ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Firewalls, the good, the bad, and the ugly.

    IT Discussion
    firewall pfsense asa sonicwall palo alto security ubnt ubiquiti
    15
    66
    9.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @bj
      last edited by

      @bj said in Firewalls, the good, the bad, and the ugly.:

      I don't know how the Ubiquities do on those features, but I know the SW certainly don't do well on those features.

      Ubiquities are firewalls, not UTMs, they are not supposed to have those features.

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @bj
        last edited by

        @bj said in Firewalls, the good, the bad, and the ugly.:

        My last job had the duty of auditing firewalls, and I had to audit both PAs and SWs... I hated auditing the SWs, but the PAs were really quite easy to audit. 🙂 The SWs didn't even have a human readable config. I found some tools to make the config quasi readable... but even then, it was difficult to read at best.

        Ubiquiti runs EdgeOS which was forked from Vyatta which is the Brocade code base. I've always found the Vyatta family configs (Vyatta, EdgeOS and VyOS) pretty easy to read.

        1 Reply Last reply Reply Quote 1
        • JaredBuschJ
          JaredBusch @bj
          last edited by JaredBusch

          @bj you need to figure out what you want. You are talking about complete opposite ends of the spectrum (PA and SW UTM) and actually asked about something (firewalls) completely not what you are talking about.

          You asked for firewall information. You were given some.

          But you are repeatedly ignoring everything said and talking about UTM devices. UTM devices are not firewalls. They are UTM devices. Yes, a UTM device includes a firewall as part of the over all device, but it is only there as part of the UTM. It is not designed to stand on its own as a FW (though it can of course).

          On top of talking about something other than what you asked about, you are also talking about things on two completely opposite ends of the spectrum. More than one person here has clearly told you that PA devices are awesome, but belong in a very small market.
          What they are nicely saying is that if you have to ask the question, then you don't need the damned thing.

          Now if you really do need a PA, then you should not even be considering a SW. They absolutely cannot come close to the quality and features of a PA.

          Finally, if you want to talk about UTM solutions instead of firewalls, then retitle your post or make a new one.

          1 Reply Last reply Reply Quote 1
          • bjB
            bj
            last edited by

            Thanks @JaredBusch for your concern. I think I've got what I came here for. And no, I'm not ignoring you, or anyone else.

            All the best.

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @bj
              last edited by

              @bj said in Firewalls, the good, the bad, and the ugly.:

              Thanks @JaredBusch for your concern. I think I've got what I came here for. And no, I'm not ignoring you, or anyone else.

              All the best.

              Summary:

              For Firewalls: Ubiquiti for nearly all use cases.
              For UTMs: Palo Alto for nearly all use cases.

              JaredBuschJ 1 Reply Last reply Reply Quote 1
              • bjB
                bj
                last edited by

                Agreed. Thanks.

                1 Reply Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @scottalanmiller
                  last edited by

                  @scottalanmiller said in Firewalls, the good, the bad, and the ugly.:

                  @bj said in Firewalls, the good, the bad, and the ugly.:

                  Thanks @JaredBusch for your concern. I think I've got what I came here for. And no, I'm not ignoring you, or anyone else.

                  All the best.

                  Summary:

                  For Firewalls: Ubiquiti for nearly all use cases.
                  For UTMs: Palo Alto for nearly all use cases.

                  Speaking of, the new client I am going to do an analysis for this week has PA gear.

                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller @JaredBusch
                    last edited by

                    @JaredBusch said in Firewalls, the good, the bad, and the ugly.:

                    @scottalanmiller said in Firewalls, the good, the bad, and the ugly.:

                    @bj said in Firewalls, the good, the bad, and the ugly.:

                    Thanks @JaredBusch for your concern. I think I've got what I came here for. And no, I'm not ignoring you, or anyone else.

                    All the best.

                    Summary:

                    For Firewalls: Ubiquiti for nearly all use cases.
                    For UTMs: Palo Alto for nearly all use cases.

                    Speaking of, the new client I am going to do an analysis for this week has PA gear.

                    nice

                    1 Reply Last reply Reply Quote 0
                    • KellyK
                      Kelly
                      last edited by

                      I'm working on switching away from Cisco ASAs to Juniper SRXs. I was actually surprised by how inexpensive the Junipers were relative to Cisco. JunOS is proprietary, but it is very readable, and they learned a lot from seeing how IOS does things poorly (oh how I love rollback 0). It is based on FreeBSD.

                      bigbearB 1 Reply Last reply Reply Quote 1
                      • bigbearB
                        bigbear @Kelly
                        last edited by

                        @Kelly said in Firewalls, the good, the bad, and the ugly.:

                        I'm working on switching away from Cisco ASAs to Juniper SRXs. I was actually surprised by how inexpensive the Junipers were relative to Cisco. JunOS is proprietary, but it is very readable, and they learned a lot from seeing how IOS does things poorly (oh how I love rollback 0). It is based on FreeBSD.

                        That would be interesting. Its an actual firewall and not an ISR?

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @bigbear
                          last edited by

                          @bigbear said in Firewalls, the good, the bad, and the ugly.:

                          @Kelly said in Firewalls, the good, the bad, and the ugly.:

                          I'm working on switching away from Cisco ASAs to Juniper SRXs. I was actually surprised by how inexpensive the Junipers were relative to Cisco. JunOS is proprietary, but it is very readable, and they learned a lot from seeing how IOS does things poorly (oh how I love rollback 0). It is based on FreeBSD.

                          That would be interesting. Its an actual firewall and not an ISR?

                          Isn't ISR only related to Cisco licensing?

                          bigbearB 1 Reply Last reply Reply Quote 0
                          • bigbearB
                            bigbear @scottalanmiller
                            last edited by

                            @scottalanmiller In my world ISR would bring Adtran to mind. Also 3com/US Robotics before HP bought them up.

                            I think Cisco was about a decade late to abusing that terminology. Because what they call Integrated Service Router really isn't anything an ISP would be interested in using as a CPE.

                            KellyK 1 Reply Last reply Reply Quote 1
                            • KellyK
                              Kelly @bigbear
                              last edited by

                              @bigbear said in Firewalls, the good, the bad, and the ugly.:

                              @scottalanmiller In my world ISR would bring Adtran to mind. Also 3com/US Robotics before HP bought them up.

                              I think Cisco was about a decade late to abusing that terminology. Because what they call Integrated Service Router really isn't anything an ISP would be interested in using as a CPE.

                              By your definition I think it would be an ISR.

                              bigbearB 1 Reply Last reply Reply Quote 0
                              • bigbearB
                                bigbear @Kelly
                                last edited by

                                @Kelly I think of an ISR as something the ISP provides as part of the service.

                                I found one of the units you were describing on Amazon for $383, most seem to be closer to $1,000

                                It's interesting that juniper has any interest at all in that market. It looks like something an IT guy would buy versus a CPE.

                                KellyK 1 Reply Last reply Reply Quote 0
                                • stacksofplatesS
                                  stacksofplates @JaredBusch
                                  last edited by

                                  @JaredBusch said in Firewalls, the good, the bad, and the ugly.:

                                  Specific customization can only be done by creating a special text file and putting it in a specific location.

                                  There's your shot to start with Ansible 😁

                                  1 Reply Last reply Reply Quote 1
                                  • matteo nunziatiM
                                    matteo nunziati
                                    last edited by

                                    we have got nethsecurity in our company and then we have switched to watchguard. watchguard is way more aexpensive than what you can expect from such a thing ( just discovered later).

                                    NethSecurity. Unfortunately our NS reseller policy was: we own the firewall/UTM password, not you. When I've been hired we had an internal briefing and company choosen to "fire" the NS supplier.

                                    New supplier, new distribution channel, new UTM. Watchguard setup is quite convoluted: you have to jump among a number of GUIs to setup properly something. Also layer filtering is not really well separated - at least to me: you have a chaos of layer 3+ setup.

                                    1 Reply Last reply Reply Quote 0
                                    • brandon220B
                                      brandon220
                                      last edited by

                                      I run an ERL at home and I recommend them too for other SMB/home use. They just work, work well, and are very affordable.

                                      1 Reply Last reply Reply Quote 2
                                      • KellyK
                                        Kelly @bigbear
                                        last edited by

                                        @bigbear said in Firewalls, the good, the bad, and the ugly.:

                                        @Kelly I think of an ISR as something the ISP provides as part of the service.

                                        I found one of the units you were describing on Amazon for $383, most seem to be closer to $1,000

                                        It's interesting that juniper has any interest at all in that market. It looks like something an IT guy would buy versus a CPE.

                                        I understand you now. Comcast did install a Juniper router for their gear when they brought in fiber. That said, I do (mostly) like these. They need some work on their documentation, but the CLI is a dream compared to IOS.

                                        1 Reply Last reply Reply Quote 1
                                        • PenguinWranglerP
                                          PenguinWrangler @Obsolesce
                                          last edited by

                                          @Tim_G Give me a Sonicwall device and I will take it to my gun range for target practice. That's all they are good for. ESPECIALLY after Dell bought them. Sonicwall is awful. Nothing but issues.

                                          DashrenderD iroalI 2 Replies Last reply Reply Quote 1
                                          • DashrenderD
                                            Dashrender @PenguinWrangler
                                            last edited by

                                            @PenguinWrangler said in Firewalls, the good, the bad, and the ugly.:

                                            @Tim_G Give me a Sonicwall device and I will take it to my gun range for target practice. That's all they are good for. ESPECIALLY after Dell bought them. Sonicwall is awful. Nothing but issues.

                                            FYI, they aren't part of Dell anymore. nor are they are part of Quest anymore.. they are completely stand alone again.

                                            bigbearB 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 3 / 4
                                            • First post
                                              Last post