Palo alto
Palo alto firewalls, any feed back would be helpful! good, bad ugly...
Comments
-
cisco_trooper Member Posts: 1,441 ■■■■□□□□□□
I have heard great things but have never actually touched one. That being said, I am also quite interested in people's hand's on experiences with Palo Alto. -
ColbyG Member Posts: 1,264
cisco_trooper wrote: »I have heard great things but have never actually touched one.
Same here. I'll get some time with the gear soon though, I have some training coming up. -
Bl8ckr0uter Inactive Imported Users Posts: 5,031 ■■■■■■■■□□
I have used them (not in a production). They are pretty decent boxes. They are very capable devices and the cli is very cisco like. -
unclerico Member Posts: 237 ■■■■□□□□□□
I'll sing it from the frigging mountain top, Palo Alto is fantastic. I'll never be able to go back to a traditional firewall again due to the visibility that these bad boys give to you. The only thing that PAN needs to work on is the SSL VPN piece because it is pretty much terrible. Strike that, there is actually a second thing that they need to work on and that is the amount of time it takes to commit a configuration. Any change, no matter how small, requires a complete re-parsing of the entire XML file which can take upwards of 1 1/2 minutes so when you're new to the devices and are making frequent changes it gets really annoying really fast. The frustration goes away when you are more experienced and know what changes need to be made. Do a POC with one and you'll see for yourself.
Preparing for CCIE Written -
docrice Member Posts: 1,706 ■■■■■■■■■■
Thanks for the insight. I'm actually meeting with Palo Alto Networks tomorrow. Configuration changes requiring a minute or two to go live concerns me as that can get operationally expensive when you're working on an issue. It reminds me of Check Point where you have to push changes and wait for it to complete. Another issue I hear is that finding hit counts on a rule set isn't like the ASA. Do you have any experience with the IPS functionality? How good is the company when it comes to keeping up with application behaviour changes? How about rate-limiting capabilities on a per-application basis?
Are there any other comparable firewall vendors in the so-called next-gen space? I've been told both HP TippingPoint and Sourcefire are working on theirs, but I'm not in the mood to beta test.Hopefully-useful stuff I've written: http://kimiushida.com/bitsandpieces/articles/ -
unclerico Member Posts: 237 ■■■■□□□□□□
Thanks for the insight. I'm actually meeting with Palo Alto Networks tomorrow. Configuration changes requiring a minute or two to go live concerns me as that can get operationally expensive when you're working on an issue. It reminds me of Check Point where you have to push changes and wait for it to complete. Another issue I hear is that finding hit counts on a rule set isn't like the ASA. Do you have any experience with the IPS functionality? How good is the company when it comes to keeping up with application behaviour changes? How about rate-limiting capabilities on a per-application basis?
Are there any other comparable firewall vendors in the so-called next-gen space? I've been told both HP TippingPoint and Sourcefire are working on theirs, but I'm not in the mood to beta test.Preparing for CCIE Written