I'd consult the list archive, since theres a couple recent and fairly lengthy 
threads on this.

joel

On Jul 5, 2011, at 8:56 AM, chavan sanjay wrote:

> Hi Team,
>  
> Can anyone enlighten me on the pros and cons of MX 80 platform
>  
> Thanks
> 
> Sanjay C.P.
> 
> --- On Tue, 7/5/11, [email protected] <[email protected]> wrote:
> 
> 
> From: [email protected] <[email protected]>
> Subject: NANOG Digest, Vol 42, Issue 5
> To: [email protected]
> Date: Tuesday, July 5, 2011, 5:30 PM
> 
> 
> Send NANOG mailing list submissions to
>     [email protected]
> 
> To subscribe or unsubscribe via the World Wide Web, visit
>     https://mailman.nanog.org/mailman/listinfo/nanog
> or, via email, send a message with subject or body 'help' to
>     [email protected]
> 
> You can reach the person managing the list at
>     [email protected]
> 
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of NANOG digest..."
> 
> 
> Today's Topics:
> 
>    1. cheapo UUFB solution for Cisco 7201 (Rogelio)
>    2. Re: Firewall Appliance Suggestions (Curtis Maurand)
>    3. RE: Firewall Appliance Suggestions (Jean CLERY)
>    4. Re: Firewall Appliance Suggestions (Peter Nowak)
> 
> 
> ----------------------------------------------------------------------
> 
> Message: 1
> Date: Mon, 4 Jul 2011 11:34:11 -0300
> From: Rogelio <[email protected]>
> Subject: cheapo UUFB solution for Cisco 7201
> To: [email protected]
> Message-ID:
>     <CALJphbs6UBWKqGVW1EyvCL6pKGtCKjSYNZB=q70fxpoq7d0...@mail.gmail.com>
> Content-Type: text/plain; charset=ISO-8859-1
> 
> I've got a Cisco 7201 with about 500 L2TPv2 tunnels, and I suspect
> that UUFB (unknown unicast flooding) is resulting in spiking (I put an
> ACL on to kill broadcast traffic, so I'm sure that's not related).
> I've googled and don't see anything for the 7201, just the 7600
> series.  :/
> 
> i.e. 
> http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SR/configuration/guide/blocking.html
> 
> Anyone have any suggestions on (something cheap) that I can put in
> front of this box to spare it from (what I suspect) is a gateway that
> unicast floods when a MAC address has aged?
> 
> To add to my challenges, I'm in Brazil and importing gear is insanely
> effing difficult.  :/
> 
> --
> Also on LinkedIn?  Feel free to connect if you too are an open
> networker: [email protected]
> 
> 
> 
> ------------------------------
> 
> Message: 2
> Date: Mon, 04 Jul 2011 17:40:56 -0400
> From: Curtis Maurand <[email protected]>
> Subject: Re: Firewall Appliance Suggestions
> To: [email protected]
> Message-ID: <[email protected]>
> Content-Type: text/plain; charset=ISO-8859-1; format=flowed
> 
> On 6/30/2011 12:20 PM, Suresh Rajagopalan wrote:
>> Linux + iptables + fwbuilder
>> 
>> 
>> 
>> On Thu, Jun 30, 2011 at 8:50 AM, Blake T. Pfankuch<[email protected]>  wrote:
>>> Howdy,
>>>                  I am looking for something a little unique in a bit of a 
>>> tough situation with some sticky requirements.  First off, my requirements 
>>> are a little weird and I can't bend them a whole lot due to stipulations 
>>> being put on me.  I am in need a firewall appliance which can be run on 
>>> VMware vSphere, with IPSEC support for multiple Phase 2 negotiations within 
>>> a single Phase 1.  I am also in need of something that can support VLAN 
>>> interfaces on the LAN side, and ideally something with multi zoning so I 
>>> can keep LAN side networks separate from each without ridiculous firewall 
>>> rules.  Meaning build a zone for "Customer network 1" and it displays 
>>> separately (ease of management and firewall config hopefully).  I need a 
>>> minimum of 10 "zones" on LAN side (/29 or /30), and NAT support for LAN to 
>>> WAN (to dedicate all outbound connections to a single IP from a specific 
>>> zone), ideally something extremely scalable (100-200 zones).  And here
> is the super fun part!  I need something that is going to be web managed 
> primarily as minions will be doing most of the day to day maintenance, or 
> very simple CLI config.  Willing to pay for something if need be, but looking 
> for something that can easily handly 50-100mbit of throughput.
>>> 
>>> Any Ideas?
>>> 
>>> Thanks!
>>> 
>>> Blake Pfankuch
>>> 
> Vyatta.  They have an appliance on their website.
> 
> --Curtis
> 
> 
> 
> 
> ------------------------------
> 
> Message: 3
> Date: Tue, 5 Jul 2011 00:58:51 +0200
> From: "Jean CLERY" <[email protected]>
> Subject: RE: Firewall Appliance Suggestions
> To: "'Curtis Maurand'" <[email protected]>,    <[email protected]>
> Message-ID: <F7819E52D830406983C30BC43FAD7E3D@ezekiel>
> Content-Type: text/plain;    charset="iso-8859-1"
> 
> Hi Blake
> Try www.netasq.com
> 
> Regards,
> Jean CLERY
> 
> 
> -----Message d'origine-----
> De?: Curtis Maurand [mailto:[email protected]] 
> Envoy??: lundi 4 juillet 2011 23:41
> ??: [email protected]
> Objet?: Re: Firewall Appliance Suggestions
> 
> On 6/30/2011 12:20 PM, Suresh Rajagopalan wrote:
>> Linux + iptables + fwbuilder
>> 
>> 
>> 
>> On Thu, Jun 30, 2011 at 8:50 AM, Blake T. Pfankuch<[email protected]>
> wrote:
>>> Howdy,
>>>                  I am looking for something a little unique in a bit of a
> tough situation with some sticky requirements.  First off, my requirements
> are a little weird and I can't bend them a whole lot due to stipulations
> being put on me.  I am in need a firewall appliance which can be run on
> VMware vSphere, with IPSEC support for multiple Phase 2 negotiations within
> a single Phase 1.  I am also in need of something that can support VLAN
> interfaces on the LAN side, and ideally something with multi zoning so I can
> keep LAN side networks separate from each without ridiculous firewall rules.
> Meaning build a zone for "Customer network 1" and it displays separately
> (ease of management and firewall config hopefully).  I need a minimum of 10
> "zones" on LAN side (/29 or /30), and NAT support for LAN to WAN (to
> dedicate all outbound connections to a single IP from a specific zone),
> ideally something extremely scalable (100-200 zones).  And here is the super
> fun part!  I need something that is going to be web managed primarily as
> minions will be doing most of the day to day maintenance, or very simple CLI
> config.  Willing to pay for something if need be, but looking for something
> that can easily handly 50-100mbit of throughput.
>>> 
>>> Any Ideas?
>>> 
>>> Thanks!
>>> 
>>> Blake Pfankuch
>>> 
> Vyatta.  They have an appliance on their website.
> 
> --Curtis
> 
> 
> 
> 
> 
> ------------------------------
> 
> Message: 4
> Date: Tue, 5 Jul 2011 00:50:45 -0400
> From: Peter Nowak <[email protected]>
> Subject: Re: Firewall Appliance Suggestions
> To: Blake T. Pfankuch <[email protected]>
> Cc: "NANOG \([email protected]\)" <[email protected]>
> Message-ID: <[email protected]>
> Content-Type: text/plain;    charset=us-ascii
> 
> They don't have a VM yet - coming soon - but you may take a look at Palo Alto 
> Networks. Having just a regular stateful firewall is not a good idea 
> anymore...
> 
> Peter Nowak
> 
> On Jul 1, 2011, at 12:35 AM, Blake T. Pfankuch wrote:
> 
>> Normally I would agree with you as far as separate instances, however this 
>> will be in a situation where we pay ridiculous amounts for cpu and memory, 
>> so a single instance is what we are shooting for (remember those ridiculous 
>> requirements).  I am planning to do some further testing with vyatta and 
>> pfsense.  Thanks you all for the on list and off list responses!
>> 
>> -----Original Message-----
>> From: Sargun Dhillon [mailto:[email protected]] 
>> Sent: Thursday, June 30, 2011 9:56 PM
>> To: George Bonser
>> Cc: Blake T. Pfankuch; NANOG ([email protected])
>> Subject: Re: Firewall Appliance Suggestions
>> 
>> 
>> 
>> ----- Original Message -----
>>> From: "George Bonser" <[email protected]>
>>> To: "Blake T. Pfankuch" <[email protected]>, "NANOG ([email protected])" 
>>> <[email protected]>
>>> Sent: Thursday, June 30, 2011 11:30:53 AM
>>> Subject: RE: Firewall Appliance Suggestions
>>> 
>>>> Willing to pay for something if need be, but looking for something 
>>>> that can easily handly 50-100mbit of throughput.
>>>> 
>>>> Any Ideas?
>>>> 
>>>> Thanks!
>>>> 
>>>> Blake Pfankuch
>>> 
>>> 
>>> I might also look at Vyatta.  They have appliances or you can run the 
>>> software on your own hardware.
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>> 
>> I would not go with Vyatta if you're doing anything complex. The number of 
>> random bugs I've hit with their software are numerous. In the right hands, 
>> it's a powerful tool. And it seems to fit your solution really well. 
>> 
>> If I were in your shoes, I would install two instances that would handle the 
>> "edge" of the cluster, and then an instance per customer (lightweight, they 
>> sell a VMWare image). Then use dynamic routing to direct traffic to the 
>> customer (assign each customer their own ASN, and peer with their instance). 
>> So, worse case scenario, the NOC monkey only breaks one customer's gear. 
>> 
>> 
>> --
>> Sargun Dhillon
>> VoIP (US): +1-925-235-1105
> 
> Peter Nowak
> Manager, Technical Services
> Bat Blue Corporation | Integrity . Privacy . Availability
> p. 212.461.3322 x3020 | f. 212.584.9999 | w. www.batblue.com
> Bat Blue's AS: 25885 | BGP Policy | Peering Policy
> Bat Blue's Legal Notice
> 
> Receive Bat Blue's DSB Intelligence Report
> 
> Bat Blue is proud to be the Official WiFi Provider for ESPN's X-Games
> 
> 
> 
> 
> ------------------------------
> 
> _______________________________________________
> NANOG mailing list
> [email protected]
> https://mailman.nanog.org/mailman/listinfo/nanog
> 
> End of NANOG Digest, Vol 42, Issue 5
> ************************************
> 


Reply via email to