-
##### ISSUE TYPE
- Bug Report
I am using *bigip_firewall_rule ** to add a new rule the existing policy, by default it get added as the last rule. Is there any way to specify the "placeAfter" …
-
when creating a flow, only one protocol can be added.
In reality, especially when configuring firewall rules, we generally have tcp/port-number udp/por-number in the same rule/flow.
take for examp…
-
### **APT28 accesses poorly maintained Cisco routers and deploys malware on unpatched devices using CVE-2017-6742.**
#### **Overview and Context**
The UK National Cyber Security Centre ( [NCSC](ht…
-
Dear Marc,
I'm having some trouble to make ldaps setup work. The same server configuration using plain ldap works correctly. The checks I've been doing point to a sort of negotiation problem with o…
-
Trying to test authenticating an ASAv in my lab and the only response I seem to be able to get from tac_plus-ng is an Illegal packet response, Ive captured and checked with wireshark and using the "Te…
-
**Describe the bug**
Getting the following error when attempting to connect to device via .open() on NetconfDriver via scrapli_netconf
```
password prompt seen more than once, assuming auth faile…
-
I have a customer collecting Cisco ISE logs that sometimes have the ip address in the host field, and sometimes the hostname. They have requested that the ip address be used always, which we can get …
-
### What type of defect/bug is this?
Crash or memory corruption (segv, abort, etc...)
### How can the issue be reproduced?
I've attached a program that sends a packet to radiusd port 1812
that cau…
-
### Is your feature request related to a problem? Yes
We are using Tacacs for device auth. The initial onboarding setup of new BIG-IP VE’s is done by an Ansible playbook.
One of the config chan…
-
I'm trying to get familiar with the new syntax. This is my minimal config for testing:
```
#!../../../sbin/tac_plus-ng
debug redirect = /dev/stdout
id = spawnd {
listen = { port = 4949 }
…