FortiManager/Analyzer Networking |
- FortiManager/Analyzer
- Upgrading ASR9010 to ASR9910 or 9912
- Rate limiting connections (not bandwidth)?
- External Switch Firewall Interface - Access or Trunk?
- Help for final dissertation in networking
- anyone with feedback on running tacacsgui ?
- Recommended inwall cable management wall penetration for passing lots of wiring/cabling through drywall/gypsum/sheetrock in center of wall like a waterfall and cabling is then connected to a cabinet rack on caster wheels that can be safely moved to and away from the wall port?
- Cisco ASA 5585-X Firewall Single chassis with dual SSP-20 module failover question
- Struggling to understand VLAN setup... See my "scenario" within and weigh in please?
- Sales recommendation for AVIT company
- Checking the network quality as a function of of the buffer
Posted: 25 Mar 2022 12:36 PM PDT How useful is Fortimanger and Analyzer? How hard to implement in a production environment of say 20 FortiGates? Our core is Cisco and so is our wireless. I've gained a lot of experience getting into each device and running commands in the CLI and configuring within the GUI, don't mind that at all. There's two of us Network Engineers that manually manage these devices, so updates we're tackling together each of us log into them to update. We have multiple policies across the devices, many of them are the same (maybe not the same naming scheme) but have will vary slightly some aspects. Right now when I configure a new device, I snag a config of a production device, go through and change the necessary configs to the specific subnets and WAN info. Most everything else stays as far as policy/objects. Currently I'm in the process of learning python for Network Automation. Some tasks I'd like to automate so I don't have to manually do it across all of the devices. I feel like this manager may even replace my need for automation scripts for the Fortigates (I would still learn for my own growth as well as automating tasks for our Ciscos). Then, the others I work with, a lot of them are "old school" they prefer doing things in the CLI don't care for GUI. I like having the GUI to see what I am doing. I also like to get into the CLI to better understand what I am doing. When I configure a device, right now I do it almost exclusively in CLI so I get that exp and understanding. But how do you sell something like this to your team/managers? They're very reserved to automation and don't seem too receptive of tools like this. [link] [comments] |
Upgrading ASR9010 to ASR9910 or 9912 Posted: 25 Mar 2022 06:07 AM PDT Hello Guys, My manager is currently discussing with Cisco about the new line of ASR 99 series. We need to deploy more routers and currently we are using a bunch of ASR9010s and a few ASR9006. Thank you for your help in advance. [link] [comments] |
Rate limiting connections (not bandwidth)? Posted: 25 Mar 2022 06:39 AM PDT In recent months something has changed with our vulnerability scanning that is causing us to hit connection limits on our SD-WAN appliances (i.e. seeing it trying to open 1m+ concurrent TCP connections, far exceeding the 500k limit they were rated for). I've had several conversations w/ that team and it's "better" but still a problem. Is it possible to rate limit the number of connections (not bandwidth) allowed from a single IP? I've asked similar to /r/Vmware to see if alternately there's a way on the VM/vDS level, but I've only ever seen it done for bandwidth. Thank you in advance! [link] [comments] |
External Switch Firewall Interface - Access or Trunk? Posted: 25 Mar 2022 11:28 AM PDT Hi guys. We need to add a new firewall to our external L2 switch for a POC and I don't know whether I need to configure the port as a trunk or as an access port. Our ISP router is connected to an access port on the external switch and our current firewalls are connected to trunk ports on the same switch. Just wondering what the reason is for our current firewall to be connected to a trunk port as all internal traffic is being NATed to the public IP of our firewall. I guess I have to configure our new firewall port as a trunk? What is the technical explanation? Thanks a lot! [link] [comments] |
Help for final dissertation in networking Posted: 25 Mar 2022 04:45 PM PDT Greetings, i'm a student who is having his final dissertation and right now i'm in need of help, somethings like sources, docs like other dissertations that have as much similarity as possible with my own dissertation's subject, anything that may be helpful is welcome. (in english or french) The subject of my dissertation is about 'Monitoring and control of users in a lan network'. [link] [comments] |
anyone with feedback on running tacacsgui ? Posted: 25 Mar 2022 04:01 PM PDT I'm looking for cheap Tacacs+ solution, that can support regional clustering/replication. I don't want ISE and looking back at open source before revisiting Clearpass. Can anyone give me honest feedback on running Tacacsgui ? I see it's been around for a few years, but can't really tell if it's stable or not. it seems limited to Ubuntu 18.0.4 ? any issues with patching/updates ? is the project still active? any info greatly appreciate, I just want to get a sense of whether or not it's worth the effort to spin up... [link] [comments] |
Posted: 25 Mar 2022 12:48 PM PDT I am finishing a room that will have a rack with several dozen of various heavy cables (cat8, cat6a, 12awg speaker cables, xlr cables, etc) that are pulled open air, no conduit, behind walls wooden 2x4s or through circular cutouts in the 2x4s and all cabling is converging at a shallow brick wall between wooden 2x4's where their is going to be a 36u rack. I am looking for how to properly finish the penetration of the cabling from inside the walls 2x4s and inside the wall through the drywall and the cable entry to the space where the rack will stand and to have sufficient excess cabling loop from the drywall towards the ground and back up to the rear of the rack where the cabling would be secured so that the rack can be safely wheeled away from the wall with enough cable slack so that anyone may work on the rear of the rack and swap equipment out at any time in the future. Instead of, or in addition to, simply using large heavy duty zip ties in the wall to manage the weight and direction of the cabling near the exit out the wall to the rack using simple 1, 2, or 3 gang plastic mounting brackets or cable plates with opening pass throughs are there any recommended more robust products to install in a drywall cutout opening to assist in managing the weight and flow of the cabling into a room space? For example, for cable ladder environments I know of Panduit CMW2B which I would need to cut in half and may still not fit flush in the wall space of a 2x4. Otherwise, another simple solution would be using large plumbing pvc elbows but these parts at the big box stores ie HD, Lowes, Menards, won't have the correct bend radius and would need to be cut because they may not fit in the ~5 inches of wall depth space I have (4 inches is of the wooden 2x4, and some additional gap space behind the 2x4 in front of the sprayed insulation on the brick wall). Another solution I found was ' Cable Pass Through Wall Port' items on Amazon with a variety of ID inner diameter sizes. I don't know how robust the plastic will be of these parts and they don't have any significant bend or radius. What other solutions exist for cabling wall ports when exiting walls out to network racks? Thanks [link] [comments] |
Cisco ASA 5585-X Firewall Single chassis with dual SSP-20 module failover question Posted: 25 Mar 2022 11:17 AM PDT Folks, I have Cisco ASA 5585-X single Chassis with two SSP-20 module on each slot0 and slot1 and they are acting up like two independent blade. I have configure HA firewall on them now i have question does slot0 has any dependency on slot1 (Like if slot0 fail then it will also impact on slot1 ?) I didn't find any useful information related dual SSP-20 on single chassis. https://www.cisco.com/c/en/us/td/docs/security/asa/hw/maintenance/5585guide/5585Xhw/overview.html Does anyone has any experience with this hardware? [link] [comments] |
Struggling to understand VLAN setup... See my "scenario" within and weigh in please? Posted: 25 Mar 2022 06:57 AM PDT I am REALLY struggling with understanding how to realistically configure a VLAN in a production environment. I am in a very small environment with no VLANs currently so its a good opportunity to try and figure out how it all works since its very small. I think it would help if I outline my "thought" process in a specific scenario and get input on where my logic is wrong. Scenario: I have a router and one switch. I want to add a new VLAN, "VLAN 20", for all hardwired clients. Steps:
Thank you in advance! I am really working towards understanding this to the degree that I can actually implement it. [link] [comments] |
Sales recommendation for AVIT company Posted: 25 Mar 2022 10:35 AM PDT At the risk of violating some rules, I need to ask some industry professionals for recommendations regarding sales and margin over actual technical questions/advice. I work as the sysadmin for a small AVIT company and I have been tasked with finding a product to replace our current solutions. Our business covers mostly, small business and high-end housing with a small dip into larger systems such as hotels and colleges. We have historically used Luxul, Pakedge, and Fortinet to fulfill those needs but over time we have had to drop quite a few brands because of poor reliability, poor support, or similar issues. Currently, our bread and butter system consists of a Luxul router, Luxul switches, and Ruckus access points. we would like to drop Luxul completely as they have been extremely inconsistent when it comes to reliability. Specifically, we are looking to replace Luxul routers and Fortinet firewalls. We have a few key points that might make our use case a bit different from standard enterprise systems.
We have reached out to a few companies but none so far have really been what we are looking for. For example, we have declined to use Ubiquiti, Meraki, and Netgate. Our current leading option is Sophos because of dealer access. TLDR: Router recommendations for AVIT to sell replacing luxul. [link] [comments] |
Checking the network quality as a function of of the buffer Posted: 25 Mar 2022 04:03 AM PDT I have a system which is composed of 4 security cameras sending live feeds to a computer. I want to make sure that I am getting the best possible stream quality without losing a lot of packets due to my network not being good enough. I know that there are streaming protocols that handle this automatically but I don't wont to use that. I want to create a simple program that checks the quality of the connection and decides what configurations to give to the cameras. I found way of calculation the quality of a network (for example ) but the problem with solutions like this is that they are active and not passive (they use the network to find out how good is it) this is a problem since if I check the network quite often I'll end up causing problem to the stream by competing with it over the network. So my first question is do you know of any passive ways of checking the network quality (a huge plus would be if that method is implemented in a python library)? I had an idea of how to solve this but wasn't sure if it could work. the idea was to check the network buffer and if it is full this means that the images are not being sent fast enough so I would reduce the quality. So my second question is do you think this possible and do you know of any solutions that implement a similar idea (a huge plus would be if that method is implemented in a python library)? [link] [comments] |
You are subscribed to email updates from Enterprise Networking Design, Support, and Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment