How to configure EIGRP on a Cisco ASA Firewall


“Sponsored Links” The Cisco Adaptive Security Appliance is an integrated security equipment that can perform a variety of functions like firewall, intrusion prevention, VPN, content security, unified communications, and remote access. Among these functions, the ASA can also perform routing using popular routing protocol like Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), […]

[Continue reading]

Cisco ASA Master PassPhrase

There are several configuration features on Cisco ASA that require some sort of password or secret-key that you need to enter. Some examples include: VPN pre-shared keys (either for site-to-site IPSEC VPN or for Remote Access). AAA server secret key when communicating with a RADIUS server. Routing Protocols keys (for OSPF, EIGRP). Secret key for […]

[Continue reading]

How to Configure OSPF on Cisco ASA Firewall

asa ospf configuration

Cisco Adaptive Security Appliance (ASA) is quite a versatile device integrating application-aware firewall, SSL and IPsec VPN, intrusion prevention system (IPS), antivirus, antispam, antiphishing, and web filtering services. Cisco ASA also supports routing protocols such as Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), and last but not least, Open Shortest Path First […]

[Continue reading]

Comparison of Cisco ASA Software Versions

With the expansion of Cisco ASA models and the addition of new types of devices, it is inevitable to have also a confusion about which software version is supported for each model. A few years ago we had only the Cisco PIX series which were replaced by the successful Cisco ASA 5500 series firewalls. Now […]

[Continue reading]

How to block HTTP DDoS Attack with Cisco ASA Firewall

asa ddos http protection

Denial of Service attacks (DoS) are very common these days. Especially Distributed DoS attacks (called also DDoS) can be executed quite easily by attackers who own large networks of BotNets. Thousands of malware-infected computers (which comprise the so called “BotNets”) are controlled by attackers and can be instructed to start attacks at any target. Usually […]

[Continue reading]

How to Install CSC SSM on Cisco ASA 5510

I have found the following informative video which shows how to physically install a Content Security Services (CSC) Module in a Cisco ASA 5510 firewall appliance, and also how to create the initial setup configuration of this module using the graphical ASDM GUI of ASA firewall. The CSC module provides protection against Viruses, Spam, Spyware […]

[Continue reading]

Windows Phone 8 Apollo


Microsoft introduced the basic features of the upcoming Windows Phone 8 Apollo in Windows Phone Summit. The new Windows Phone 8 will support multi-core processors, more screen resolutions (800 x 480 / 15:9, 1280 x 768 / 15:9, 1280 x 720 / 16:9), microSD slots with the ability to install applications from them, integration of […]

[Continue reading]

China has the most virus infected computers in the world

Over 50% of computers in China are infected with malware, while Sweden is the country with the lowest number in computer infections. Panda Labs, the antimalware laboratory of Panda Security, announced recently the results of their first quarterly report for 2012, which analyzes all the events in the security of information systems between January and […]

[Continue reading]

How to Transfer your Blog from Shared to VPS Hosting

I have been hosting my blogs at Hostgator shared hosting account for almost three years now. A few days ago I decided to move all my blogs from shared hosting to a Virtual Private Server (VPS) with Shared hosting is good and cheap up to a certain traffic level, but when your websites’ traffic […]

[Continue reading]

Exchange Server 2010 Training

Perhaps you have heard the joke where the patient complains to Dr. And the esteemed medical practitioners response is: “take two aspirin and call me in the morning.” When I was a full-time trainer in the Microsoft MCSE track . I noticed that many of the colleges avoided Microsoft Exchange training like it was the […]

[Continue reading]

Five Things That Could Be Bogging Down Your Internet

When you’re attempting to get things done, nothing is more frustrating than a slow Internet connection. It takes forever to check your email or to visit one of your favorite sites online. When this is happening at your home or place of work, there are a a few different issues that could be causing the […]

[Continue reading]