My company's network has not been very well designed. I am in the process of
redesigning it. I am going to do away with the 3 firewalls they currently have and move all the network behind a firewall so that all traffic going through our network will pass through the firewall regardless. My question is that I'm considering using the FWSM blade in our 6054's or using a ASA external device. I haven't been able to find much clear information on which might be better. I'm more of a R&S guy then a Security guy so forgive me if I'm overlooking something obvious. The main thing I've found so far is that the ASA supports VPN conecentrator like capabilites while the FWSM doesn't.
Is this the biggest difference? I was wondering what people our in the field might have already done, or what knowledge they may have that might help me with this decision. Thanks!
The decision will depend highly on your network and traffic requirements. You identified VPN termination as one item to consider, but there are others such as budget and required throughput.
If you have a Cisco account team, I would definitely recommend getting in touch with them as they would be able to help you understand your requirements and come up with a design that fits your needs. If not, check out these links which will help you compare the features and performance of both:
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :