Started By
Message

re: Anyone here have their CCNA?

Posted on 6/15/16 at 2:36 pm to
Posted by 3nOut
Central Texas, TX
Member since Jan 2013
28844 posts
Posted on 6/15/16 at 2:36 pm to
quote:

Not sure of the reseller. Boss man handles all that. I demo'd a Palo Alto, Fortinet, and SOPHOS. I was really impressed with the Fortinet only because I had dealt with it before.

Not knocking the Palo Alto, but I just rather the SonicWALL.


to each their own, for sure. i've beaten out Palo Alto with SonicWall (when they screwed us out of a deal registration) plenty of times.

fortinet has the shittiest reporting of any network security device i've ever worked with but they do a lot for less that Palo, Checkpoint, or Cisco. sophos is a pretty meh product to me.
Posted by XanderCrews
Member since Mar 2009
774 posts
Posted on 6/15/16 at 2:42 pm to
(no message)
This post was edited on 12/21/21 at 10:32 am
Posted by gmrkr5
NC
Member since Jul 2009
14889 posts
Posted on 6/15/16 at 3:08 pm to
i vote Palo as well... i've played with every next gen firewall out there for the most part and Palo is currently at the top of the list for me.
Posted by Tigeralum2008
Yankees Fan
Member since Apr 2012
17131 posts
Posted on 6/15/16 at 3:19 pm to
Check out/test Aruba next time you guys are looking to improve/update your network infrastructure. You'll be surprised when you compare it to Cisco.

With all due respect to those loyal to Cisco, the company is slipping IMHO

Posted by LSUDropout
Member since Oct 2009
2023 posts
Posted on 6/15/16 at 3:46 pm to
Aruba (HP?), has scored well on the Gartner Magic Quadrants, I'll give you that. I think they put out a pretty good wireless solution, but I think it's going to be a while before you see their wired solutions being widely adopted in enterprise LANs. People are hesitant to move away from products they know and products that have worked for them in the past. If I recommend Aruba switches and and something goes wrong, people are going to be all over me for that decision. I recommend Cisco and something goes wrong, nobody will ever question that decision b/c they are and have been and industry leader for decades.

There are a lot of factors that make Cisco great other than reliable gear too. In my opinion their support, online documentation, and support community are second to none.
Posted by WavinWilly
Wavin Away in Sharlo
Member since Oct 2010
8781 posts
Posted on 6/15/16 at 3:49 pm to
quote:

i vote Palo as well... i've played with every next gen firewall out there for the most part and Palo is currently at the top of the list for me.



Worst part about the oil downturn. I don't bother playing with new toys because I know we won't spend the money
Posted by 3nOut
Central Texas, TX
Member since Jan 2013
28844 posts
Posted on 6/15/16 at 3:50 pm to
quote:

You'll be surprised when you compare it to Cisco.

With all due respect to those loyal to Cisco, the company is slipping IMHO



cisco is so damn overrated in everything they sell. wireless? rather go with aruba. firewall? rather go with Palo Alto, Fortinet or SW. Edge switches? dell, extreme, aruba all do the same for 60% of the price.

so overrated.... except for their 9ks baws.
Posted by Hulkklogan
Baton Rouge, LA
Member since Oct 2010
43296 posts
Posted on 6/15/16 at 6:08 pm to
Hell, they're even on sale right now.

LINK

Cisco Press.
Posted by Hulkklogan
Baton Rouge, LA
Member since Oct 2010
43296 posts
Posted on 6/15/16 at 6:15 pm to
Personally, I haven't gotten my hands on Aruba or Palo Alto. I have dealt with Sonicwalls, and I rather deal with an ASA. That said, that might be a biased opinion just simply because I'm so familiar with ASAs and unfamiliar with Sonicwalls. I've dealt with Cisco, Juniper, Adtran, and Brocade for routing and switching. I've found that Juniper works just as well, but costs just as much (until you're a Juniper partner). I fricking hate Brocades and Adtran. We call them Brokeade and Sadtran. I've seen OSPF stop working altogether on a Brocade FCX648S by simply configuring a new VLAN interface. Had to reboot the son of a bitch.

For firewalls, we have previously used ASAs but are moving to Juniper SRX platform as we slowly migrate off of an older infrastructure. I have a love/hate relationship with the SRXs, so far...I love the security zones, gives you lots of control and flexibility. We have had lots of bugginess with them, though, and to get a beefier SRX costs quite a bit.

The ASR9Ks are boss. IOS-XR is great, also. The only problem with the ASR9K is upgrading can be a bit of a real bitch at times, although they're making it a smoother process as time goes on.
Posted by FriscoTiger
Frisco, TX
Member since Aug 2005
3480 posts
Posted on 6/15/16 at 9:34 pm to
Check out INE. Best online training out there. I know 2 guys who pasted CCIE lab using them and their home lab.
Posted by 3nOut
Central Texas, TX
Member since Jan 2013
28844 posts
Posted on 6/16/16 at 8:33 am to
quote:

Personally, I haven't gotten my hands on Aruba or Palo Alto. I have dealt with Sonicwalls, and I rather deal with an ASA


my problem with the ASA is that it hasn't changed or improved in the last 10 years. they added the ASDM for those who can't CLI (no offense intended.) it lets you make a NAT and open a port to an IP and that's it.

sonicwall, palo, and fortinet have all realized the fact that ports are incredibly insecure and moved on to application visibility along with LDAP integration. you allow applications OR ports to the right users OR IPs. Also the IPS module was completely worthless to even a power user unless you had time to sit and eliminate false positives all day long. PAN, SW, and Fortinet include malware, IPS, and (semi-crappy) URL filtering built into the box.

Cisco didn't even try to develop something, just bought Sourcefire and made people put in a module, buy another appliance, and try to sell a bunch of UCS servers to support it.
This post was edited on 6/16/16 at 8:36 am
Posted by Hulkklogan
Baton Rouge, LA
Member since Oct 2010
43296 posts
Posted on 6/16/16 at 9:08 am to
quote:

they added the ASDM for those who can't CLI (no offense intended.)


None taken. I use the CLI almost exclusively, except when dealing with our VPN stuff. CLI is cumbersome for that, imo.

quote:

sonicwall, palo, and fortinet have all realized the fact that ports are incredibly insecure and moved on to application visibility along with LDAP integration. you allow applications OR ports to the right users OR IPs. Also the IPS module was completely worthless to even a power user unless you had time to sit and eliminate false positives all day long. PAN, SW, and Fortinet include malware, IPS, and (semi-crappy) URL filtering built into the box.

Cisco didn't even try to develop something, just bought Sourcefire and made people put in a module, buy another appliance, and try to sell a bunch of UCS servers to support it.


I agree.
Posted by jdd48
Baton Rouge
Member since Jan 2012
22071 posts
Posted on 6/16/16 at 9:37 am to
quote:

I demo'd one for about 3 months. I really wasn't overly impressed. I definitely thought the DPI on a SonicWALL was much more intensified than on the Palo Alto


I'm on the other end of the spectrum. I think a PAN firewall was probably the greatest purchase I've made in the past 3+ years. Everything seems easier than any other firewall I'd used, from basic log viewing, to setting up L2L VPN's, security rules, NAT rules, etc. The AD integration is pretty sweet too, as well as being able to view behavioral blocks (SMTP brute force attempts, for example) and blocking incoming traffic from entire countries without having to actually specify the IP ranges.
This post was edited on 6/16/16 at 10:03 am
first pageprev pagePage 2 of 2Next pagelast page
refresh

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram