Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Frozen Sabre
May 11, 2006

workape posted:

I'm about to wander down this path as well, someone in management went to a meeting and saw another manager able to use SRM from their iPhone and now we have the question being posed "Why don't we have this already?" which is fun because our security group essentially said no to any consumer grade devices attaching up to the network.

Everything that I have read so far is worthless and Cisco says to look at Apple and Apple says to look at Cisco for answers. So if you find something, please post it.
Just recently went to a Cisco run seminar called "Cisco Unified Communications" which demonstrated pretty much everything you're listing up there. eg. use of iPad/iPhone/whatever-smart-phone-thingy and having it linked to VOIP and IRC-style chat along with everything else you'd expect from a mobile office. Was actually really cool, and is reportedly developed ground up with security in mind (to the point that cisco actually bought Jabber and its XMPP protocol).

So if you can find a consultancy/direct contact with Cisco this is probably what you're looking at and should ask them about.

Adbot
ADBOT LOVES YOU

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

I don't think the AnyConnect client is available yet for iPads.

The problem is that normally I'd use my existing Juniper SA4500s with client certs, but Safari under iPad OS 3 doesn't send client certs correctly. iPhone OS 4 does, for what it's worth.

The whole thing sucks, really.

Current state of iPhone/iPad VPN:

iPhone OS 4: Safari works correctly with client certs, JunOS Pulse, Cisco AnyConnect, Cisco IPSec/L2TP/PPTP
iPad OS 3: Cisco IPSec/L2TP/PPTP


Blame the victim!

Tell them to hold out for iOS 4.2 (it's in beta now), Cisco released AnyConnect for iOS 4 about a week ago, so as soon as iOS 4.2 hits they'll be able to have AnyConnect SSLVPN from iPad. Or get them to sign up for the developer program so you can get the beta code.

-edit-
As for actually setting it up, you'll want to look at the Apple enterprise site (make sure to check the deployment guide link to their KB), you'll need to develop your own internal webapp for device provisioning, which should be able to push all the config down to your devices.

And you'll need an SCEP enabled SSL CA on your network (like the Windows CA).
-/edit-

ragzilla fucked around with this message at 01:43 on Oct 1, 2010

workape
Jul 23, 2002

Moxnight posted:

Just recently went to a Cisco run seminar called "Cisco Unified Communications" which demonstrated pretty much everything you're listing up there. eg. use of iPad/iPhone/whatever-smart-phone-thingy and having it linked to VOIP and IRC-style chat along with everything else you'd expect from a mobile office. Was actually really cool, and is reportedly developed ground up with security in mind (to the point that cisco actually bought Jabber and its XMPP protocol).

So if you can find a consultancy/direct contact with Cisco this is probably what you're looking at and should ask them about.

I met a guy at a UCS event last night who was using the ipsec vpn mixed with the rsa soft tokens on his phone and it worked amazingly well. I'm going to drop him a line and see if I can get more information about his vpn setup since he had to do both iphones and ipads.

jwh
Jun 12, 2002

ragzilla posted:

Tell them to hold out for iOS 4.2 (it's in beta now), Cisco released AnyConnect for iOS 4 about a week ago, so as soon as iOS 4.2 hits they'll be able to have AnyConnect SSLVPN from iPad. Or get them to sign up for the developer program so you can get the beta code.
Yeah, but once 4.2 comes out, the Pulse client should be available too.

The biggest issue right now is that under 3.x iPad code, the only real certificate based authentication available is as part of the Cisco bundled IPSec client.

Well, that, and the fact that the Safari bundled with iPad OS 3 doesn't send client certificates correctly.

ior
Nov 21, 2003

What's a fuckass?
sigh, the end result of 4 RMAs and one pissed of customer, newly created bug id: CSCtj20996

Symptom:

When using some blue-tooth serial adapters connected to the console port of the ct5508 controller, the unit will go into a continuous crash loop until the blue-tooth serial adapter is removed from the console port.

Workaround:

Remove the blue-tooth serial adapter and allow the unit to fully boot, once booted, you can reinstall the blue-tooth serial adapter and use it normally.



Cisco, I do not love you today! :bang:

ragzilla
Sep 9, 2005
don't ask me, i only work here


ior posted:

sigh, the end result of 4 RMAs and one pissed of customer, newly created bug id: CSCtj20996

Symptom:

When using some blue-tooth serial adapters connected to the console port of the ct5508 controller, the unit will go into a continuous crash loop until the blue-tooth serial adapter is removed from the console port.

Workaround:

Remove the blue-tooth serial adapter and allow the unit to fully boot, once booted, you can reinstall the blue-tooth serial adapter and use it normally.



Cisco, I do not love you today! :bang:

Was it generating serial breaks?

-edit-

lilbean posted:

I've seen similar things happen to Sun machines with USB-serial adapters causing the to halt. Good times.
That's why you make sure your serial gear is sun break safe (lol breaking to ROM).


On a side note, anyone at NANOG this week?
-/edit-

ragzilla fucked around with this message at 14:33 on Oct 3, 2010

lilbean
Oct 2, 2003

ior posted:

sigh, the end result of 4 RMAs and one pissed of customer, newly created bug id: CSCtj20996

Symptom:

When using some blue-tooth serial adapters connected to the console port of the ct5508 controller, the unit will go into a continuous crash loop until the blue-tooth serial adapter is removed from the console port.

Workaround:

Remove the blue-tooth serial adapter and allow the unit to fully boot, once booted, you can reinstall the blue-tooth serial adapter and use it normally.



Cisco, I do not love you today! :bang:
I've seen similar things happen to Sun machines with USB-serial adapters causing them to halt on spurious breaks. Good times.

ior
Nov 21, 2003

What's a fuckass?

ragzilla posted:

Was it generating serial breaks?

Nope. I have been using this bluetooth adapter without trouble for 2 years now on both routers and switches, I would notice if it was generating breaks.

jwh
Jun 12, 2002

ragzilla posted:

On a side note, anyone at NANOG this week?
Would like to be, but no.

Where is it this year?

Bardlebee
Feb 24, 2009

Im Blind.
jwh and inignot's answer to my NAT was right on the money. I can now do NAT... it was because of the access-lists using the same number.

I now am having an issue with the VPN I am connecting these two routers with. Router 2 is configured correctly as it was working fine when on the other side (now Router 1) was a non-cisco, so I can tell my new configuration isn't working. Though I think I did the IPsec setup correctly and the VPN, so I am confused. Any help from a trained eye would be awesome and will help me understand what I messed up. Here is Router 1 and Router 2:

Router 1
code:
Current configuration : 4289 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HardyOak
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable password <pass>
!
no aaa new-model
!
resource policy
!
!
!
ip cef
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.11.1
ip dhcp excluded-address 192.168.11.1 192.168.11.99
ip dhcp excluded-address 192.168.11.200 192.168.11.254
ip dhcp excluded-address 192.168.11.155
ip dhcp excluded-address 192.168.11.144
ip dhcp excluded-address 192.168.11.162
!
ip dhcp pool MainHO
   network 192.168.11.0 255.255.255.0
   default-router 192.168.11.1
   dns-server 192.168.11.220 192.168.2.240
!
!
!
!
crypto pki trustpoint TP-self-signed-2298352187
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-2298352187
 revocation-check none
 rsakeypair TP-self-signed-2298352187
!
!
crypto pki certificate chain TP-self-signed-2298352187
 certificate self-signed 01
  30820240 308201A9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 32323938 33353231 3837301E 170D3130 31303032 32313233
  33315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 32393833
  35323138 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  8100C942 BD757C1B B8466D73 C30A7858 CA04D288 C4EDFF38 12CC2A1C 22E941CC
  63724CA6 3DECE72C 20CACA7F 9FF2F381 D6323646 B70052D0 01C6482F C45ABAFC
  5BFAFC24 B6340BC2 7FB2723F 765DFAAA 47DD480E 0D23145B 84B8F61F 6701781A
  67505884 281332D8 54E60D87 4626E7B7 B76ADD77 32FC00D3 39EACE33 57DBE250
  8C350203 010001A3 68306630 0F060355 1D130101 FF040530 030101FF 30130603
  551D1104 0C300A82 08486172 64794F61 6B301F06 03551D23 04183016 8014E731
  2E7CB609 824B8D46 EE457DC1 B34F7D13 FC1D301D 0603551D 0E041604 14E7312E
  7CB60982 4B8D46EE 457DC1B3 4F7D13FC 1D300D06 092A8648 86F70D01 01040500
  03818100 704FC082 1E91D13B 0933CCC8 0609BBA3 CF790384 A15A0E48 DF20B797
  57E760A6 A44BE975 62A5D1E3 FDC8E5CD 081613AB D5A65394 365D6466 BCF782AF
  3F20EBCF EAF653E7 3E05C58A 52C151E5 5B5E85C3 70203114 F7324799 2F699E7C
  78352C6A 9DD844BE B50D486A E615BDA2 6B49074C 4B76D25E E1AD1D40 B83ACD3D 96CDF44B
  quit
username admin privilege 15 secret 5 $1$brFf$9AOOHCO7zWeeKsN2AcCPj/
!
!
!
crypto isakmp policy 1
 encr 3des
 authentication pre-share
 group 5
 lifetime 3600
crypto isakmp key css address 216.201.143.222
!
crypto ipsec security-association lifetime seconds 28800
!
crypto ipsec transform-set esp-3des-sha1 esp-3des esp-sha-hmac
!
crypto map vpn 10 ipsec-isakmp
 description WestGate
 set peer 216.201.143.222
 set transform-set esp-3des-sha1
 set pfs group2
 match address 103
!
!
!
!
interface FastEthernet0
 ip address 66.64.51.333 255.255.255.240
 ip mtu 1460
 ip nat outside
 ip virtual-reassembly
 speed 100
 full-duplex
 crypto map vpn
 crypto ipsec df-bit clear
!
interface FastEthernet1
 no ip address
 duplex auto
 speed auto
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
!
interface FastEthernet5
!
interface FastEthernet6
!
interface FastEthernet7
!
interface FastEthernet8
!
interface FastEthernet9
!
interface Vlan1
 ip address 192.168.11.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly
!
interface Async1
 no ip address
 encapsulation slip
!
ip route 0.0.0.0 0.0.0.0 66.64.51.444
!
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 600 life 86400 requests 10000
ip nat inside source list 1 interface FastEthernet0 overload
!
access-list 1 permit 192.168.11.0 0.0.0.255
access-list 102 permit ip 192.168.11.0 0.0.0.255 any
access-list 103 permit ip 192.168.2.0 0.0.0.255 any
access-list 103 permit ip 192.168.11.0 0.0.0.255 any
access-list 103 permit ip 192.168.11.0 0.0.0.255 192.168.2.0 0.0.0.255
!
!
!
!
!
!
control-plane
!
!
line con 0
 password <pass>
 logging synchronous
line 1
 modem InOut
 stopbits 1
 speed 115200
 flowcontrol hardware
line aux 0
line vty 0 4
 privilege level 15
 password <pass>
 login local
 transport input telnet ssh
!
!
webvpn context Default_context
 ssl authenticate verify all
 !
 no inservice
!
end
Router 2; Bolded VPN 10, the one Router 1 should be.
code:
30820246 308201AF A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 33383732 38393635 3630301E 170D3130 30363235 31363337
  35315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 38373238
  39363536 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  8100BE8A B5790460 A9253C5A 38A1933A 19925684 71E3593E F352827B CA66CCC1
  024EEC73 63C2FB7E DE069B52 F335D5EA A1A0839F A9E6104E EC45ABFA 8DA03006
  BD0FE01F 35D15726 8D8E23E5 21BCD930 D220CE65 4528F3DC BA15C82F 4720549B
  5EA44127 8DA7E630 EC359BC4 502C5E31 9DC8DA5E FF3D0393 DE10ED8D BC0013F5
  2FD30203 010001A3 6E306C30 0F060355 1D130101 FF040530 030101FF 30190603
  551D1104 12301082 0E57472D 53545343 2E574753 54534330 1F060355 1D230418
  30168014 176C5BC2 2E35E8A6 02309904 DA180631 A77880D9 301D0603 551D0E04
  16041417 6C5BC22E 35E8A602 309904DA 180631A7 7880D930 0D06092A 864886F7
  0D010104 05000381 81008D31 D77BC5FC 24ECF53F D08E4371 5677043A 6A3F0D17
  4E066A7B 8AB49E22 3B8F260F B8BB3723 2F10042A 66D44365 04F56FDB CD6DD582
  7C1C0E80 E73093F2 00880ECB 11050139 A40B8767 F6D7EF2B BA3DDE2F 8DFA7D3C
  58B8C04C 209A6D80 2C55F9B2 53BC4827 C92DEB9E E3865133 B6111C49 E98E486D
  8C638C74 52170C4E AEBA
        quit
dot11 syslog
!
!
ip cef
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.2.1
ip dhcp excluded-address 192.168.2.1 192.168.2.105
ip dhcp excluded-address 192.168.2.200 192.168.2.254
ip dhcp excluded-address 192.168.2.106 192.168.2.115
!
ip dhcp pool 192.168.2.0/24
   network 192.168.2.0 255.255.255.0
   default-router 192.168.2.1
   dns-server 192.168.2.240 192.168.11.220
!
!
ip domain name WGSTSC
!
multilink bundle-name authenticated
!
!
username admin privilege 15 secret 5 $1$okPG$sSaKRYxgE8z7A/oZYTN9k0
!
!
crypto isakmp policy 1
 encr 3des
 authentication pre-share
 group 5
 lifetime 3600
crypto isakmp key pass address 66.64.51.333
crypto isakmp key pass address 209.206.174.
crypto isakmp key pass address 24.153.154.
crypto isakmp key pass address 97.77.188.
crypto isakmp key pass address 216.201.140.
crypto isakmp key pass address 216.201.142.
crypto isakmp key pass address 209.206.174.
crypto isakmp invalid-spi-recovery
!
crypto ipsec security-association lifetime seconds 28800
!
crypto ipsec transform-set esp-aes-sha esp-aes esp-sha-hmac
crypto ipsec transform-set esp-3des-sha1 esp-3des esp-sha-hmac
!
crypto map vpn 4 ipsec-isakmp
 description WGPhysicalTherapy
 set peer 216.201.142.230
 set transform-set esp-3des-sha1
 set pfs group2
 match address 104
crypto map vpn 5 ipsec-isakmp
 description SanMarcos Tunnel
 set peer 209.206.174.146
 set transform-set esp-3des-sha1
 match address 105
crypto map vpn 6 ipsec-isakmp
 description NewBraunfels Tunnel
 set peer 97.77.188.154
 set transform-set esp-3des-sha1
 set pfs group2
 match address 106
crypto map vpn 7 ipsec-isakmp
 description Laredo Tunnel
 set peer 24.153.154.210
 set transform-set esp-3des-sha1
 set pfs group2
 match address 107
crypto map vpn 9 ipsec-isakmp
 description Topperwein Tunnel
 set peer 216.201.140.30
 set transform-set esp-3des-sha1
 set pfs group2
 match address 109
[b]crypto map vpn 10 ipsec-isakmp
 description HardyOak Tunnel
 set peer 66.64.51.333
 set transform-set esp-3des-sha1
 set pfs group2
 match address 101[/b]
!
archive
 log config
  hidekeys
!
!
!
!
!
interface Tunnel0
 no ip address
 ip mtu 1400
 ip tcp adjust-mss 1436
!
interface FastEthernet0
 ip address 216.201.143.222 255.255.255.240
 ip mtu 1460
 ip nat outside
 ip virtual-reassembly
 speed 100
 full-duplex
 crypto map vpn
 crypto ipsec df-bit clear
!
interface FastEthernet1
 no ip address
 duplex auto
 speed auto
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
!
interface FastEthernet5
!
interface FastEthernet6
!
interface FastEthernet7
!
interface FastEthernet8
!
interface FastEthernet9
 speed 100
!
interface Vlan1
 ip address 192.168.2.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly
!
interface Async1
 no ip address
 encapsulation slip
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 216.201.143.111
!
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 600 life 86400 requests 10000
ip nat inside source route-map SDM_RMAP_1 interface FastEthernet0 overload
!
logging 67.215.65.132
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 192.168.2.0 0.0.0.255
access-list 101 permit ip 192.168.2.0 0.0.0.255 192.168.11.0 0.0.0.255
access-list 102 remark SDM_ACL Category=18
access-list 102 deny   ip 192.168.2.0 0.0.0.255 192.168.4.0 0.0.0.255
access-list 102 deny   ip 192.168.2.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 102 deny   ip 192.168.2.0 0.0.0.255 192.168.6.0 0.0.0.255
access-list 102 deny   ip 192.168.2.0 0.0.0.255 192.168.7.0 0.0.0.255
access-list 102 deny   ip 192.168.2.0 0.0.0.255 192.168.9.0 0.0.0.255
access-list 102 deny   ip 192.168.2.0 0.0.0.255 192.168.11.0 0.0.0.255
access-list 102 permit ip 192.168.2.0 0.0.0.255 any
access-list 104 permit ip 192.168.2.0 0.0.0.255 192.168.4.0 0.0.0.255
access-list 105 permit ip 192.168.2.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 106 permit ip 192.168.2.0 0.0.0.255 192.168.6.0 0.0.0.255
access-list 107 permit ip 192.168.2.0 0.0.0.255 192.168.7.0 0.0.0.255
access-list 109 permit ip 192.168.2.0 0.0.0.255 192.168.9.0 0.0.0.255
!
!
!
route-map SDM_RMAP_1 permit 1
 match ip address 102
!
!
!
!
control-plane
!
!
line con 0
 password <pass>
 logging synchronous
line 1
 modem InOut
 stopbits 1
 speed 115200
 flowcontrol hardware
line aux 0
line vty 0 4
 privilege level 15
 password <pass>
 logging synchronous
 login
 transport input telnet ssh
line vty 5 15
 privilege level 15
 login local
 transport input ssh
line vty 16
 privilege level 15
 login local
 transport input all
!
end

ate shit on live tv
Feb 15, 2004

by Azathoth
It's hard to say. Learn how to use debug commands so that you can see whats failing. In this case debug crypto iskmap. It might be something as simple as a fat fingered password, or it is seeing the wrong remote address.

Also you [pre] instead of [code] if you want your [b] tags to work.

Bardlebee
Feb 24, 2009

Im Blind.
Hey guys, I am looking to buy a firewall, doesn't have to be Cisco... however I want my next job to be a network engineer of sorts (even if its junior level) so I would prefer to find something that is Cisco, if its feasible to do.

Some background:

- 100 user company
- five sites, most sites containing 3-4 users at most
- My experience has been with working with Cisco routers.. Setting up NAT/VPN IPsec stuff as you have probably already seen.
- My level of Cisco firewall experience is pretty much zero.

Though I lack experience, I would kill for the chance to set this firewall up. Additionally I should specify that I am not tied down to a time constraint, meaning I don't have to LEARN the firewall so fast as I need to just let my boss know I am still working on it.

Anyway, to much detail I suppose, but my main question is..

Is there a good Cisco Firewall out there that I can use the CLI on? (I assume most of them are) I am trying to get this for two reasons. 1. I think Cisco has a good product and 2. because this experience will be a catalyst in my career.

Also, would you recommend me having a firewall at every site? Even one that have the few 3-4 people.

Errmm.... sorry for wordy post :words:

CrazyLittle
Sep 11, 2001





Clapping Larry
Are you expected to VPN tunnel all the sites back to one central location, or no?

Bardlebee
Feb 24, 2009

Im Blind.
Yes, all sites connect to services held by one. Except there is a second site that has our secondary DNS and secondary Domain Controller for redundancy.

Sites 1 and 2. 1 Has all the services and about 50 people, other sites connect to it. Site 2 has the secondary DNS server, about 45 people. All the sites except site 2 is pointed to Site 1's DNS first.

May be too much info...

BelDin
Jan 29, 2001

Bardlebee posted:

because this experience will be a catalyst in my career.

In that case, you need a switch or two as well! :rimshot:

On a more serious note, what kind of connection do the other sites have? You can get ASA5505s with the base license for a few hundred dollars, and those would even let you dial back to your central location.

You get a CLI on just about every piece of network gear from Cisco, but you also get the ASDM. I'm a cli guy myself, but the gui makes access rule editing so much easier on firewalls it's not funny.

jwh
Jun 12, 2002

Bardlebee posted:

Hey guys, I am looking to buy a firewall, doesn't have to be Cisco...

You're requirements aren't particularly difficult to meet with anything out there, be it IOS-based router, PIX/ASA, or other vendor product.

If you really want Cisco, just look at a low end ISR or ASA. Either would be fine.

How do the remote offices connect now?

You could also just bring the VPN tunnels back to an IOS-based platform and then firewall off a different box (ASA, Palo Alto, etc.) which is often easier. At least, in my experience.

I don't like ASAs, for what it's worth.

Harry Totterbottom
Dec 19, 2008

jwh posted:

I don't like ASAs, for what it's worth.

ASA's are pretty simple to get up and running and the feature set for the price point is pretty nice. Learn the CLI and don't use the ASDM though because the ASDM does some stupid things from time to time. Personally I like them, but I'm bias because I get 5505's for about $300 with anyconnect essentials.

Bardlebee
Feb 24, 2009

Im Blind.

jwh posted:

You're requirements aren't particularly difficult to meet with anything out there, be it IOS-based router, PIX/ASA, or other vendor product.

If you really want Cisco, just look at a low end ISR or ASA. Either would be fine.

How do the remote offices connect now?

You could also just bring the VPN tunnels back to an IOS-based platform and then firewall off a different box (ASA, Palo Alto, etc.) which is often easier. At least, in my experience.

I don't like ASAs, for what it's worth.

Hmm I suppose I will need to a little research into they're product line. Is ASA different from a normal CLI type Cisco router or switch?

Right now all my remote office connect via a VPN over IPsec. Not all of them Cisco routers, most of the small 3-4 people are retail VPN routers and they all connect to my main site, which does have a Cisco 1811 in it.

CrazyLittle
Sep 11, 2001





Clapping Larry

Bardlebee posted:

Hmm I suppose I will need to a little research into they're product line. Is ASA different from a normal CLI type Cisco router or switch?

Right now all my remote office connect via a VPN over IPsec. Not all of them Cisco routers, most of the small 3-4 people are retail VPN routers and they all connect to my main site, which does have a Cisco 1811 in it.

The ASA line is the successor to the PIX line of firewall/security boxes. They all have CLI.

There's two things that you have to remember:
1) They don't run IOS, no matter how similar it looks.
2) PIX/ASA is not a router. They don't "route" traffic.

BelDin
Jan 29, 2001

CrazyLittle posted:

The ASA line is the successor to the PIX line of firewall/security boxes. They all have CLI.

There's two things that you have to remember:
1) They don't run IOS, no matter how similar it looks.
2) PIX/ASA is not a router. They don't "route" traffic.

Sure they are! Don't you see the area where you can configure EIGRP and OSPF? All we need to do is insert 30 NAT exemption rules and make all the interfaces have the same security level!

Swear to god, that's what was running on the network at my current work location when I got here. Still working on finishing the migration to, you know, Layer 3 switches and routers now.

jwh
Jun 12, 2002

I just don't like the ASA's way of doing things. I admit, I might not be smart enough to conceptualize it's arcane vagaries, but I've never felt like anything it did was either straightforward or intuitive.

Bardlebee
Feb 24, 2009

Im Blind.

CrazyLittle posted:

The ASA line is the successor to the PIX line of firewall/security boxes. They all have CLI.

There's two things that you have to remember:
1) They don't run IOS, no matter how similar it looks.
2) PIX/ASA is not a router. They don't "route" traffic.

I knew that they weren't routers, but this gives me insight on to what I might expect... If they are not the same as IOS then surely I may get lost easily.

Would you guys say it would benefit my experience to purchase an ASA? Or should I just get a firewall that is GUI based... I have heard Sonicwall is good, but I don't know if those are router/firewall mixes.

CrazyLittle
Sep 11, 2001





Clapping Larry

jwh posted:

I just don't like the ASA's way of doing things. I admit, I might not be smart enough to conceptualize it's arcane vagaries, but I've never felt like anything it did was either straightforward or intuitive.

You and me both. PIX even made more sense to me than the ASA's changes.

Bardlebee posted:

I knew that they weren't routers, but this gives me insight on to what I might expect... If they are not the same as IOS then surely I may get lost easily.
It's very very very similar. Like, all of the basics are the same. Once you get into the whole "I'm a firewall" aspect, that's where things differ.

Bardlebee posted:

Would you guys say it would benefit my experience to purchase an ASA? Or should I just get a firewall that is GUI based... I have heard Sonicwall is good, but I don't know if those are router/firewall mixes.

gently caress sonicwall.

jwh
Jun 12, 2002

Bardlebee posted:

Would you guys say it would benefit my experience to purchase an ASA? Or should I just get a firewall that is GUI based... I have heard Sonicwall is good, but I don't know if those are router/firewall mixes.

Get a Palo Alto PA-500!

Harry Totterbottom
Dec 19, 2008

CrazyLittle posted:

It's very very very similar. Like, all of the basics are the same. Once you get into the whole "I'm a firewall" aspect, that's where things differ.

Not to mention the show int ip brief instead of show ip int brief and other commands that just seem a little backwards.

Bardlebee
Feb 24, 2009

Im Blind.

CrazyLittle posted:


gently caress sonicwall.

Why so angry? Is sonicwall a bad product?

Palo-Alto 500, eh? Is it CLI or GUI? I assume CLI.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Sonicwalls are terrible, as are Watchguards.

Netscreen (Juniper SSG) is a good Cisco alternative. I'm a 100% CLI guy in almost all cases (Cisco IOS, FreeBSD servers, etc) but ScreenOS's web interface is good. It does have a CLI but configuring it from there isn't as friendly. I've also heard that Fortigate firewalls are nice but I don't have any experience with them- they were created by the the creator of Netscreen.

One last thing to look at that's quite a bit different is Mikrotik, something like a RouterBoard 1100 which is cheap as hell and are quite incredible when you compare their price/performance/features. For $400 you get 13 gig-e interfaces and it can do all sorts of firewall and routing stuff, ipsecvpn, openvpn, mpls, ospf, bgp, blah blah the list goes on.

Bardlebee
Feb 24, 2009

Im Blind.
I am looking at the Cisco ASA 5505... if I have my main site, connecting to my other five sites through a VPN IPSec connection, would I need to buy a security license?

http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_brochure0900aecd80402e36.html

Or is this just referring to actually user-to-site licenses? I am confused here.

jwh
Jun 12, 2002

Bardlebee posted:

Why so angry? Is sonicwall a bad product?

Palo-Alto 500, eh? Is it CLI or GUI? I assume CLI.

Both, but the majority of the administration is done via a web-based GUI. Even if you're a CLI guy (as I am), it's very workable. Working firewall/IPS/DLP policies textually can be difficult.

Unfortunately, and I don't know what your budget is, a PA-500 is 10x the cost of an ASA5505. But, it'll do all your firewall, site-to-site, client remote access, IDS/IPS, DLP, URL filtering in one platform. And that's pretty neat.

wolrah
May 8, 2006
what?
Is Cisco's SSL VPN using a standard VPN protocol of any sort? I ask because I have an IP phone which supports connecting to a SSL VPN and I'd like to screw around with that feature, but I don't believe any of my Cisco hardware is capable of running it. (plus I think I recall it being a licensed feature, and no way I'm paying just to mess around with something)

I'm hoping there's a Linux or FreeBSD implementation and I just don't have the right terms to search with.

Bardlebee
Feb 24, 2009

Im Blind.

wolrah posted:

Is Cisco's SSL VPN using a standard VPN protocol of any sort? I ask because I have an IP phone which supports connecting to a SSL VPN and I'd like to screw around with that feature, but I don't believe any of my Cisco hardware is capable of running it. (plus I think I recall it being a licensed feature, and no way I'm paying just to mess around with something)

I'm hoping there's a Linux or FreeBSD implementation and I just don't have the right terms to search with.

What do you mean by 'standard' SSL VPN? I was under the impression SSL was the standard?

abigserve
Sep 13, 2009

this is a better avatar than what I had before

CrazyLittle posted:

The ASA line is the successor to the PIX line of firewall/security boxes. They all have CLI.

There's two things that you have to remember:
1) They don't run IOS, no matter how similar it looks.
2) PIX/ASA is not a router. They don't "route" traffic.

A pix can route traffic - we route several DMZ's off our pix using ospf.

wolrah
May 8, 2006
what?

Bardlebee posted:

What do you mean by 'standard' SSL VPN? I was under the impression SSL was the standard?

SSL provides a standard method for encryption and authentication, but it's nowhere near all you'd need for a normal VPN tunnel. The completely clientless feature of Cisco SSL VPN seems to be a web interface to a variety of services, that does run on standard HTTPS, but what the Java port forwarding thing and the full AnyConnect tunnel client use is what I'm interested in.

CrazyLittle
Sep 11, 2001





Clapping Larry

abigserve posted:

A pix can route traffic - we route several DMZ's off our pix using ospf.

Try implementing PBR

jwh
Jun 12, 2002

I still think it's hilariously stupid that you can't terminate client VPN when the ASA is in multiple context mode. Did they ever fix that?

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

I still think it's hilariously stupid that you can't terminate client VPN when the ASA is in multiple context mode. Did they ever fix that?

Nope. It can't do site-to-site either.

jwh
Jun 12, 2002

ragzilla posted:

Nope. It can't do site-to-site either.

That's really disappointing.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

jwh posted:

That's really disappointing.

Yeah I really don't understand why they haven't done this.

jwh
Jun 12, 2002

Our DC systems folks are attempting to move to UCS-based chassis and blades within the next six to ten months, in an attempt to consolidate our VM environment.

To that end, they're proposing FEXs (Nexus 2ks) in the blades, connected to a HA pair of 6140 unified-fabric boxes. They're also proposing a Nexus 5000, to connect the 6140s to.

Thing is, I don't see what the point of the 5000 is, since all the M71KR-E converged network adapters terminate in the 6140s, and the only thing the 5000 would do is sit in between the 6140s and the 6500 L3 cores.

I can understand the 5000s provide cheaper 10gig density, but I don't see why that's important here if all the CNAs sit on the 6140s.

Am I missing something?

Adbot
ADBOT LOVES YOU

Tremblay
Oct 8, 2002
More dog whistles than a Petco

jwh posted:

Our DC systems folks are attempting to move to UCS-based chassis and blades within the next six to ten months, in an attempt to consolidate our VM environment.

To that end, they're proposing FEXs (Nexus 2ks) in the blades, connected to a HA pair of 6140 unified-fabric boxes. They're also proposing a Nexus 5000, to connect the 6140s to.

Thing is, I don't see what the point of the 5000 is, since all the M71KR-E converged network adapters terminate in the 6140s, and the only thing the 5000 would do is sit in between the 6140s and the 6500 L3 cores.

I can understand the 5000s provide cheaper 10gig density, but I don't see why that's important here if all the CNAs sit on the 6140s.

Am I missing something?

Well if they are planning on using 2100 series switches for top of rack, then it makes sense. If its only to support the UCS chassis they are looking to install then I'm with you. I don't see the point.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply