Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
falz
Jan 29, 2005

01100110 01100001 01101100 01111010

How comparable do you consider these? One is an real router(tm) with FIB of ~10mil and the other is a switch with ~1mil employing jackmoves to make that happen?

Adbot
ADBOT LOVES YOU

beepsandboops
Jan 28, 2014
I have a machine with two interfaces on different networks on my LAN, and is trying to communicate with an ec2 instance.

We have a presence at an IX so we have a pretty direct path to Amazon. When a ping goes out one interface, it reaches the ec2 instance fine. When a ping goes out the other, it times out.

Both interfaces have the same next hop. Why would they be taking different paths? AFAIK nothing is configured differently with their routing

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS

quote:

two interfaces on different networks on my LAN

quote:

interfaces have the same next hop

Is this machine a gateway for both your LAN networks or did you mean you have two WAN interfaces on it?

beepsandboops
Jan 28, 2014

BurgerQuest posted:

Is this machine a gateway for both your LAN networks or did you mean you have two WAN interfaces on it?
Sorry, I phrased that poorly. Two interfaces on two different networks on the LAN. Once they leave the LAN, the both go to the IX, then Amazon's gateway, then seem to take completely divergent paths.

I guess my confusion is: if traffic for both of these interfaces, from Amazon's perspective, are both coming from the same public IP and going to the same public IP, why would they take divergent paths and why would one time out and the other not?

Thanks Ants
May 21, 2004

#essereFerrari


What's your route table/ACLs look like?

n0tqu1tesane
May 7, 2003

She was rubbing her ass all over my hands. They don't just do that for everyone.
Grimey Drawer
Do you have NAT set up for both networks on your router/firewall? It's possible that the NAT for the broken network could be using a different public IP, or something else is broken.

Do you have problems accessing other internet resources from the problem interface?

How do you know that they're taking different paths from your network? Where are the paths diverging?

ate shit on live tv
Feb 15, 2004

by Azathoth

falz posted:

How comparable do you consider these? One is an real router(tm) with FIB of ~10mil and the other is a switch with ~1mil employing jackmoves to make that happen?

tbh, I dont' consider the Arista comparable at all, but that is part of why i'm doing the bakeoff so I can specifically see the consequences and be assured that I'm making the right choice.

I have seen around 5million FIB for the MX204, but haven't gotten any numbers for the Arista. But yea, I basically just grabbed a demo-unit because our sales team was offering it. It's slick to mount so that's nice and I generally like Arista's API/CLI/ZTP setup so we use them for our tor switches and for our hadoop network.

beepsandboops
Jan 28, 2014

n0tqu1tesane posted:

Do you have NAT set up for both networks on your router/firewall? It's possible that the NAT for the broken network could be using a different public IP, or something else is broken.

Do you have problems accessing other internet resources from the problem interface?

How do you know that they're taking different paths from your network? Where are the paths diverging?
You were 100% right with NAT. I was taking the traceroute output at face value and assumed both paths went out the same public IP.

Thanks!

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

ate poo poo on live tv posted:

tbh, I dont' consider the Arista comparable at all, but that is part of why i'm doing the bakeoff so I can specifically see the consequences and be assured that I'm making the right choice.

I have seen around 5million FIB for the MX204, but haven't gotten any numbers for the Arista. But yea, I basically just grabbed a demo-unit because our sales team was offering it. It's slick to mount so that's nice and I generally like Arista's API/CLI/ZTP setup so we use them for our tor switches and for our hadoop network.
MX204 is an Trio Gen 3 aka "Eagle" which is same as an MPC7E. Unless they gimpled the 204's Eagle chipset, it's the same as an MPC7 which is 10mil.

Probably doesn't matter for your current stuff, but Gen4 MPC10 stuff was just announced the other day too, unsure how or if that will manifest itsself into another tiny godly box.

QFX10k3 on there too which is 32x400g in 3ru which seems nuts.

doomisland
Oct 5, 2004

400G poo poo is coming fast as far as I can tell.

MrMoo
Sep 14, 2000

OpenVPN on EdgeOS died today for some reason and it wasn't obvious why so I replaced it with IKEv2 IPsec and it worked, and even went via IPv6. It is a good day.

Sheep
Jul 24, 2003
Bit late now but it's worth considering Wireguard for VPNs since there's native support for EdgeOS and it's less resource intensive than OpenVPN.

SamDabbers
May 26, 2003



You probably won't get better performance using anything but IPsec with hardware offloaded crypto on EdgeOS platforms. Wireguard is neat, but those CPUs are pretty weak.

Thanks Ants
May 21, 2004

#essereFerrari


Has anybody looked at the Azure Virtual WAN service?

Bluecobra
Sep 11, 2001

The Future's So Bright I Gotta Wear Shades

doomisland posted:

400G poo poo is coming fast as far as I can tell.

And yet in TYOOL 2018 I can’t convince my coworkers that going single-mode is the way to go. We pay something like $300 dollars for these stupid MTP patch cables. :downs:

MrMoo
Sep 14, 2000

Thanks Ants posted:

Has anybody looked at the Azure Virtual WAN service?

Did you try it? Is it just ghetto MPLS with IPsec?

ate shit on live tv
Feb 15, 2004

by Azathoth

Bluecobra posted:

And yet in TYOOL 2018 I can’t convince my coworkers that going single-mode is the way to go. We pay something like $300 dollars for these stupid MTP patch cables. :downs:

Yea there is the non-trivial problem of the existing multimode (OM3 maybe) fiber plant and of course that means even if you want to start going SMF, you are going to run into compatibility issues when you lose an optic in one of the "old racks" and have to replace it, with an "old optic."

Methanar
Sep 26, 2013

by the sex ghost
What's wrong with MMF?

I use it for all my trunks. Servers each get two 10g copper DAC to different switches.

Am I doing it wrong?

Partycat
Oct 25, 2004

As far as I am aware it has always been an arguement of equipment costs vs plant longevity.

Nothing is wrong with MMF persay, just that it’s usable life for a given application is limited, based on the properties of how it works and the optics involved, and it’s hard to justify costs based on future unknowns.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
There nothing particularly wrong with MMF, however I have seen issues with DAC cables with Forward Error Correction. As long as your DAC and switch support Reed-Solomon Forward Error Correction you're fine.

tortilla_chip
Jun 13, 2007

k-partite
MTP is still way cheaper than WDM or coherent for 400g

BaseballPCHiker
Jan 16, 2006

Does anyone have any experience with any ASA to Firepower migration tools?

I just tried the Cisco one and got 400+ errors from my uploaded config. I really, really, dont want to have to go through this line by line...

Slickdrac
Oct 5, 2007

Not allowed to have nice things

BaseballPCHiker posted:

Does anyone have any experience with any ASA to Firepower migration tools?

I just tried the Cisco one and got 400+ errors from my uploaded config. I really, really, dont want to have to go through this line by line...

Even our Cisco rep put his hands up and said "yeah, the tool doesn't really work that great", we ended up moving all 200 rules manually...bright side, allowed us to clean up old rules.

Thanks Ants
May 21, 2004

#essereFerrari


Just bite the bullet and do it manually. It's a good opportunity to revisit the encryption that you might be using on tunnels, audit the rules etc.

single-mode fiber
Dec 30, 2012

BaseballPCHiker posted:

Does anyone have any experience with any ASA to Firepower migration tools?

I just tried the Cisco one and got 400+ errors from my uploaded config. I really, really, dont want to have to go through this line by line...

Done it several times with the vFMC and haven’t really had any problems.

BaseballPCHiker
Jan 16, 2006

Ah hell I guess I've got a new project now. Hooray.... Although I read that I could still run ASDM code on it and that would buy me another couple of years but that seems like the lazy way out.

Anecdotally what have been your experiences with the Firepower firewalls? I've read a ton of negative stuff about them but its hard to tell just how much of it is cranky people use to doing everything in ASDM. This rant I read actually had me slightly concerned:

https://www.reddit.com/r/networking/comments/9363af/cisco_firepower_rant/

Prescription Combs
Apr 20, 2005
   6
That rant is very accurate. My company has started deploying them and trying to manage a fleet of them is a nightmare.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
I try not to touch firewalls wherever possible. Is Firepower Cisco's new firewall line, and if so is it an entire different codebase than Pix? If so, congrats on them.

single-mode fiber
Dec 30, 2012

You do have to be careful with deployment, even making changes that only affect LINA and not Snort can cause an outage if something fails during deployment for any number of reasons. Not much, less than 1% for sure, but I’ve seen a deployment fail, redeploy with no changes (like just click into the name or description of a policy, save, redeploy), and it works the 2nd time, but you did cause a small outage while the rollback takes place. For this reason you may want to only do deployments after hours for stuff that wasn’t exempted through change control process.

Prescription Combs
Apr 20, 2005
   6
ASAs are great. Fight me.

ElCondemn
Aug 7, 2005


falz posted:

I try not to touch firewalls wherever possible. Is Firepower Cisco's new firewall line, and if so is it an entire different codebase than Pix? If so, congrats on them.

Firepower is just an IDS, you can integrate it with our ASA (or even get a module that fits into the ASA) to provide IPS functionality.

Prescription Combs posted:

ASAs are great. Fight me.

Considering all the alternatives, I agree.

Methanar
Sep 26, 2013

by the sex ghost
I will never be complicit in purchasing anything from cisco that is not a router again.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

ElCondemn posted:

Firepower is just an IDS, you can integrate it with our ASA (or even get a module that fits into the ASA) to provide IPS functionality.

Kinda sorta. The ASA is going away. The new firewall is called Firepower (eg firepower 2100) it runs the FTD image despite not having near feature parity with the pixOS code.

I try to avoid ASA now, I'm not happy with the integration with firepower. Plus once you become comfortable with a Palo Alto theres no going back.

Edit: Also I have had to reload sourcefire image due to corrupt DB more times than I wish to count.

Sepist fucked around with this message at 22:32 on Aug 31, 2018

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Methanar posted:

I will never be complicit in purchasing anything from cisco that is not a router again.

What's wrong with their switches?

Methanar
Sep 26, 2013

by the sex ghost

MF_James posted:

What's wrong with their switches?

Arista exists.

Docjowles
Apr 9, 2009

We’ve rebuilt our data center network around Arista and I love it to death.

To be fair, we were coming from Brocade/Foundry ICX and CER products. So like, D-Link gear and support would have probably felt like an upgrade, too. But Arista has been very good to work with! Both technically and personally.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Haven't had the opportunity to work with Arista, all cisco and then garbage barely above consumer grade stuff, and a single brocade switch.... holy gently caress why do you steal 99% of cisco terminology and then make trunk ports NOT TRUNK PORTS!! maybe cisco stole their terms I dunno, but drat was that annoying.

Docjowles
Apr 9, 2009

No, Brocade is bad and you are correct for being mad at how awful they are to work with :black101:

Edit: Brocade did eventually kill off the trunk term and start using “lag”. But now their IP has been sold yet again and is basically dead so who cares.

And I still hate the way they do VLAN tagging vs Cisco/Arista. But I’m willing to chalk that up to personal preference.

Docjowles fucked around with this message at 00:39 on Sep 1, 2018

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Docjowles posted:

No, Brocade is bad and you are correct for being mad at how awful they are to work with :black101:

Our client that uses it is bad an awful and we should drop them but MSP lyfe, so it is very fitting they use it.

Adbot
ADBOT LOVES YOU

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

ElCondemn posted:

Firepower is just an IDS, you can integrate it with our ASA (or even get a module that fits into the ASA) to provide IPS functionality.


Sepist posted:

Kinda sorta. The ASA is going away. The new firewall is called Firepower (eg firepower 2100) it runs the FTD image despite not having near feature parity with the pixOS code.

Sooo not yet but it will replace pix os. Is it an acquisition?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply