ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Firewall Options

    IT Discussion
    6
    23
    1.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @Son of Jor-El
      last edited by

      @Son-of-Jor-El said in Firewall Options:

      @scottalanmiller said in Firewall Options:

      @Son-of-Jor-El said in Firewall Options:

      @scottalanmiller said in Firewall Options:

      5510s are fine, I'm not implying anything. Just that the cost to keep them working is probably really high when alternatives might be free or cheap.

      I understand and didn't say you were implying anything.

      That's what I'm thinking!! Free though? Hmmm...I didn't think there were any free alternatives.

      VPN tech is "always" free 🙂 There are only two really major VPN types out there, IPSec and SSL. Cisco just uses standard IPSec, not aware of anything proprietary, that's why it can talk to "anything". Why Azure is a problem, no idea.

      So, is it possible that the firmware update isn't needed and they are blowing smoke up my ass?

      Possible, but more likely Cisco lacks some flexibility and you need something more robust. They probably only added the needed power with that update. Just a guess.

      1 Reply Last reply Reply Quote 1
      • Son of Jor-ElS
        Son of Jor-El @Dashrender
        last edited by

        @Dashrender said in Firewall Options:

        In any case - a Ubiquiti Edge Router is approximately $100 - what's the issue in buying one of these?

        Just a lack of knowledge on them, that's all.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @Dashrender
          last edited by

          @Dashrender said in Firewall Options:

          @Son-of-Jor-El said in Firewall Options:

          @scottalanmiller said in Firewall Options:

          @Son-of-Jor-El said in Firewall Options:

          @scottalanmiller said in Firewall Options:

          5510s are fine, I'm not implying anything. Just that the cost to keep them working is probably really high when alternatives might be free or cheap.

          I understand and didn't say you were implying anything.

          That's what I'm thinking!! Free though? Hmmm...I didn't think there were any free alternatives.

          VPN tech is "always" free 🙂 There are only two really major VPN types out there, IPSec and SSL. Cisco just uses standard IPSec, not aware of anything proprietary, that's why it can talk to "anything". Why Azure is a problem, no idea.

          So, is it possible that the firmware update isn't needed and they are blowing smoke up my ass?

          Unless there is a known bug in the ASA firmware that causes issues with Azure, sure sounds like it.

          I would guess more of a limitation on settings. Like not having a way to configure an uncommon option that is necessary.

          1 Reply Last reply Reply Quote 0
          • Son of Jor-ElS
            Son of Jor-El
            last edited by

            I am asking the person who said I needed the update what SPECIFIC issue causes us to do the update. Let's see what they say.

            1 Reply Last reply Reply Quote 1
            • DashrenderD
              Dashrender
              last edited by

              You should look at what's been patched in that newer version of the firmware - that to me is a bigger reason to either purchased SmartNet or move away from the ASA.

              1 Reply Last reply Reply Quote 0
              • KellyK
                Kelly
                last edited by

                End of support is coming up fast on the 5510 - http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/eol_C51-727283.html.

                1 Reply Last reply Reply Quote 1
                • Son of Jor-ElS
                  Son of Jor-El
                  last edited by

                  So, I got the following response on why I need 8.3: Based on the debugging information, lack of proper ikev2 support appears to be involved in the connectivity failures. Unless the device is upgraded to firmware version 8.3 or later, but I you cannot use it to establish a site-to-site tunnel to Azure

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @Son of Jor-El
                    last edited by

                    @Son-of-Jor-El said in Firewall Options:

                    So, I got the following response on why I need 8.3: Based on the debugging information, lack of proper ikev2 support appears to be involved in the connectivity failures. Unless the device is upgraded to firmware version 8.3 or later, but I you cannot use it to establish a site-to-site tunnel to Azure

                    So the answer is... the 5510 doesn't have proper IKEv2 support. What year is this?

                    1 Reply Last reply Reply Quote 1
                    • scottalanmillerS
                      scottalanmiller
                      last edited by

                      Cisco, only 12 years behind. Just great.

                      JaredBuschJ 1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch @scottalanmiller
                        last edited by

                        @scottalanmiller said in Firewall Options:

                        Cisco, only 12 years behind. Just great.

                        Umm, these unit were EoL'd almost 4 years ago. And lack of proper support does not mean lack of support. It could simply be a bug that was never patched because it has been EoL'd since 2013.

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @JaredBusch
                          last edited by

                          @JaredBusch said in Firewall Options:

                          @scottalanmiller said in Firewall Options:

                          Cisco, only 12 years behind. Just great.

                          Umm, these unit were EoL'd almost 4 years ago. And lack of proper support does not mean lack of support. It could simply be a bug that was never patched because it has been EoL'd since 2013.

                          Definitely an old unit, but we'd hope that they would have had that working before 2010.

                          1 Reply Last reply Reply Quote 0
                          • Reid CooperR
                            Reid Cooper
                            last edited by

                            Seems like any continued investment into the ASA would be a bad idea. Either a replacement for it or running something along side of it would make more sense.

                            1 Reply Last reply Reply Quote 0
                            • 1
                            • 2
                            • 2 / 2
                            • First post
                              Last post