<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Cisco Firewall - Hack The Forum				            </title>
            <link>https://www.hacktheforum.com/cisco-firewall/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Thu, 16 Apr 2026 10:10:16 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>Cisco ASA</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/cisco-asa/</link>
                        <pubDate>Fri, 29 Nov 2024 13:19:03 +0000</pubDate>
                        <description><![CDATA[The Cisco ASA (Adaptive Security Appliance) is a powerful network security device that integrates multiple security features such as firewalling, VPN (Virtual Private Network) support, intru...]]></description>
                        <content:encoded><![CDATA[<p>The <strong>Cisco ASA (Adaptive Security Appliance)</strong> is a powerful network security device that integrates multiple security features such as <strong>firewalling</strong>, <strong>VPN (Virtual Private Network)</strong> support, <strong>intrusion prevention</strong>, and <strong>content security</strong> into a single platform. It is widely used in enterprises for perimeter security, acting as a firewall between different security zones (e.g., inside, outside, DMZ) to protect internal networks from external threats.</p>
<p>Below is an overview of the key features and functionalities of the Cisco ASA:</p>
<hr />
<h3><strong>Key Features of Cisco ASA</strong></h3>
<ol>
<li>
<p><strong>Stateful Packet Inspection (SPI):</strong></p>
<ul>
<li>Cisco ASA provides <strong>stateful inspection</strong> of traffic, meaning it not only filters traffic based on rules but also tracks the state of active connections. This allows the firewall to understand whether packets are part of an established session or new traffic attempting to initiate a connection.</li>
</ul>
</li>
<li>
<p><strong>Access Control Lists (ACLs):</strong></p>
<ul>
<li>ACLs in Cisco ASA are used to define rules for controlling traffic based on parameters like IP addresses, protocols, ports, and more. ACLs can be applied to interfaces to filter traffic entering or leaving a network.</li>
</ul>
</li>
<li>
<p><strong>Network Address Translation (NAT):</strong></p>
<ul>
<li>Cisco ASA provides various types of <strong>NAT</strong> functionalities, such as <strong>Static NAT</strong>, <strong>Dynamic NAT</strong>, and <strong>PAT (Port Address Translation)</strong>, allowing you to hide private IP addresses behind public ones, manage address pools, and provide internet access.</li>
</ul>
</li>
<li>
<p><strong>VPN Support (IPsec &amp; SSL):</strong></p>
<ul>
<li>Cisco ASA supports both <strong>IPsec</strong> (for site-to-site VPNs) and <strong>SSL VPN</strong> (for remote access VPNs), allowing secure encrypted communication between remote users and corporate networks.</li>
</ul>
</li>
<li>
<p><strong>Intrusion Prevention System (IPS):</strong></p>
<ul>
<li>ASA devices can integrate with <strong>Cisco FirePOWER</strong> (or previously with <strong>ASA IPS module</strong>) to provide an <strong>Intrusion Prevention System (IPS)</strong>, which monitors network traffic for suspicious activities or known attack patterns and blocks potential threats.</li>
</ul>
</li>
<li>
<p><strong>High Availability (HA) and Clustering:</strong></p>
<ul>
<li>Cisco ASA offers <strong>HA</strong> and <strong>clustering</strong> capabilities to ensure continuous service in the event of hardware failure. This is done through the <strong>Active/Standby</strong> or <strong>Active/Active</strong> configurations, where one device takes over if the other fails.</li>
</ul>
</li>
<li>
<p><strong>Content Filtering and URL Filtering:</strong></p>
<ul>
<li>Cisco ASA can integrate with <strong>Cisco Cloud Web Security</strong> or <strong>Third-Party solutions</strong> to provide content filtering and block access to malicious or inappropriate websites.</li>
</ul>
</li>
<li>
<p><strong>Application Layer Filtering:</strong></p>
<ul>
<li>ASA can perform <strong>Deep Packet Inspection (DPI)</strong> and filter traffic at the <strong>application layer</strong> for various protocols like HTTP, FTP, and DNS to detect threats such as malware and other malicious content.</li>
</ul>
</li>
<li>
<p><strong>Contextual Awareness (Identity Awareness):</strong></p>
<ul>
<li>Through integration with solutions like <strong>Cisco Identity Services Engine (ISE)</strong>, Cisco ASA can enforce security policies based on user identity, device type, and user role rather than just IP addresses, improving the granularity of security.</li>
</ul>
</li>
<li>
<p><strong>Centralized Management with ASDM and FMC:</strong></p>
<ul>
<li>Cisco ASA can be managed via <strong>ASDM (Adaptive Security Device Manager)</strong>, a graphical interface for configuring and monitoring the firewall. For large-scale deployments, <strong>Cisco Firepower Management Center (FMC)</strong> provides centralized management for ASA firewalls.</li>
</ul>
</li>
</ol>
<hr />
<h3><strong>Deployment Models</strong></h3>
<p>The Cisco ASA is available in several hardware models (ranging from small appliances for branch offices to large-scale devices for enterprise data centers), as well as in a <strong>virtualized version</strong> called <strong>ASA Virtual</strong> (ASAv). Here are the common deployment models:</p>
<ol>
<li>
<p><strong>Standalone Appliance:</strong></p>
<ul>
<li>The ASA acts as a single firewall device, managing traffic and security policies for a specific perimeter (e.g., between inside and outside networks).</li>
</ul>
</li>
<li>
<p><strong>High Availability (HA) Deployment:</strong></p>
<ul>
<li><strong>Active/Standby</strong>: One ASA device is the primary, handling all traffic, while the other is in standby mode, ready to take over in case of failure.</li>
<li><strong>Active/Active</strong>: Both ASA devices handle traffic in an <strong>active-active</strong> fashion, providing load balancing and redundancy.</li>
</ul>
</li>
<li>
<p><strong>Clustering:</strong></p>
<ul>
<li>ASA devices can be clustered for high availability and scalability. This allows for multiple firewalls to be grouped together to handle higher traffic loads and provide redundancy.</li>
</ul>
</li>
<li>
<p><strong>Virtualization (ASA Virtual):</strong></p>
<ul>
<li>Cisco ASA is available as a <strong>virtual appliance</strong> that can be deployed in virtualized environments (e.g., VMware, Hyper-V, KVM). This is ideal for organizations that need to deploy a firewall in cloud or virtual environments.</li>
</ul>
</li>
</ol>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>paul0000</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/cisco-asa/</guid>
                    </item>
				                    <item>
                        <title>Security Intelligence</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/security-intelligence/</link>
                        <pubDate>Tue, 10 Sep 2024 16:56:46 +0000</pubDate>
                        <description><![CDATA[Security Intelligence in Cisco firewalls is a set of features designed to enhance threat detection and response by leveraging real-time data, threat intelligence feeds, and advanced analytic...]]></description>
                        <content:encoded><![CDATA[<p><strong>Security Intelligence</strong> in Cisco firewalls is a set of features designed to enhance threat detection and response by leveraging real-time data, threat intelligence feeds, and advanced analytics. It helps Cisco firewalls and security appliances to better understand and mitigate security threats based on up-to-date information and context.</p>
<p>Here’s an overview of the key aspects of Security Intelligence in Cisco firewalls:</p>
<h3><strong>Threat Intelligence Feeds:</strong></h3>
<ul>
<li><strong>External Feeds:</strong> Cisco firewalls can integrate with external threat intelligence feeds to receive information about known threats, malicious IP addresses, domains, and URLs. These feeds provide real-time data about emerging threats and cyberattack patterns.</li>
<li><strong>Cisco Talos:</strong> Cisco’s own threat intelligence organization, Talos, provides threat intelligence feeds and insights. Talos analyzes global threat data to identify and block malicious activity.</li>
</ul>
<h3><strong>URL Filtering:</strong></h3>
<ul>
<li><strong>Dynamic URL Categorization:</strong> Cisco firewalls use URL filtering to block access to malicious or inappropriate websites. URLs are categorized based on threat intelligence and updated regularly to reflect current risks.</li>
<li><strong>Content Control:</strong> In addition to blocking known malicious sites, URL filtering can be used to enforce policies related to content access, such as restricting access to social media or gambling sites.</li>
</ul>
<h3><strong>IP Reputation and Geo-Location:</strong></h3>
<ul>
<li><strong>IP Reputation:</strong> Cisco firewalls use IP reputation databases to identify and block traffic from known malicious IP addresses. This helps prevent communication with known command-and-control servers and other malicious entities.</li>
<li><strong>Geo-Location:</strong> Geo-location features can block or restrict traffic based on the geographical location of IP addresses, helping to mitigate risks from high-risk regions.</li>
</ul>
<h3><strong>Advanced Malware Protection (AMP):</strong></h3>
<ul>
<li><strong>File Analysis:</strong> Cisco’s AMP for Networks analyzes files for malware and other threats. It uses sandboxing and file reputation services to detect and prevent advanced threats.</li>
<li><strong>File Retrospection:</strong> AMP provides retrospection capabilities to detect and respond to threats that may have bypassed initial defenses.</li>
</ul>
<h3><strong>Threat Analytics and Reporting:</strong></h3>
<ul>
<li><strong>Security Intelligence Dashboard:</strong> Cisco firewalls provide dashboards and reports that summarize threat intelligence and security events. This helps administrators understand the threat landscape and make informed decisions.</li>
<li><strong>Incident Correlation:</strong> Correlation of threat data from various sources helps in identifying patterns and responding to security incidents more effectively.</li>
</ul>
<h3><strong>Automation and Orchestration:</strong></h3>
<ul>
<li><strong>Automated Threat Response:</strong> Cisco firewalls can automate responses to detected threats based on predefined policies. For example, they can block malicious IP addresses or quarantine infected hosts automatically.</li>
<li><strong>Integration with Security Platforms:</strong> Integration with Cisco’s broader security platform (such as Cisco SecureX) allows for coordinated threat response and automated security operations.</li>
</ul>
<h3><strong>Contextual Awareness:</strong></h3>
<ul>
<li><strong>Network Context:</strong> Cisco firewalls use contextual information about network traffic, such as application types and user identities, to enhance threat detection and policy enforcement.</li>
<li><strong>User and Device Visibility:</strong> By integrating with Cisco’s identity services, firewalls can apply security policies based on user roles and device types.</li>
</ul>
<h3><strong>Threat Prevention Policies:</strong></h3>
<ul>
<li><strong>Customizable Policies:</strong> Administrators can define and customize security policies based on threat intelligence. This includes blocking or restricting access based on threat indicators such as IP addresses, URLs, and file types.</li>
<li><strong>Policy Tuning:</strong> Continuous tuning and updating of security policies based on emerging threats and intelligence help maintain effective defenses.</li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/security-intelligence/</guid>
                    </item>
				                    <item>
                        <title>Reset Hit count in FMC</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/reset-hit-count-in-fmc/</link>
                        <pubDate>Wed, 12 Jun 2024 12:59:05 +0000</pubDate>
                        <description><![CDATA[Hi, 
I have to  to reset the Hit counts on my access control policies. Is this feature available to reset the hit count in FMC]]></description>
                        <content:encoded><![CDATA[<p>Hi, </p>
<p>I have to  to reset the Hit counts on my access control policies. Is this feature available to reset the hit count in FMC</p>
<p> </p>
<p> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>Ivan Lon</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/reset-hit-count-in-fmc/</guid>
                    </item>
				                    <item>
                        <title>Monitor the changes that users in FMC Rule</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/monitor-the-changes-that-users-in-fmc-rule/</link>
                        <pubDate>Mon, 06 May 2024 04:51:57 +0000</pubDate>
                        <description><![CDATA[Hi, 
To monitor the changes that users make and ensure that they follow your organization’s preferred standard, you can configure the system to send, via email, a detailed report of changes...]]></description>
                        <content:encoded><![CDATA[<p>Hi, </p>
<p id="ID-2241-000006bd__ID-2241-000006cf" class="p">To monitor the changes that users make and ensure that they follow your organization’s preferred standard, you can configure the system to send, via email, a detailed report of changes made over the past 24 hours. Whenever a user saves changes to the system configuration, a snapshot is taken of the changes. The change reconciliation report combines information from these snapshots to present a clear summary of recent system changes.</p>
<p id="ID-2241-000006bd__ID-2241-000006d0" class="p">The following sample graphic displays a User section of an example change reconciliation report and lists both the previous value for each configuration and the value after changes. When users make multiple changes to the same configuration, the report lists summaries of each distinct change in chronological order, beginning with the most recent.</p>
<p><strong>Pre-Requisite:</strong></p>
<p><span>Configure an email server to receive emailed reports of changes made to the system over a 24-hour period</span></p>
<section class="tasklabel">
<h4 class="sectiontitle tasklabel cB_Bold">Procedure</h4>
</section>
<hr noshade="noshade" />
<div class="tableContainer">
<table class="stepTable" border="0">
<tbody>
<tr id="ID-2241-000006f4__step_5000B4440FA14FCBA7C0C21A3FF0A06A" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 1</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-0000070d" class="ph cmd">Choose<span> </span><span class="ph"><span class="ph uicontrol">System</span><span> </span>(<a class="show-image-alone" title="system gear icon" href="https://www.cisco.com/c/dam/en/us/td/i/400001-500000/450001-460000/451001-452000/451292.jpg"><img class="image" src="https://www.cisco.com/c/dam/en/us/td/i/400001-500000/450001-460000/451001-452000/451292.jpg" alt="system gear icon" /></a>)<span class="ph menucascade"><span class="ph uicontrol"></span><span> </span>&gt;<span> </span><span class="ph uicontrol">Configuration</span></span></span>.</p>
</td>
</tr>
<tr id="ID-2241-000006f4__step_C302C3B1CD764AFBBE5CE6DE7681CCD0" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 2</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-00000710" class="ph cmd">Click<span> </span><span class="ph uicontrol">Change Reconciliation</span>.</p>
</td>
</tr>
<tr id="ID-2241-000006f4__step_AC0FAAC237FD425E8A60D5244D7D14B5" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 3</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-00000713" class="ph cmd">Check the<span> </span><span class="ph uicontrol">Enable</span><span> </span>check box.</p>
</td>
</tr>
<tr id="ID-2241-000006f4__step_175347BBD0DC440D942592CE5236678A" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 4</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-00000716" class="ph cmd">Choose the time of day you want the system to send out the change reconciliation report from the<span> </span><span class="ph uicontrol">Time to Run</span><span> </span>drop-down lists.</p>
</td>
</tr>
<tr id="ID-2241-000006f4__step_1C7623C287204EA5BDFEBA0DA1CFB46C" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 5</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-00000719" class="ph cmd">Enter email addresses in the<span> </span><span class="ph uicontrol">Email to</span><span> </span>field.</p>
<section class="itemgroup info">
<div class="tableContainer">
<table class="olh_note" role="note" border="0">
<tbody>
<tr>
<td class="td_faq" role="heading" width="1%">
<p><strong>Tip</strong></p>
 </td>
<td class="td_faq">
<section class="note__content">
<p id="ID-2241-000006f4__ID-2241-0000071c" class="p">Once you have added email addresses, click<span> </span><span class="ph uicontrol">Resend Last Report</span><span> </span>to send recipients another copy of the most recent change reconciliation report.</p>
</section>
</td>
</tr>
</tbody>
</table>
</div>
</section>
</td>
</tr>
<tr id="ID-2241-000006f4__step_E7C8198BB7874977AD601F22A2022158" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 6</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-0000071f" class="ph cmd">If you want to include policy changes, check the<span> </span><span class="ph uicontrol">Include Policy Configuration</span><span> </span>check box.</p>
</td>
</tr>
<tr id="ID-2241-000006f4__step_2980F55FA12C44228783993381D7124F" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 7</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-00000722" class="ph cmd">If you want to include all changes over the past 24 hours, check the<span> </span><span class="ph uicontrol">Show Full Change History</span><span> </span>check box.</p>
</td>
</tr>
<tr id="ID-2241-000006f4__step_635BD29467534C30B5AA8FB7E899EBBC" class="li step">
<td align="left" valign="top" width="10%">
<p><strong>Step 8</strong></p>
</td>
<td align="left" valign="top">
<p id="ID-2241-000006f4__ID-2241-00000725" class="ph cmd">Click<span> </span><span class="ph uicontrol">Save</span>.</p>
</td>
</tr>
</tbody>
</table>
</div>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>Ivan Lon</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/monitor-the-changes-that-users-in-fmc-rule/</guid>
                    </item>
				                    <item>
                        <title>A company wants a solution to aggregate the capacity of two Cisco FTD devices to make the best use of resources such as bandwidth and connections per second. Which order of steps must be taken across the Cisco FTDs with Cisco FMC to meet this require</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/a-company-wants-a-solution-to-aggregate-the-capacity-of-two-cisco-ftd-devices-to-make-the-best-use-of-resources-such-as-bandwidth-and-connections-per-second-which-order-of-steps-must-be-taken-across/</link>
                        <pubDate>Mon, 29 Apr 2024 23:49:25 +0000</pubDate>
                        <description><![CDATA[A company wants a solution to aggregate the capacity of two Cisco FTD devices to make the best use of resources such as bandwidth and connections per second. Which order of steps must be tak...]]></description>
                        <content:encoded><![CDATA[<p class="card-text">A company wants a solution to aggregate the capacity of two Cisco FTD devices to make the best use of resources such as bandwidth and connections per second. Which order of steps must be taken across the Cisco FTDs with Cisco FMC to meet this requirement?</p>
<div class="question-choices-container">
<ul>
<li class="multi-choice-item"><span class="multi-choice-letter" data-choice-letter="A">A.<span> </span></span>Add members to the Cisco FMC, configure Cisco FTD interfaces, create the cluster in Cisco FMC, and configure cluster members in Cisco FMC</li>
<li class="multi-choice-item"><span class="multi-choice-letter" data-choice-letter="B">B.<span> </span></span>Add members to Cisco FMC, configure Cisco FTD interfaces in Cisco FMC, configure cluster members in Cisco FMC, create cluster in Cisco FMC, and configure cluster members in Cisco FMC</li>
<li class="multi-choice-item"><span class="multi-choice-letter" data-choice-letter="C">C.<span> </span></span>Configure the Cisco FTD interfaces, add members to FMC, configure cluster members in FMC, and create cluster in Cisco FMC</li>
<li class="multi-choice-item correct-hidden correct-choice"><span class="multi-choice-letter" data-choice-letter="D">D.<span> </span></span>Configure the Cisco FTD interfaces and cluster members, add members to Cisco FMC, and create the cluster in Cisco FMC</li>
</ul>
</div>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>Kustar</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/a-company-wants-a-solution-to-aggregate-the-capacity-of-two-cisco-ftd-devices-to-make-the-best-use-of-resources-such-as-bandwidth-and-connections-per-second-which-order-of-steps-must-be-taken-across/</guid>
                    </item>
				                    <item>
                        <title>Download pre-filter access rule from fmc</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/download-pre-filter-access-rule-from-fmc/</link>
                        <pubDate>Sat, 27 Apr 2024 08:23:47 +0000</pubDate>
                        <description><![CDATA[I have to download the pre-filter policy from Cisco FMC which is configured for the FPR 4112.
 
Can anyone guide to download the same]]></description>
                        <content:encoded><![CDATA[<p>I have to download the pre-filter policy from Cisco FMC which is configured for the FPR 4112.</p>
<p> </p>
<p>Can anyone guide to download the same</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>Ronny</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/download-pre-filter-access-rule-from-fmc/</guid>
                    </item>
				                    <item>
                        <title>Machine authentication with Remote VPN (AnyConnect)</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/machine-authentication-with-remote-vpn-anyconnect/</link>
                        <pubDate>Thu, 11 Apr 2024 13:07:17 +0000</pubDate>
                        <description><![CDATA[Anyconnect clients establish VPN tunnels to firewall and are authenticated using an  AD . For AD, the ASA sends the authentication request to ISE which is integrated with AD. Clients are ass...]]></description>
                        <content:encoded><![CDATA[<p><span>Anyconnect clients establish VPN tunnels to firewall and are authenticated using an  AD . For AD, the ASA sends the authentication request to ISE which is integrated with AD. Clients are associated to different group-policies depending on which AD group they belong to.</span></p>
<p> </p>
<p><span>We would like to add machine authentication to this, is is possible to additionally check that the client machine is also present and active in AD?</span></p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>Ivan Lon</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/machine-authentication-with-remote-vpn-anyconnect/</guid>
                    </item>
				                    <item>
                        <title>Clustering of Cisco ASA Firewall</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/clustering-of-cisco-asa-firewall/</link>
                        <pubDate>Mon, 20 Feb 2023 06:03:55 +0000</pubDate>
                        <description><![CDATA[]]></description>
                        <content:encoded><![CDATA[<p>https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/clustering/asa-cluster-solution.html</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>143 World</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/clustering-of-cisco-asa-firewall/</guid>
                    </item>
							        </channel>
        </rss>
		