Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How do I split ISG 1000 t be 2 virtual Firewall?

Posted on 2009-07-12
4
562 Views
Last Modified: 2013-11-16
How do I split ISG 1000 t be 2 virtual Firewall?
please provide me with the proper configuration
0
Comment
Question by:paintco
  • 2
  • 2
4 Comments
 
LVL 18

Assisted Solution

by:deimark
deimark earned 500 total points
ID: 24834788
You will need a license for multiple virtual systems installed on the firewall

Please provide the screenos version you are running and I will get the guides for tou to describe the vsys functions
0
 

Author Comment

by:paintco
ID: 24838988
screenos 6.0
0
 

Author Comment

by:paintco
ID: 24841688
Hardware version 3010(0)
Firemware version  6.0.0r4.0(firewall+vpn)
0
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
ID: 24841917
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question