<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HQ and 4 Branches Firewall devices (VPN Connection) topology! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923870#M5528</link>
    <description>&lt;P&gt;If you really need to have DNS-services, there is only the IOS router in the cisco portfolio.&lt;/P&gt;
&lt;P&gt;If you can live without, my preferences would be:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Cisco Meraki MX on HQ and the branches. These are most easily to setup and the VPN will work instantly.&lt;/LI&gt;
&lt;LI&gt;Cisco ASAs on all sites with manually configured route-based VPN. This will give you also a good firewall for the branches.&lt;/LI&gt;
&lt;LI&gt;IOS routers on all sites. Maximum flexibility but the firewall implementation is most complex compared to the other solutions.&lt;/LI&gt;
&lt;LI&gt;Personally I don't like Firepower Thread Defense as you always need two IPs reachable from your headquarter. One for the Data-Plane and one for management. That can get quite tricky to setup and is a more advanced topic.&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Fri, 13 Sep 2019 12:19:36 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2019-09-13T12:19:36Z</dc:date>
    <item>
      <title>HQ and 4 Branches Firewall devices (VPN Connection) topology!</title>
      <link>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923837#M5526</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I have to create a topology for VPN connection of the branches with the HQ, to access the servers. My question is: Which FW series (ASA, FRP...) to employ at the HQ and which one to the branches. Branches are small offices up to 10 employees.&lt;/P&gt;&lt;P&gt;Specification are as below:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Dual WAN ports with automatic fallback&lt;/LI&gt;&lt;LI&gt;IPSec VPN capability (up to 8 simultaneous connections for HQ)&lt;/LI&gt;&lt;LI&gt;VPN licenses (8 connections for HQ, 1 connection for other sites)&lt;/LI&gt;&lt;LI&gt;DHCP Server and Relay DHCP (DHCP relay over VPN)&lt;/LI&gt;&lt;LI&gt;DNS Service&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Can anyone advice please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Dena&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923837#M5526</guid>
      <dc:creator>Imma</dc:creator>
      <dc:date>2020-02-21T17:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: HQ and 4 Branches Firewall devices (VPN Connection) topology!</title>
      <link>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923870#M5528</link>
      <description>&lt;P&gt;If you really need to have DNS-services, there is only the IOS router in the cisco portfolio.&lt;/P&gt;
&lt;P&gt;If you can live without, my preferences would be:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Cisco Meraki MX on HQ and the branches. These are most easily to setup and the VPN will work instantly.&lt;/LI&gt;
&lt;LI&gt;Cisco ASAs on all sites with manually configured route-based VPN. This will give you also a good firewall for the branches.&lt;/LI&gt;
&lt;LI&gt;IOS routers on all sites. Maximum flexibility but the firewall implementation is most complex compared to the other solutions.&lt;/LI&gt;
&lt;LI&gt;Personally I don't like Firepower Thread Defense as you always need two IPs reachable from your headquarter. One for the Data-Plane and one for management. That can get quite tricky to setup and is a more advanced topic.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Fri, 13 Sep 2019 12:19:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923870#M5528</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2019-09-13T12:19:36Z</dc:date>
    </item>
    <item>
      <title>Re: HQ and 4 Branches Firewall devices (VPN Connection) topology!</title>
      <link>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923899#M5529</link>
      <description>&lt;P&gt;Thank you for your help Karsten,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure if I understood well. If I choose one of four solutions proposed by you, then I have to build a DNS server. Right?&lt;/P&gt;&lt;P&gt;Or should I use ISP /open DNS?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 13:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923899#M5529</guid>
      <dc:creator>Imma</dc:creator>
      <dc:date>2019-09-13T13:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: HQ and 4 Branches Firewall devices (VPN Connection) topology!</title>
      <link>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923912#M5531</link>
      <description>&lt;P&gt;It just means that you can't point your clients to that device to resolve names. Most likely you have a DNS-server inside of your HQ and you can point your clients to that one. With that all clients can resolve your internal resources. Or you could install DNS-servers in each branch. But that could be overkill for 10 employees.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 13:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923912#M5531</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2019-09-13T13:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: HQ and 4 Branches Firewall devices (VPN Connection) topology!</title>
      <link>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923913#M5533</link>
      <description>&lt;P&gt;Thank you Karsten. Very helpful indeed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Dena&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 13:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hq-and-4-branches-firewall-devices-vpn-connection-topology/m-p/3923913#M5533</guid>
      <dc:creator>Imma</dc:creator>
      <dc:date>2019-09-13T13:27:38Z</dc:date>
    </item>
  </channel>
</rss>

