<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Linux based Firewall replacement in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047715#M913993</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"I currently connect to a 10 Meg connection. I would guess the maximum users on the network would be 100 to 150 computers, none of which require a vpn connection. My linux box currently has intrusion detection and prevention, but I had to disable the prevention side of the software since some users were unable to view certain websites. I'm not sure my network requires this service, but it was a cheap upgrade to my linux operating system so I purchased it. Is the linux box, (I use Clark Connect) a more robust solution, or is and ASA the better way to go?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my 2c:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your linux box which I suspect runs iptables&lt;/P&gt;&lt;P&gt;and some customization of Snort as IDS/IPS.&lt;/P&gt;&lt;P&gt;Iptables can perform complext NAT with such &lt;/P&gt;&lt;P&gt;ease that I don't think ASA can provide this&lt;/P&gt;&lt;P&gt;function.  Furthermore, when it comes to &lt;/P&gt;&lt;P&gt;troubleshooting, tcpdump on Linux is a much&lt;/P&gt;&lt;P&gt;better tool than ASA capture utilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, supports for Linux firewalls&lt;/P&gt;&lt;P&gt;like yours are not as great as Cisco TAC &lt;/P&gt;&lt;P&gt;support.  In other words, if things do not&lt;/P&gt;&lt;P&gt;go well with the ASA, you can blame it on&lt;/P&gt;&lt;P&gt;Cisco.  With your customize linux firewall,&lt;/P&gt;&lt;P&gt;you're ultimately responsible for it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Aug 2008 17:48:40 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2008-08-29T17:48:40Z</dc:date>
    <item>
      <title>Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047709#M913957</link>
      <description>&lt;P&gt;I currently manage an office building that has 42 internal networks and I have a single linux firewall/gateway to the internet.  I am looking to replace it possibly with an asa 5505 firewall, but I thought I should check with those more familiar with the product if this is a good fit for my network.  I don't have a need for vpn, but my linux box is capable of that.  The biggest need in my firewall is the ablility for 1-1 Nat translations by port and by IP address.  I also need the ability of the device to handle multiple public ip addresses. Does anyone have any thoughts?  Will I need a device with a lot of licenses, or is that just for vpn? Thanks in advance for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047709#M913957</guid>
      <dc:creator>venturasuites</dc:creator>
      <dc:date>2019-03-11T13:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047710#M913965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To suggest an ASA you would need to tell more about your bandwidth, number of interfaces required, no of concurrent connections, IPS module required? Etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a quick comparison:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 01:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047710#M913965</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-26T01:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047711#M913969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I currently connect to a 10 Meg connection.  I would guess the maximum users on the network would be 100 to 150 computers, none of which require a vpn connection.  My linux box currently has intrusion detection and prevention, but I had to disable the prevention side of the software since some users were unable to view certain websites. I'm not sure my network requires this service, but it was a cheap upgrade to my linux operating system so I purchased it. Is the linux box, (I use Clark Connect) a more robust solution, or is and ASA the better way to go?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 01:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047711#M913969</guid>
      <dc:creator>venturasuites</dc:creator>
      <dc:date>2008-08-26T01:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047712#M913978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would go for the ASA &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 05:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047712#M913978</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-26T05:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047713#M913981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I noticed that the base model only came with 10 licenses.  Are the licenses only for VPN access or do I need a license for every computer in the internal network so that it can access the internet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2008 03:04:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047713#M913981</guid>
      <dc:creator>venturasuites</dc:creator>
      <dc:date>2008-08-29T03:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047714#M913990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are for simultanious VPN connections, not based on inside machine IP addresses (as with the PIX 501/506)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Farrukh has suggested for what you are looking for an ASA would fit your requirements, more specifically the 5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2008 07:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047714#M913990</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-08-29T07:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047715#M913993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"I currently connect to a 10 Meg connection. I would guess the maximum users on the network would be 100 to 150 computers, none of which require a vpn connection. My linux box currently has intrusion detection and prevention, but I had to disable the prevention side of the software since some users were unable to view certain websites. I'm not sure my network requires this service, but it was a cheap upgrade to my linux operating system so I purchased it. Is the linux box, (I use Clark Connect) a more robust solution, or is and ASA the better way to go?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my 2c:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your linux box which I suspect runs iptables&lt;/P&gt;&lt;P&gt;and some customization of Snort as IDS/IPS.&lt;/P&gt;&lt;P&gt;Iptables can perform complext NAT with such &lt;/P&gt;&lt;P&gt;ease that I don't think ASA can provide this&lt;/P&gt;&lt;P&gt;function.  Furthermore, when it comes to &lt;/P&gt;&lt;P&gt;troubleshooting, tcpdump on Linux is a much&lt;/P&gt;&lt;P&gt;better tool than ASA capture utilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, supports for Linux firewalls&lt;/P&gt;&lt;P&gt;like yours are not as great as Cisco TAC &lt;/P&gt;&lt;P&gt;support.  In other words, if things do not&lt;/P&gt;&lt;P&gt;go well with the ASA, you can blame it on&lt;/P&gt;&lt;P&gt;Cisco.  With your customize linux firewall,&lt;/P&gt;&lt;P&gt;you're ultimately responsible for it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2008 17:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047715#M913993</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-08-29T17:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047716#M913994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andrew, maybe I'm misunderstanding what you're saying, but does an ASA 5505 10 user base license not restrict the total number of outoing 'internet' connections in addition to the number of VPN sessions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/specs.html#wp1150495" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/specs.html#wp1150495&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Aug 2008 11:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047716#M913994</guid>
      <dc:creator>kmccourt</dc:creator>
      <dc:date>2008-08-30T11:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047717#M913996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry - you are correct, for some reason I when I replied to that particular post I read the table matrix wrong, and confused simultaneous  VPN's to concurrent users, my apologies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the number of inside users/ip addresses you would need the 5505 - 50 Base License for what you want to achieve.....if you choose the Cisco ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Aug 2008 12:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047717#M913996</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-08-30T12:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047718#M913998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you do NOT need a 50-Base License.  Even&lt;/P&gt;&lt;P&gt;with a 50-Base license, will it be able to&lt;/P&gt;&lt;P&gt;support 100-150 users on your internal network&lt;/P&gt;&lt;P&gt;if all of them decide to access the Internet &lt;/P&gt;&lt;P&gt;at the same time?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I would do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Go with the cheapest ASA 5505 and 10 user&lt;/P&gt;&lt;P&gt;license,&lt;/P&gt;&lt;P&gt;2- place the ASA in front of the Linux firewall,&lt;/P&gt;&lt;P&gt;3- Port Address Translation (PAT) or as linux&lt;/P&gt;&lt;P&gt;calls it, IP masquerading, everyone to the&lt;/P&gt;&lt;P&gt;Linux firewall,&lt;/P&gt;&lt;P&gt;5- To the ASA, it will see everything just &lt;/P&gt;&lt;P&gt;from a single IP of the Linux firewall,&lt;/P&gt;&lt;P&gt;6- Everything you need to STATIC nat, you can&lt;/P&gt;&lt;P&gt;place the servers in front of the Linux&lt;/P&gt;&lt;P&gt;firewall but behind the ASA. Think of the &lt;/P&gt;&lt;P&gt;network between the Linux firewall and the&lt;/P&gt;&lt;P&gt;ASA as the DMZ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way you're much more secure and have a&lt;/P&gt;&lt;P&gt;two-tier firewall solutions with minimum&lt;/P&gt;&lt;P&gt;cost.  Why pay more when you do not have to?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Aug 2008 13:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047718#M913998</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-08-30T13:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047719#M913999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would prefer to not use the Linux firewall since I feel it is not as reliable as this cisco firewall appliance.  The specs say that you can have 10,000 concurrent connections.  I figured that was for computers on the internal network and the 10, 50, or unlimited was for VPN.  Can anyone clarify this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Aug 2008 15:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047719#M913999</guid>
      <dc:creator>venturasuites</dc:creator>
      <dc:date>2008-08-30T15:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: Linux based Firewall replacement</title>
      <link>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047720#M914000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to clarify for you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Concurrent Firewall Conns:-&lt;/P&gt;&lt;P&gt;The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with one host and one dynamic translation for every four connections. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users, concurrent:-&lt;/P&gt;&lt;P&gt;In routed mode, hosts on the inside (Business and Home VLANs) count towards the limit only when they communicate with the outside (Internet VLAN). Internet hosts are not counted towards the limit. Hosts that initiate traffic between Business and Home are also not counted towards the limit. The interface associated with the default route is considered to be the Internet interface. If there is no default route, hosts on all interfaces are counted toward the limit. In transparent mode, the interface with the lowest number of hosts is counted towards the host limit. See the show local-host command to view the host limits. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Aug 2008 16:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/linux-based-firewall-replacement/m-p/1047720#M914000</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-08-30T16:08:41Z</dc:date>
    </item>
  </channel>
</rss>

