Started By
Message

re: Anyone here have their CCNA?

Posted on 6/15/16 at 6:15 pm to
Posted by Hulkklogan
Baton Rouge, LA
Member since Oct 2010
43312 posts
Posted on 6/15/16 at 6:15 pm to
Personally, I haven't gotten my hands on Aruba or Palo Alto. I have dealt with Sonicwalls, and I rather deal with an ASA. That said, that might be a biased opinion just simply because I'm so familiar with ASAs and unfamiliar with Sonicwalls. I've dealt with Cisco, Juniper, Adtran, and Brocade for routing and switching. I've found that Juniper works just as well, but costs just as much (until you're a Juniper partner). I fricking hate Brocades and Adtran. We call them Brokeade and Sadtran. I've seen OSPF stop working altogether on a Brocade FCX648S by simply configuring a new VLAN interface. Had to reboot the son of a bitch.

For firewalls, we have previously used ASAs but are moving to Juniper SRX platform as we slowly migrate off of an older infrastructure. I have a love/hate relationship with the SRXs, so far...I love the security zones, gives you lots of control and flexibility. We have had lots of bugginess with them, though, and to get a beefier SRX costs quite a bit.

The ASR9Ks are boss. IOS-XR is great, also. The only problem with the ASR9K is upgrading can be a bit of a real bitch at times, although they're making it a smoother process as time goes on.
Posted by FriscoTiger
Frisco, TX
Member since Aug 2005
3516 posts
Posted on 6/15/16 at 9:34 pm to
Check out INE. Best online training out there. I know 2 guys who pasted CCIE lab using them and their home lab.
Posted by 3nOut
Central Texas, TX
Member since Jan 2013
29090 posts
Posted on 6/16/16 at 8:33 am to
quote:

Personally, I haven't gotten my hands on Aruba or Palo Alto. I have dealt with Sonicwalls, and I rather deal with an ASA


my problem with the ASA is that it hasn't changed or improved in the last 10 years. they added the ASDM for those who can't CLI (no offense intended.) it lets you make a NAT and open a port to an IP and that's it.

sonicwall, palo, and fortinet have all realized the fact that ports are incredibly insecure and moved on to application visibility along with LDAP integration. you allow applications OR ports to the right users OR IPs. Also the IPS module was completely worthless to even a power user unless you had time to sit and eliminate false positives all day long. PAN, SW, and Fortinet include malware, IPS, and (semi-crappy) URL filtering built into the box.

Cisco didn't even try to develop something, just bought Sourcefire and made people put in a module, buy another appliance, and try to sell a bunch of UCS servers to support it.
This post was edited on 6/16/16 at 8:36 am
first pageprev pagePage 1 of 1Next pagelast page
refresh

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram