Firewall and VSS
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2018 01:57 AM - edited 02-21-2020 07:21 AM
Hi,
Hi,
We are a school of around 800 students and 300-400 employees, upgrading our single core cisco 6509E switch to redundant core with VSS (not sure which switch model we will get) . We use only ACLs now but i suppose that is not enough security ? and we are looking to use Azure for all our 20 servers and for storage and backup in future so would need a Site-to-Site VPN capable device.
Questions are that:
If we need firewall that need to be a pair of devices for redundancy connecting to both the core switches and same goes for firewall modules ?
What are the features which a firewall must have to mention in the requirements document ? as we are a school not a bank so just need some basic features.
How do i know how much throughput (capability) i need for our firewalls ?
- Labels:
-
NGFW Firewalls
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2018 04:20 AM
Let me kick this off. If you have a redundant core using VSS, you dont necissarily need a redundant firewall, but you can. you can have a HA ASA Pair for fail over or have one ASA with a port channel: one link from asa to switch A and one to switch B, but port channeled.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2018 05:00 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-16-2018 02:26 AM
yes it would be, unless you deploy 2 firewalls, with two internet connections. run BGP between them and your ISP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2018 04:22 AM
Regards...Jim
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2018 04:59 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-15-2018 03:06 AM
Questions are that:
If we need firewall that need to be a pair of devices for redundancy connecting to both the core switches and same goes for firewall modules ?
What are the features which a firewall must have to mention in the requirements document ? as we are a school not a bank so just need some basic features.
How do i know how much throughput (capability) i need for our firewalls ?
A pair of firewalls with IPS features like ASA 55xx and Firepower service modules or ASAs / Firepower appliances running FTD is recommended.
Your network and systems as a whole need to be protected against current and evolving threat landscape. An edge firewall is just one piece of that. Equally (if not more) is protecting yourself with endpoint protection (like AMP for Endpoints) and DNS-based protection (like Umbrella).
As far as throughput, what's your Internet connection speed, how much of it do you use and what's the trend / projection? If you don't monitor it, you should or maybe your provider can provide some metrics. That number is an important one in choosing the right firewall as functional features are almost the same across a broad range of models
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-16-2018 01:49 AM
Endpoint protection is in place just working out the edge firewall piece. We have 1G Internet connection speed. Last weeks average traffic in/out was around 200Mbits/s . We are connected to ISP`s managed router on a 10G physical link.
So the firewall throughput should be 500 Mbits or 1G ? keeping in mind Azure migration in near future.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-16-2018 08:24 PM - edited 02-16-2018 08:35 PM
The Firepower 2110 with FTD image would be a good choice as it has 2 Gbps throughput with all features active.
If you run a pair of them you should manage them with a 2-device license of Firepower Management Center running on a VM (assuming you have an ESXi or KVM virtualization environment).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-23-2018 03:28 AM
Hi,
Thanks for help. Specs for 2110 say IPSec VPN Throughput is 750 Mbps. As we are planning to put all our servers in Azure and connect with them via VPN do you think this throughput would be enough for us ?
Traffic on our server VLAN is around 500 Mbits avg.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-24-2018 05:29 AM - edited 02-26-2018 09:22 AM
That should be fine.
When you move all the servers to Azure, I'd assume their storage and backup will be done in the Azure cloud too. That probably accounts for a significant portion of your current traffic on your server VLAN.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2018 09:20 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2018 09:27 AM
No general document is going to account for your exact use case.
It should be provable though given some detailed analysis of your current utilization statistics.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2018 10:13 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2018 12:30 AM
Ideally something like Netflow data would give you a good idea of how much traffic to the server subnet is user traffic vs traffic for storage and server-server things.
