I am in the process of purchasing an advance router. Here are my requirements,
1. Support two ISP connections, with automatic fail over from the first connection to the second, and then revert back to the primary connection when it is back up.
2. At least 8 vpn connections.
I sent the same question to Cisco support and they recommended the 1811 and 1812. I asked a networking friend of mine to look at our complete network and offer a recommendation. He suggested the ASA 5505 because it met our requirements and for its ease of set up, which he will be doing for me. He recommended these models of the ASA 5505, UL-BUN-K9, and the SEC-BUN-K9. I also found a SEC-PL, but I do not know if that model will meet my requirements. Do any of the mentioned routers include licenses, and what are the licenses for? Do the licenses need to be purchased on a yearly basis?
I am fairly new to complex networking such as this. All suggestions and comments would be appreciated.
1. Either a router or an ASA will work for this requirement.
2. Either a router or an ASA will work for this requirement too.
The SEC-PLUS license gives you some additional features such as DMZ interfaces and fail-over. On the ASA you do not need VPN licenses for LAN-to-LAN tunnels. For user VPN you do need licesing. They are a one time purchase and do not require maintenance. Routers require the Advanced Security IOS and with an 1800 series router you may also want to look into the VPN-AIM which offloads the encryption/decryption to a module. If the guy who will be building this would like to use an ASA becuase that is what he knows best, I would suggest you go that route. The ASA matches your requirements just fine.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...