Solved

Help -I need a Cisco firewall engineer to review our config

Posted on 2007-12-03
3
185 Views
Last Modified: 2013-11-16
(not make ANY changes).  I can make a backup of the config and send it to him.  I simply want to know if the config has any errors or obvious problems


Code snippet removed at Asker request
 

Jason1178

Community Advisor

Experts Exchange

Open in new window

0
Comment
Question by:chrisc2141
  • 2
3 Comments
 
LVL 29

Accepted Solution

by:
Alan Huseyin Kayahan earned 500 total points
ID: 20399301
  Hi chris
      You mentioned "Firewall shutting off traffic ", would you please describe this?
      And for your security, please ask a moderator to remove your code. Then sanitize it (hide global IPs) then post back

Regards
0
 

Author Comment

by:chrisc2141
ID: 20399363
Asked for that to be removed... The traffic was shut off (bad way to put it) when I was having the Skyppe proble..working ok now...just want to store a good setting. Have the impression this one is not
0
 
LVL 29

Expert Comment

by:Alan Huseyin Kayahan
ID: 20399716
  Hi chris
       Please ask moderators to reopen this question an decline my accepted answer, because I hav not analyzed the code and made sugestions yet. If my answer stays accepted, other experts wont be interested in this question.

Regards
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to setup a Voice VLAN on a Cisco Meraki MS220-24 3 84
Gateway Resilience 4 49
Radius Debug Error 16 43
OSPF metric and destination 2 36
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now