ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    VPN hardware suggestions.

    IT Discussion
    10
    23
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • hobbit666H
      hobbit666 @Dashrender
      last edited by

      @Dashrender said in VPN hardware suggestions.:

      That said you could use other things to test the VPN status - like a ping test.

      That's what we do with our MPLS sites just use zabbix to ping all endpoints see if they are "up" and notify when down

      scottalanmillerS 1 Reply Last reply Reply Quote 2
      • scottalanmillerS
        scottalanmiller @hobbit666
        last edited by

        @hobbit666 said in VPN hardware suggestions.:

        @Dashrender said in VPN hardware suggestions.:

        That said you could use other things to test the VPN status - like a ping test.

        That's what we do with our MPLS sites just use zabbix to ping all endpoints see if they are "up" and notify when down

        Yup, just keep doing that with a VPN. A point to point VPN system should require you to change nothing from the MPLS setup. MPLS is built to mimic standard VPN setups. It's all the same to the network user level of things.

        1 Reply Last reply Reply Quote 1
        • iroalI
          iroal
          last edited by iroal

          I like Pfsense, I use it with Openvpn with good results.

          Last version includes Wireguard support.

          1 Reply Last reply Reply Quote 0
          • siringoS
            siringo
            last edited by

            Thanks everyone for the help. I'll look into everything mentioned.

            J 1 Reply Last reply Reply Quote 0
            • J
              JasGot @siringo
              last edited by JasGot

              @siringo said in VPN hardware suggestions.:

              Thanks everyone for the help. I'll look into everything mentioned.

              Some of the comments would lead you to believe Sonicwall is not a good solution, either from central management issues or license fees.

              I can't speak to the central management issues because we've chosen to not bother with it.

              We have about 350 Sonicwalls in the field and nearly all of them have S2S VPNs setup among branches, as well as Global VPN setup for remote users (there is a fee for the Global VPN license).

              Every one of them has a VPN into our lab for end user support. I fired up #7 to get this screenshot.

              As far as your main question about reliable VPN end points, I have been happy with the Sonicwall devices. I like their "Wizard" setups for staff that are new to Sonicwall. It makes a S2S VPN about a 5 minute task (for both sides, not each side, but then, that would still only be 10 minutes!)

              We also use the IP Tunnel connections in the Sonicwall when we need to control routing, ie not hub and spoke type routing.

              The appliances can be pricey if you want to take full advantage of todays high speed broadband, but overall, we have been very satisfied with the products, especially the VPN stability.

              Here's a SS of one:
              No special/Add-on licensing; note the 1000 S2S VPNs allowed and the 12 Global VPNs allowed.
              This Sonicwall does have 60 VPN Clients licensed to it, about 45 are in use daily.

              5dd6782e-209c-4bc2-afd5-72ee1d55d99e-image.png

              siringoS 1 2 Replies Last reply Reply Quote 2
              • siringoS
                siringo @JasGot
                last edited by

                @JasGot Thanks for the help, there's some real world product experience there, which I can use. I appreciate the effort. Thanks.

                1 Reply Last reply Reply Quote 0
                • 1
                  1337 @JasGot
                  last edited by 1337

                  @JasGot said in VPN hardware suggestions.:

                  5dd6782e-209c-4bc2-afd5-72ee1d55d99e-image.png

                  @JasGot On a side note aren't you running insecure cryptos?
                  I thought 3DES-HMAC-SHA1 was considered obsolete and insecure.

                  Normally you'd see something like AES-CBC-256-SHA256 or AES-GCM-256-SHA256.

                  J 1 Reply Last reply Reply Quote 0
                  • J
                    JasGot @1337
                    last edited by

                    @Pete-S said in VPN hardware suggestions.:

                    thought 3DES-HMAC-SHA1 was considered obsolete and insecure.
                    Normally you'd see something like AES-CBC-256-SHA256 or AES-GCM-256-SHA256.

                    It is. I had it changed right after I took the screen shot. It's an HR problem. 🙂

                    DashrenderD 1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @JasGot
                      last edited by

                      @JasGot said in VPN hardware suggestions.:

                      @Pete-S said in VPN hardware suggestions.:

                      thought 3DES-HMAC-SHA1 was considered obsolete and insecure.
                      Normally you'd see something like AES-CBC-256-SHA256 or AES-GCM-256-SHA256.

                      It is. I had it changed right after I took the screen shot. It's an HR problem. 🙂

                      I'm curious - how is that an HR problem?

                      J 1 Reply Last reply Reply Quote 0
                      • J
                        JasGot @Dashrender
                        last edited by JasGot

                        @Dashrender said in VPN hardware suggestions.:

                        I'm curious - how is that an HR problem?

                        Employee didn't complete assigned duties.

                        1 Reply Last reply Reply Quote 0
                        • 1
                        • 2
                        • 2 / 2
                        • First post
                          Last post