- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
re: Anyone here have their CCNA?
Posted on 6/16/16 at 8:33 am to Hulkklogan
Posted on 6/16/16 at 8:33 am to Hulkklogan
quote:
Personally, I haven't gotten my hands on Aruba or Palo Alto. I have dealt with Sonicwalls, and I rather deal with an ASA
my problem with the ASA is that it hasn't changed or improved in the last 10 years. they added the ASDM for those who can't CLI (no offense intended.) it lets you make a NAT and open a port to an IP and that's it.
sonicwall, palo, and fortinet have all realized the fact that ports are incredibly insecure and moved on to application visibility along with LDAP integration. you allow applications OR ports to the right users OR IPs. Also the IPS module was completely worthless to even a power user unless you had time to sit and eliminate false positives all day long. PAN, SW, and Fortinet include malware, IPS, and (semi-crappy) URL filtering built into the box.
Cisco didn't even try to develop something, just bought Sourcefire and made people put in a module, buy another appliance, and try to sell a bunch of UCS servers to support it.
This post was edited on 6/16/16 at 8:36 am
Posted on 6/16/16 at 9:08 am to 3nOut
quote:
they added the ASDM for those who can't CLI (no offense intended.)
None taken. I use the CLI almost exclusively, except when dealing with our VPN stuff. CLI is cumbersome for that, imo.
quote:
sonicwall, palo, and fortinet have all realized the fact that ports are incredibly insecure and moved on to application visibility along with LDAP integration. you allow applications OR ports to the right users OR IPs. Also the IPS module was completely worthless to even a power user unless you had time to sit and eliminate false positives all day long. PAN, SW, and Fortinet include malware, IPS, and (semi-crappy) URL filtering built into the box.
Cisco didn't even try to develop something, just bought Sourcefire and made people put in a module, buy another appliance, and try to sell a bunch of UCS servers to support it.
I agree.
Popular
Back to top
Follow TigerDroppings for LSU Football News