image may be NSFW.
Clik here to view.

July 2013: five Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Authenticated Command Injection Vulnerability in Multiple Cisco Content Network and...

View Article
Browsing all 88 articles
Browse latest View live


Latest Images