- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
re: Anyone here have their CCNA?
Posted on 6/15/16 at 2:36 pm to 9th Green At 9
Posted on 6/15/16 at 2:36 pm to 9th Green At 9
quote:
Not sure of the reseller. Boss man handles all that. I demo'd a Palo Alto, Fortinet, and SOPHOS. I was really impressed with the Fortinet only because I had dealt with it before.
Not knocking the Palo Alto, but I just rather the SonicWALL.
to each their own, for sure. i've beaten out Palo Alto with SonicWall (when they screwed us out of a deal registration) plenty of times.
fortinet has the shittiest reporting of any network security device i've ever worked with but they do a lot for less that Palo, Checkpoint, or Cisco. sophos is a pretty meh product to me.
Posted on 6/15/16 at 2:42 pm to 9th Green At 9
(no message)
This post was edited on 12/21/21 at 10:32 am
Posted on 6/15/16 at 3:08 pm to XanderCrews
i vote Palo as well... i've played with every next gen firewall out there for the most part and Palo is currently at the top of the list for me.
Posted on 6/15/16 at 3:19 pm to gmrkr5
Check out/test Aruba next time you guys are looking to improve/update your network infrastructure. You'll be surprised when you compare it to Cisco.
With all due respect to those loyal to Cisco, the company is slipping IMHO
With all due respect to those loyal to Cisco, the company is slipping IMHO
Posted on 6/15/16 at 3:46 pm to Tigeralum2008
Aruba (HP?), has scored well on the Gartner Magic Quadrants, I'll give you that. I think they put out a pretty good wireless solution, but I think it's going to be a while before you see their wired solutions being widely adopted in enterprise LANs. People are hesitant to move away from products they know and products that have worked for them in the past. If I recommend Aruba switches and and something goes wrong, people are going to be all over me for that decision. I recommend Cisco and something goes wrong, nobody will ever question that decision b/c they are and have been and industry leader for decades.
There are a lot of factors that make Cisco great other than reliable gear too. In my opinion their support, online documentation, and support community are second to none.
There are a lot of factors that make Cisco great other than reliable gear too. In my opinion their support, online documentation, and support community are second to none.
Posted on 6/15/16 at 3:49 pm to gmrkr5
quote:
i vote Palo as well... i've played with every next gen firewall out there for the most part and Palo is currently at the top of the list for me.
Worst part about the oil downturn. I don't bother playing with new toys because I know we won't spend the money
Posted on 6/15/16 at 3:50 pm to Tigeralum2008
quote:
You'll be surprised when you compare it to Cisco.
With all due respect to those loyal to Cisco, the company is slipping IMHO
cisco is so damn overrated in everything they sell. wireless? rather go with aruba. firewall? rather go with Palo Alto, Fortinet or SW. Edge switches? dell, extreme, aruba all do the same for 60% of the price.
so overrated.... except for their 9ks baws.
Posted on 6/15/16 at 6:08 pm to 9th Green At 9
Posted on 6/15/16 at 6:15 pm to 3nOut
Personally, I haven't gotten my hands on Aruba or Palo Alto. I have dealt with Sonicwalls, and I rather deal with an ASA. That said, that might be a biased opinion just simply because I'm so familiar with ASAs and unfamiliar with Sonicwalls. I've dealt with Cisco, Juniper, Adtran, and Brocade for routing and switching. I've found that Juniper works just as well, but costs just as much (until you're a Juniper partner). I fricking hate Brocades and Adtran. We call them Brokeade and Sadtran. I've seen OSPF stop working altogether on a Brocade FCX648S by simply configuring a new VLAN interface. Had to reboot the son of a bitch.
For firewalls, we have previously used ASAs but are moving to Juniper SRX platform as we slowly migrate off of an older infrastructure. I have a love/hate relationship with the SRXs, so far...I love the security zones, gives you lots of control and flexibility. We have had lots of bugginess with them, though, and to get a beefier SRX costs quite a bit.
The ASR9Ks are boss. IOS-XR is great, also. The only problem with the ASR9K is upgrading can be a bit of a real bitch at times, although they're making it a smoother process as time goes on.
For firewalls, we have previously used ASAs but are moving to Juniper SRX platform as we slowly migrate off of an older infrastructure. I have a love/hate relationship with the SRXs, so far...I love the security zones, gives you lots of control and flexibility. We have had lots of bugginess with them, though, and to get a beefier SRX costs quite a bit.
The ASR9Ks are boss. IOS-XR is great, also. The only problem with the ASR9K is upgrading can be a bit of a real bitch at times, although they're making it a smoother process as time goes on.
Posted on 6/15/16 at 9:34 pm to Hulkklogan
Check out INE. Best online training out there. I know 2 guys who pasted CCIE lab using them and their home lab.
Posted on 6/16/16 at 8:33 am to Hulkklogan
quote:
Personally, I haven't gotten my hands on Aruba or Palo Alto. I have dealt with Sonicwalls, and I rather deal with an ASA
my problem with the ASA is that it hasn't changed or improved in the last 10 years. they added the ASDM for those who can't CLI (no offense intended.) it lets you make a NAT and open a port to an IP and that's it.
sonicwall, palo, and fortinet have all realized the fact that ports are incredibly insecure and moved on to application visibility along with LDAP integration. you allow applications OR ports to the right users OR IPs. Also the IPS module was completely worthless to even a power user unless you had time to sit and eliminate false positives all day long. PAN, SW, and Fortinet include malware, IPS, and (semi-crappy) URL filtering built into the box.
Cisco didn't even try to develop something, just bought Sourcefire and made people put in a module, buy another appliance, and try to sell a bunch of UCS servers to support it.
This post was edited on 6/16/16 at 8:36 am
Posted on 6/16/16 at 9:08 am to 3nOut
quote:
they added the ASDM for those who can't CLI (no offense intended.)
None taken. I use the CLI almost exclusively, except when dealing with our VPN stuff. CLI is cumbersome for that, imo.
quote:
sonicwall, palo, and fortinet have all realized the fact that ports are incredibly insecure and moved on to application visibility along with LDAP integration. you allow applications OR ports to the right users OR IPs. Also the IPS module was completely worthless to even a power user unless you had time to sit and eliminate false positives all day long. PAN, SW, and Fortinet include malware, IPS, and (semi-crappy) URL filtering built into the box.
Cisco didn't even try to develop something, just bought Sourcefire and made people put in a module, buy another appliance, and try to sell a bunch of UCS servers to support it.
I agree.
Posted on 6/16/16 at 9:37 am to 9th Green At 9
quote:
I demo'd one for about 3 months. I really wasn't overly impressed. I definitely thought the DPI on a SonicWALL was much more intensified than on the Palo Alto
I'm on the other end of the spectrum. I think a PAN firewall was probably the greatest purchase I've made in the past 3+ years. Everything seems easier than any other firewall I'd used, from basic log viewing, to setting up L2L VPN's, security rules, NAT rules, etc. The AD integration is pretty sweet too, as well as being able to view behavioral blocks (SMTP brute force attempts, for example) and blocking incoming traffic from entire countries without having to actually specify the IP ranges.
This post was edited on 6/16/16 at 10:03 am
Popular
Back to top
Follow TigerDroppings for LSU Football News