The below information will help to identify/fix the High CPU Utilization if noticed in the Cisco IPS device. 1. execute the command sh statistics virtual-sensor in CLI 2. analyse the inspection load from the output […]
Tag: Vendor Related
Does Cisco ASA Support IPv6 address to configure failover
Failover does not support IPv6. The ipv6 address command does not support setting standby addresses for failover configurations. The failover interface ip command does not support using IPv6 addresses on the failover and Stateful Failover […]
How to use RSA SecureID authentication on a FortiGate unit
Description This article describes how to set up RSA SecureID authentication on a FortiGate unit. Components * a FortiGate unit running FortiOS 3.0 * an RSA ACE/Server 5.1 * a RADIUS server The RADIUS server […]
Understand the ‘diagnose sys top’ command in Fortigate
Description: A description of the information provided by the FortiOS 3.0 diagnose sys top CLI command. This article also contains information about sorting the information displayed by the command and about how to use the […]
Troubleshooting High Memory Utilization in Cisco Firewall
High Memory Utilization Here are some possible causes and resolutions for high memory utilization: Event logging: Event logging can consume large amounts of memory. In order to resolve this issue, install and log all events […]
Troubleshooting High CPU Utilization in Cisco Firewall
CPU Utlilization If you noticed the CPU utlization is high, follow these steps in order to troubleshoot: Verify that the connection count in show xlate count is low. Verify that the memory block is normal. […]

Difference between URL Filter and Web Filter in Fortinet
FortiGuard – Web Filter FortiGuard Web Filtering is a managed web filtering solution provided by Fortinet. FortiGuard Web Filtering sorts hundreds of millions of web pages into a wide range of categories users can allow, […]
Why DNS takes udp packet….. Why not TCP ??
Now you might be wondering why an application developer would ever choose to build an application over UDP rather than over TCP. Isn’t TCP always preferable to UDP since TCP provides a reliable data transfer […]
Ports used in Check Point VPN-1 for communication
Various parts of FireWall-1 bind to various ports on the system. Typically, they intercept connections traversing through the firewall, but in order for this to work correctly, they must bind to their own port and […]
Preventing Network Attacks in Cisco ASA
Basic Threat Detection Overview Using basic threat detection, the security appliance monitors the rate of dropped packets and security events due to the following reasons: •Denial by access lists •Bad packet format (such as invalid-ip-header […]