<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM not a best practice in data center? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849961#M955026</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"I haven't see checkpoint installed in any US govt agencies."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps you need to get out more and stop &lt;/P&gt;&lt;P&gt;putting on the Cisco blinder.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISS, Verio and just about every MSSP uses&lt;/P&gt;&lt;P&gt;checkpoint.  As far a US Gov. agencies, there&lt;/P&gt;&lt;P&gt;are many that use checkpoint.  DOA, DOT and HHS,&lt;/P&gt;&lt;P&gt;just to name a few.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Feb 2008 18:21:02 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2008-02-14T18:21:02Z</dc:date>
    <item>
      <title>FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849954#M955017</link>
      <description>&lt;P&gt;Hello. We are in the middle of building a data center at a co-location facility, and are planning on using FWSM modules in our redundant 6500' to "zone" the network there. Basically what we are being told is that each subnet in this new data center will be treated as a separate security zone, with each zone not being able to access the other except on specified ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our server access layer will consist of 4 4948-10G switches (we think), trunked into the core 6500'. This will force traffic through the FWSM, allowing it to be policed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of a sudden the company has brought in a "senior" guy to oversee the entire project, and he tells us that it is not best practice to have the FWSM zoning the networks, because if the core switch/FWSM is hacked, the entire network is exposed. We are arguing that this is indeed the case with whatever FW you use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is only for the internal side of the network, as we will have a pair of checkpoint firewalls on the perimeter protecting us from public traffic. He has proposed an ASA 5510 instead of the FWSM, with each subnet being on a different DMZ/interface. This immediatley throws up two red flags, throughput and scalability. The ASA has a maximum of 8 ports, and we currently have 8 different subnets that need to be separated. Also, backups will run through this network, and having that amount of traffic traversing the ASA doesn't seem realistic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any merit in what he is saying? I've always been under the impression that the FWSM was designed almost for this exact situation.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849954#M955017</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2019-03-11T12:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849955#M955018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree to what he says to some extent, its good to have a dedicated ASA 5500 rather than the addon FWSM card on 6k&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure whats your connection rate n throughput , however this is what ASA can support&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 15:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849955#M955018</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2008-02-14T15:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849956#M955019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Throughput and connection will be the limitation&lt;/P&gt;&lt;P&gt;of ASA.  ASA does NOT do Active/Active whereas&lt;/P&gt;&lt;P&gt;checkpoint firewall can cluster up to 32 nodes&lt;/P&gt;&lt;P&gt;(i.e 32 servers dual quad-core Intel processors)&lt;/P&gt;&lt;P&gt;where you can push an insane amount of traffics.&lt;/P&gt;&lt;P&gt;ASA is not designed for large scale datacenter.&lt;/P&gt;&lt;P&gt;Iamgine you can scale up to 32 servers in &lt;/P&gt;&lt;P&gt;Active/Active...32Active nodes.  &lt;/P&gt;&lt;P&gt;Budget is another matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may want to look at NGx R65 CoreXL.  I've&lt;/P&gt;&lt;P&gt;used it and really like a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 15:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849956#M955019</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-02-14T15:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849957#M955021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;checkpoint is not safe at all...it was designed in Isreal..and then once it got obsolete there it was distributed in all other countries...I haven't seen small soho checkpoints being used in data centres..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA can do active/active failover..if ASA 5510 is not coping up try high end models&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 16:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849957#M955021</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2008-02-14T16:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849958#M955023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One requirement I did not mention was the need for different vendor firewalls protecting us from the Internet. On the outside we currently use clustered Nokia IP390's, therefore the thought was that since we already had the 6509' for the internal side, why not just add the FWSM, giving us the second vendor as required. I believe the FWSM has a firewalled throughput of 5Gb, way way over and above the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are likely talking about hundreds of GB's of data that needs to be backed up weekly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 16:08:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849958#M955023</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2008-02-14T16:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849959#M955024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;are  you telling me that ASA can cluster 32 &lt;/P&gt;&lt;P&gt;nodes together?  ASA Active/Active is not&lt;/P&gt;&lt;P&gt;really active/active.  Are you telling me that&lt;/P&gt;&lt;P&gt;ASA can do load sharing for let say network&lt;/P&gt;&lt;P&gt;192.168.1.0/24 on both ASA right out of the box?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"checkpoint is not safe at all.." &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say who?  If it is not safe then how come a lot&lt;/P&gt;&lt;P&gt;of government agencies including most financial&lt;/P&gt;&lt;P&gt;services use checkpoint?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 16:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849959#M955024</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-02-14T16:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849960#M955025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes checkpoint not safe at all..Isarelis have the source code of this product since they are the ones who designed this...I haven't see checkpoint installed in any US govt agencies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now coming back to what requester asked..see if your throughput is higher than 5GBps...then yes either FWSM or ASA 5580s&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 16:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849960#M955025</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2008-02-14T16:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849961#M955026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"I haven't see checkpoint installed in any US govt agencies."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps you need to get out more and stop &lt;/P&gt;&lt;P&gt;putting on the Cisco blinder.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISS, Verio and just about every MSSP uses&lt;/P&gt;&lt;P&gt;checkpoint.  As far a US Gov. agencies, there&lt;/P&gt;&lt;P&gt;are many that use checkpoint.  DOA, DOT and HHS,&lt;/P&gt;&lt;P&gt;just to name a few.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 18:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849961#M955026</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-02-14T18:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849962#M955027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not sure what difference it makes where it was developed (hopefully you mean that differently than it sounds), and we are indeed a financial organization who uses Checkpoint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, back to the issue at hand; any idea how much the 5580 costs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 18:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849962#M955027</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2008-02-14T18:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849963#M955028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;checkpoint is cheap but unsecure., ISPs that uses it only use it on peripharies and not in core.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Coming back to your Query  requester, you may check the price of ASA 5580 in pricing tool&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 19:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849963#M955028</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2008-02-14T19:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849964#M955029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"checkpoint is cheap but unsecure"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know where you get the fact to backup your claims.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If cisco is so great and secure, then let me ask you this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Cisco Pix or ASA, BY DEFAULT, hosts residing behind higher security&lt;/P&gt;&lt;P&gt;level interface can traverse the firewall to communicate with hosts&lt;/P&gt;&lt;P&gt;residing behind lowever security level interface.  That is a fact,&lt;/P&gt;&lt;P&gt;correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on that argument, if a host behind a higher security level&lt;/P&gt;&lt;P&gt;interface is infected with viruses, it can then infect other hosts&lt;/P&gt;&lt;P&gt;residing behind lower security level interfaces.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Checkpoint, nothing is allowed between interfaces unless&lt;/P&gt;&lt;P&gt;it is EXPLICITLY allowed.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If checkpoint is cheap but un-secure, then why Gov. agencies and&lt;/P&gt;&lt;P&gt;financial organizations use checkpoint.  These guys must be dumb right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"ISPs that uses it only use it on peripharies and not in core."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right.  They don't use checkpoint at the core.  They do not&lt;/P&gt;&lt;P&gt;use Cisco either.  They use Juniper.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 20:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849964#M955029</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-02-14T20:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849965#M955030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have multiple vlans within your 6500 and you want to firewall between them with a requirement for high throughput and flexible configuration then that is one of the main uses of the FWSM. To my thinking it makes perfect sense if you are merely looking to do internal firewalling between your server subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use a standalone pair of ASA's and they are hacked then you have the same issue. Key thing here is all vlans are terminating on firewall interfaces whether that be FWSM or standalone ASA's so either way your firewall is hacked you are in trouble. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps this guy could go into a bit more detail as to why it is different with the FWSM than the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing that is worth bearing in mind is that the FWSM is only a firewall whereas ASA devices can do more, IPS etc. But this may not be an issue for you. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 22:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849965#M955030</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-02-14T22:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849966#M955031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, thanks Jon. That was what I was hoping to hear. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe this other guy could also come back and explain a couple of his other comments as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Feb 2008 10:53:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849966#M955031</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2008-02-15T10:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849967#M955032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the FWSMs are good for segmenting a specific portion of your data center and not every single subnet or host.  Put them in front of your high-value servers (PCI, Finance databases, secret formula to Coca-Cola, plans to Area 51, whatever) where you don't want to have to go 'outside' your 6500's and where throughput isn't a factor.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just my .02; don't want to get in the middle of a flame war &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  &lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Feb 2008 01:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849967#M955032</guid>
      <dc:creator>clausonna</dc:creator>
      <dc:date>2008-02-16T01:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849968#M955033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To whoever rated this a 1. Could you try reading the Original poster's response to my answer. He found it helpful and it was to him that my answer was directed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't agree with what i have said try doing something a little more constructive and present a rational argument as to why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vast majority of people in these forums do a great job of helping people offering advice for free. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sometimes i wonder why we bother&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Feb 2008 20:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849968#M955033</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-02-16T20:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849969#M955034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry to resurrect this conversation, but if a so-called expert came in and said it would be a great idea to change the pair of 6500's with FWSM modules, and put in a pair of ASA5520's instead, what would you say to this person? He says it will be fine to use the 5520 to zone the network, which will contain 60 servers to start. I really don't think the 5520 is designed for this, is it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Mar 2008 13:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849969#M955034</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2008-03-14T13:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849970#M955035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone proposes to replace what is an expensive piece of hardware with another expensive piece of hardware, presumbaly expensive because you will need high end ASA for your throughput requirements, then they need to justify why they want to do it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It might well be fine to use ASA's to firewall your internal network but why can't the FWSM's do the same thing. Is there additional functionality needed that is not supported by the FWSM's ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps you could go into a bit more detail as to why your consultant thinks it is such a great idea ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Mar 2008 15:07:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849970#M955035</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-03-14T15:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849971#M955036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The consultant is actually trying to replace two 6500's with two ASA 5520's, and is trying to tell management that it is the same thing. Cost seems to be the motivating factor for his argument, since the 6500 with the FWSM is about $50K, whereas the 5520 is only $8K. Essentially the 5520 becomes the 'core' of the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;He is proposing that each zone would plug into a different interface on the 5520, allowing each network to be secured. Right off the bat I see scalability issues, since we will have at least 6 subnets to start off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;His idea just seems very mickey mouse to me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Mar 2008 15:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849971#M955036</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2008-03-14T15:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849972#M955037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is difficult to be specific and say one solution is right and one wrong without a full set of requirements. I have seen both extremes in my career &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) A completely overspecced solution with 4 6500's, multiple pix firewalls for approx 20 servers&lt;/P&gt;&lt;P&gt;2) A DC setup based around 3550 switches etc with gigabit throughput requirements/QOS/ACL's etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does concern me is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) An asa 5520 at core of a Data Centre network with servers moving large amounts of data. That is one of the main reasons for using an FWSM.&lt;/P&gt;&lt;P&gt;2) The lack of future scalability. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8k vs 50k may sound like a lot but in terms of a DC setup and often compared to the cost of servers/software licenses it is not. You should always allow extra capacity for future requirements in your design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i really find worrying is that it seems to be ASA 5520's vs 6500/FWSM's. Even if you chose not to go with the FWSM's i would still recommend using a pair of switches to connect up the 4948's and 6500's are the logical choice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know what your budget is, what proportion of the budget 50k accounts for, what the future plans are for the DC but presented with the details you have so far provided i would say&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) At the very least use a separate pair of switches to interconnect all your 4948 server switches&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) The FWSM is a reasonable choice and i wouldn't necessarily argue against it but there are other alternatives and you don't have to use the FWSM simply because you have a 6500 chassis. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A saving of 42k won't look that great if in 6 months time you find you need another 5 subnets and you can't get your backups completed in time. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Mar 2008 15:45:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849972#M955037</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-03-14T15:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM not a best practice in data center?</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849973#M955038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again Jon. Another idea I've been kicking around now that mangement seems to really be focusing on cost; what if we plugged all of our servers into a stack of 3750E's, and zoned the networks simply using VACL's? Would the 3750E be able to process the VLAN ACL's fast enough, or would this become the bottleneck. Is this even a reasonable alternative?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The stack could then uplink into a firewall device, at that point probably the 5520, or maybe a 5540. Throughput on the firewall would not be a concern, since server to server traffic would not traverse the firewall, it would stay local to the stack.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Mar 2008 16:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-not-a-best-practice-in-data-center/m-p/849973#M955038</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2008-03-14T16:46:42Z</dc:date>
    </item>
  </channel>
</rss>

