Sorry you had a bad experience in the past with Tufin on Cisco. I would personally invite you to contact me directly if you want to see the work we've done with Cisco over the past few years. We recently did a joint session with Cisco at RSA early this year as we joined the Cisco Developer Network and jointly released our CSM support with certified interoperability for the CSM v4.3.
We work hard to be the leading firewall lifecycle suite across all the leading firewall platforms; and we take customer feedback very seriously.
I agree with you, Tufin still as of TODAY does not work well with Cisco products. I have setup Tufin in 3 large deployments going all the way back to 2007, its certainly come a long way. Its interesting to me dealing with a lot of vendors how many tell you thats the way it 'used' to be, but weve since fixed something. Don't be gullible.
I specifically purchased Tufin for a large client to perform automatic policy generation so we could create rulebases out of logs, nearly out of thin air. Let me tell you the product is NOT FULLY BAKED in this area, Im surprised a company would sell to a customer a product that has *new* features that are not fully functional. After Months of working with developers in Israel we were left with a clunky and primitive way to create a rulebase and it never fully worked. The customer was angry and pushed me to get a refund, thats how bad it was.
I was provided about 100 scripts, not all at once, they worked one day not the next. The scripts had to continue to be modified to understand Cisco log entries!! I would bounce from cli back to the gui and run scripts with a 25% success rate. You can be the beta tester if you like but products that dont work shouldnt be sold as if they do.
The pendulum continues to swing, in 2006 something went wrong with Firemon (I hear it was political) and it was broken so my company decided to use Tufin. Now I've gone back to using Firemon's Traffic Flow Analysis which does work with Cisco ASA and has the features I wanted to make my life easier, and they are fully functional.
Hey Alfred, we’re keeping the product details stealthy until mid-September, so unfortunately, I can’t offer you many more details at this point. But the news will be big! You can register here and to receive the full announcement as it happens.
We can also meet up at CPUG CON in Chur or at the launch event in Munich you referenced.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :