docrice wrote: » I have never touched SonicWALL before, but my vague impression is that they're somewhat looked down upon. They're probably cheaper than the bigger names, but I've heard anecdotes about quirky behavior like described above. Quality of vendor support is also something to consider as well, although I've had a mixed bag with Cisco (somewhat depends on the product line though). Fortinet seems like a good bargain and I think is definitely worth looking at.
RouteMyPacket wrote: » What kind of shop are you? Cisco? (i.e, Switches, Routers etc?) How does a point product like SonicWall fit into your overall architecture? What is the learning curve for existing staff? Will the staff need training (an additional cost)? What do you want from your edge device? If you are a Cisco shop, your staff are already familiar with the product line, there is a very small learning curve moving from legacy hardware to the latest NextGen platforms. Also, you can develop a comprehensive edge security solution that ties into existing identity based services, secure remote access and for IDS/IPS functionality it does not get any better than Sourcefire. Sourcefire has been the standard bearer in IDS/IPS for a long time, you can do some research on Snort and see how Sourcefire simply packaged snort with services etc and that brought about "Sourcefire". That is now Cisco Again, what is important to you? Manageability? Scalability? if you are already invested in Cisco gear, it's a no brainer to transition to Cisco ASA with FirePOWER services. Also reember to take advantage of the IPP (Investment protection program) or Cisco's TMP (Technology Migration) program. Since you have the legacy 5510's, TMP will be for you and you can receive a discount by trading in your ASA 5500 platform/s. This is my area of focus (Security/FirePOWER) so let me know if you have any questions. Remember, you can always have Cisco or a Channel Partner perform a demo of FirePOWER/Sourcefire for you. : )
creamy_stew wrote: » If you want to go with ASA again for ease of migration, so be it. Otherwise, Fortinet, Juniper or Palo Alto would be my suggestions. edit: For the love of all that is holy to you: Stay away from SonicWall/Watchguard. This is not not geekspeak, they will bite you in the ass if the watchguards live long enough.
creamy_stew wrote: » Unless Firepower radically changes the access-list approach of the ASA, I will probably continue to stay away from ASA for firewall stuff.
creamy_stew wrote: » I don't get it.
creamy_stew wrote: » @Iris No, I haven't. I don't even know what Firepower is Personally, I use Fortigate for Firewall/IPS/Outbound duty, and couple that with ASA/Juniper for site-site VPN/inbound if budget permits. Unless Firepower radically changes the access-list approach of the ASA, I will probably continue to stay away from ASA for firewall stuff.
creamy_stew wrote: » I just spent like 20 minutes writing well-balanced, thoughtful reply to RouteMyPacket, dispite him being a prick. However, when I pressed "Post Quick Reply", the bit monster ate it.@Iris: I will PM you my thoughts tomorrow if I remember it, since I don't want to escalate things here