Spec me a firewall

I thought I had come back to say, but obviously not!

I probably decided against it at the risk of BRS's fury :D

I ended up with a watchguard x550 with the 3 year UTM bundle - so AV, spam etc.

I've left the job I was in (hence not being around here as much - the checkpoint firewalls at my new job block the site :() but I implemented it about 3 weeks before leaving.

I've always loved the watchguards from an admin side, they make a lot of sense IMO. Performance was brilliant, the VPN tunnels off it became much more reliable and the UTM stuff seemed to do a good job. Would recommend, mainly for the paint job and the "armed" light :D

Seems as good a place as any - what are peoples views on checkpoint? We've got a redundant pair of r70s running on HP DL360s at my new job. They're managed by a third party though so i have no involvement in them - would just be curious to see what people think.
 
I've always loved the watchguards from an admin side, they make a lot of sense IMO. Performance was brilliant, the VPN tunnels off it became much more reliable and the UTM stuff seemed to do a good job. Would recommend, mainly for the paint job and the "armed" light :D

I agree, I'm running the X550e here with the pro feature key. It round robins 3 ADSL lines with great success. When I was first testing failover it constantly dropped 1 ping before failing over, which is pretty impressive.

Performance and stability are excellent, but let's not forget the most important factor.... It's RED and looks AWESOME!!!!!!1 Which to be honest is the main thing when buying hardware.... isn't it? :cool::D
 
Checkpoint are awesome *if* you have lots of them and the management products to go with them, a headache for small installs they are massively powerful and popular with people like BA for that reason.
 
I'm not sure about the management side of things, but the company managing them are rather massive so I guess they know what they're doing. We've got 3, strictly, 2 in some sort of HA setup and one on a VM collecting logs.

Had a look at the report for the rules the other day - looks very complicated so I can see how they'd be a headache for small installs.

Was mulling over whether it was worth keeping the management agreement up, it's a bit odd not having access to your own firewalls, but from what I've seen it's probably for the best :D
 
We did use borderware firewalls, but recently moved to checkpoints.
I highly recommend them, they are extremely intuitive, and the reporting module is excellent.

They might be a bit overkill for a small install, but if you have the budget for them I highly recommend them.
 
Watchguard are sooooo bad.

Cisco ASA all the way. They even come with a nice GUI to help you along.

Actually the entire configuration of ASAs is fairly illogical to the extreme, it only makes sense if it's the only thing you've ever worked with. They work alright when setup correctly but for ease of administration virtually else anything is better (as evidenced by some of the ridiculous configurations I've seen people come up with because it's not clear the correct or easy way to do something).
 
Actually the entire configuration of ASAs is fairly illogical to the extreme, it only makes sense if it's the only thing you've ever worked with. They work alright when setup correctly but for ease of administration virtually else anything is better (as evidenced by some of the ridiculous configurations I've seen people come up with because it's not clear the correct or easy way to do something).

Got an example m8? Just anything off the top of your head. No worries if not though :)
 
Got an example m8? Just anything off the top of your head. No worries if not though :)

VPN formation is my biggest issue - I don't want you to magically generate phase 2 proposals, I can do it myself, I particularly don't want you to do it when you do it in a way which is extremely annoying to get working with other vendors.

Or even the policy formation, access list style CLI config was never a good way of doing this for any kind of length of rule set...
 
Back
Top Bottom