<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I assume by Mb you mean in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040921#M134829</link>
    <description>&lt;P&gt;I assume by Mb you mean Megabits per second or Mbps. Adding the 3 figures you have means we need to handle 1.7 Gbps. The 2110 would be well-suited performance wise.&lt;/P&gt;
&lt;P&gt;Regarding your feature questions:&lt;/P&gt;
&lt;P&gt;1. Yes - although it's not in the GUI just yet. You configure it with a FlexConfig which requires using a FirePOWER Management Center (FMC) vs. local management.&lt;/P&gt;
&lt;P&gt;2. No. The 2110 runs only the FirePOWER Threat Defense (FTD) unified image at this time. While a 5516-X can run FTD it much more commonly runs ASA software plus FirePOWER on a software service module. Feature difference is a lot of details that are probably best to review with your local SE.&lt;/P&gt;
&lt;P&gt;3. No. This is a long term goal for Cisco but we don't expect it soon. There may be other ways to achieve your goal depending on why you need multiple contexts.&lt;/P&gt;
&lt;P&gt;4. No (clustering is currently available on the higher end 4100 and 9300 series).&lt;/P&gt;
&lt;P&gt;5. Yes, requires an external agent to be installed in your domain though to get userid-IP mapping from logon events via WMI (or can use Cisco ISE if you have that).&lt;/P&gt;</description>
    <pubDate>Fri, 09 Jun 2017 08:26:48 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-06-09T08:26:48Z</dc:date>
    <item>
      <title>choosing a firewall</title>
      <link>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040920#M134828</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;Hello, community!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I have to choose firewall for a big enterprise network. I’m CCNP in R&amp;amp;S but new to firewalls. The goals of the firewall will be:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Filter traffic branch to HQ 600Mb.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;NAT company traffic to the Internet, ~900Mb. &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;At this point, I’m searching replacement of the &lt;/EM&gt;&lt;G class="gr_ gr_40 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep" id="40" data-gr-id="40" style="font-size: 12pt; text-indent: 35.4pt; color: #58585b;"&gt;Ms&lt;/G&gt;&lt;EM&gt;&lt;SPAN style="font-size: 12pt; text-indent: 35.4pt;"&gt; TMG, but firewall has no proxy functions. Is it real to use a just firewall to replace TMG or should search for the proxy either?&lt;/SPAN&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;Web server traffic to DB 200Mb.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;I’m very interested in new product Cisco Firepower® NGFW&amp;nbsp; 2110.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;But I have several questions &lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Is NGFW support IEGRP? If Yes, great! Only if No, Can I mix bridge and routing firewall?&lt;/LI&gt;
&lt;LI&gt;Is NGFW 2110 and ASA5516X run the same set of futures?&lt;/LI&gt;
&lt;LI&gt;Is &lt;G class="gr_ gr_39 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="39" data-gr-id="39" style="font-size: 12pt; color: #58585b;"&gt;multicontext&lt;/G&gt;&lt;SPAN style="font-size: 12pt;"&gt; supported?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Is Active –Active supported?&lt;/LI&gt;
&lt;LI&gt;Can I auth users access to Inet via MS AD or LDAP?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;I'll grateful for any bits of advice!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;Regards &lt;G class="gr_ gr_37 gr-alert gr_gramm gr_inline_cards gr_run_anim Style multiReplace" id="37" data-gr-id="37"&gt;&lt;G class="gr_ gr_36 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="36" data-gr-id="36"&gt;Sehii&lt;/G&gt; .&lt;/G&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040920#M134828</guid>
      <dc:creator>Sergiy Pyvovaroff</dc:creator>
      <dc:date>2019-03-12T09:29:12Z</dc:date>
    </item>
    <item>
      <title>I assume by Mb you mean</title>
      <link>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040921#M134829</link>
      <description>&lt;P&gt;I assume by Mb you mean Megabits per second or Mbps. Adding the 3 figures you have means we need to handle 1.7 Gbps. The 2110 would be well-suited performance wise.&lt;/P&gt;
&lt;P&gt;Regarding your feature questions:&lt;/P&gt;
&lt;P&gt;1. Yes - although it's not in the GUI just yet. You configure it with a FlexConfig which requires using a FirePOWER Management Center (FMC) vs. local management.&lt;/P&gt;
&lt;P&gt;2. No. The 2110 runs only the FirePOWER Threat Defense (FTD) unified image at this time. While a 5516-X can run FTD it much more commonly runs ASA software plus FirePOWER on a software service module. Feature difference is a lot of details that are probably best to review with your local SE.&lt;/P&gt;
&lt;P&gt;3. No. This is a long term goal for Cisco but we don't expect it soon. There may be other ways to achieve your goal depending on why you need multiple contexts.&lt;/P&gt;
&lt;P&gt;4. No (clustering is currently available on the higher end 4100 and 9300 series).&lt;/P&gt;
&lt;P&gt;5. Yes, requires an external agent to be installed in your domain though to get userid-IP mapping from logon events via WMI (or can use Cisco ISE if you have that).&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 08:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040921#M134829</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-09T08:26:48Z</dc:date>
    </item>
    <item>
      <title>Thank you for so detailed</title>
      <link>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040922#M134830</link>
      <description>&lt;P&gt;Thank you for so detailed comment!&lt;BR /&gt;Could I ask few more detail, please?&lt;BR /&gt;If we will look on Firepower® NGFW 2110 as a replacement of &lt;G class="gr_ gr_17 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep" id="17" data-gr-id="17"&gt;Ms&lt;/G&gt; TMG (obsolete product), should I also look for a (firewall + other caching proxy), of just NAT on a firewall is ok nowadays?&lt;/P&gt;
&lt;P&gt;(q #1) About differences between ASA software and FirePOWER Threat Defense (FTD). If we want to use Firepower® NGFW 2110 as (1: NAT + !URL Filter! internet gate), (2: Stateful firewall between branch and HQ; Web servers and DB) is FirePOWER Threat Defense (FTD) ok for this? Actually we a choosing Firepower® NGFW 2110 or ASA5516X. The reason why we hadn’t purchase ASA5516X is we are afraid it's too weak for our traffic. &lt;/P&gt;
&lt;P&gt;(q #4) If “active-active” clustering is not supported, is “active-passive” HA supported? Is so I can solve HA case with just additional links.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards &lt;G class="gr_ gr_59 gr-alert gr_gramm gr_inline_cards gr_run_anim Style multiReplace" id="59" data-gr-id="59"&gt;&lt;G class="gr_ gr_60 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="60" data-gr-id="60"&gt;Sehii&lt;/G&gt; .&lt;/G&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 10:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040922#M134830</guid>
      <dc:creator>Sergiy Pyvovaroff</dc:creator>
      <dc:date>2017-06-09T10:21:37Z</dc:date>
    </item>
    <item>
      <title>You're welcome.</title>
      <link>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040923#M134831</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;An FTD device has the license options of Threat (IPS), URL filtering and Malware (or any combination of those - depending on your requirements).&lt;/P&gt;
&lt;P&gt;It can do active/standby high availability. Your failure scenarios can generally accomodate outbound traffic easily. Inbound traffic can be problematic depending on what sort of services (if any) you expose to outside users.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 13:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/choosing-a-firewall/m-p/3040923#M134831</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-09T13:57:11Z</dc:date>
    </item>
  </channel>
</rss>

