I am working for a company who is looking to replace there sonicwall device with a PIX, can anyone recommened what I should purchase, currently we have 15 users but looking to expand to 75 or so within the yr, with about 50% of these users being mobile workers. Any suggestions? We will be hosting web/email from this location also
the PIX is almost out the door, the ASA is in .. I advise you go in for the ASA 5520, n u wont have to bother for quite a while,its an all in one device which is the thing of today , no more just firewalls, its got VPN too which you could use to protect your mobile users , the Anti-X services are great too..
I have to agree with Vic that the ASA is what you actually want. The pix and ASA are virtually the same thing when you upgrade the 515 and up to the current software level of 7.x. ASA is based on the pix os but with in a more powerful box with additional services. They have all the advanced features that the Sonicwalls have been touting with there enhanced OS but the ASA/PIX is a rock solid support for h323 sip and many other protocols that the Enhanced OS of sonicwall says they have but I've found otherwise.
just found that Cisco have launched a CCM module instead of the AIP, the CCM module gives u elaborate content filtering , anti-phishing , anti-spam etc.. pretty good stuff, was wondering when cisco was gonna target the Content filter guys.. about time .. way to go..
just worried abt the performance.. All-in-1 boxes usually are performance constrained. nonetheless , being that cisco devices are not just software based and use ASICS first of all.. i guess they should be still the best for a while.. i wouldnt go enabling all features on all interfaces at the Go-Live
i guess your scenario with just 15 users is perfect now . and as u grow and notice that performance issues, u could go for another ASA , configure as Failover and use Contexts....
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...