The issue seemed to be fixed following these instructions:
http://support.microsoft.com/kb/313222
Miguel
--- El mar, 15/9/09, Miguel Gonzalez miguel_3_gonza...@yahoo.es escribió:
De: Miguel Gonzalez miguel_3_gonza...@yahoo.es
Asunto: RE: can't mount usb drives without admin permissions
are LTO4 already in the market? We are getting info that won't be available
until beginning of next year.
The best solution right now is mixing disk and tapes backups: VTL (Virtual Tape
Library). But it's a little bit pricey for a small businesses, although I
believe there could be open source
I've had a few of the Fantom external Megadrives that have two 1tb
drives inside which can be switched between raid 0/1, jbod... On esata
in raid0 mode they are crazy fast. Peaking around 100 mbyte/sec. But
yeah USB sucks.
Regards,
Phillip Partipilo
p...@psnet.com
On Sep 16, 2009, at
LTO4 has been around for a couple of years. Are you thinking LTO5?
Cheers
Ken
-Original Message-
From: Miguel Gonzalez [mailto:miguel_3_gonza...@yahoo.es]
Sent: Wednesday, 16 September 2009 4:23 PM
To: NT System Admin Issues
Subject: RE: Disk based backup
are LTO4 already in the
I think that's a decent plan. If you run into issues, DCpromo the problem DC
out of the environment, fix SP issues, and re-promote. I assume you have a
couple of GCs per domain.
Cheers
Ken
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, 15 September 2009 10:03 PM
To: NT System
So get a workstation with a 4 bay sata hot swap. Basically for the price I
would take a handful of sata drives over tapes. By the time you get a fast
library that can keep up your in the multi thousands.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
DC's are GC's...
So there are plenty of those.
Z
Edward Ziots
Network Engineer
Lifespan Organization
MCSE,MCSA,MCP+I, ME, CCA, Security +, Network +
ezi...@lifespan.org
Phone:401-639-3505
From: Ken Schaefer [mailto:k...@adopenstatic.com]
Sent:
Laugh I can make more per-hour playing 1-2 NL poker at Foxwoods...
Z
Edward Ziots
Network Engineer
Lifespan Organization
MCSE,MCSA,MCP+I, ME, CCA, Security +, Network +
ezi...@lifespan.org
Phone:401-639-3505
From: Benjamin Zachary - Lists
Extract the drivers, and look for the HPBPRO and HBOID.exe files, and
the HP Port resolver and HP Status Server Services on your print server
( use a VM with a snap pre and post driver installation) then test.
I would probably side to yes they still have a problem, but without
testing I cant say
PGP was eval'd here, and it may be selected for Macs.
Currently we are using PointSec for Windows with integrated logon.
-sc
From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, September 15, 2009 1:17 PM
To: NT System Admin Issues
Subject: Anyone using PGP encryption?
About
Also, if the user has selected a program to view media on the USB drive
previously like photo viewer, etc... and checked the always box,
that could be what's wanting to run whenever a key is plugged in...
-sc
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent:
Didn't want to hijack the recent thread, but here's a fairly
comprehensive list of offerings for it:
http://www.full-disk-encryption.net/Full_Disc_Encryption.html
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
That list seems to be lacking a lot of the hardware offerings. TrueCrypt is
not even listed either.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Wednesday, September 16, 2009 8:47 AM
To: NT System Admin Issues
Subject: Full Disk Encryption
Didn't want to
Thanks Kurt, I see they updated that page from the last time I used it, but
that's what I used when I was evaluating. Oddly McAfee's solution isn't on
there.
Hey there's a Full Disk Encryption mailing list, cool.
Dave
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
I don't know if it was already covered in this thread, but if you're using Disk
backup (a NAS device) aren't you burning up a lot more space with Full/Diffs vs
Full/Incr ?
Don K
- Original Message
From: David Lum david@nwea.org
To: NT System Admin Issues
But now wouldn't eSATA be a good alternative ? I haven't benchmarked
throughput but *should* be as good as internal, right ?
Erik Goldoff
IT Consultant
Systems, Networks, Security
-Original Message-
From: Ken Schaefer [mailto:k...@adopenstatic.com]
Sent: Tuesday, September 15,
Not necessarily. You have to manually make a DC a GC.
Bob C.
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Wednesday, September 16, 2009 9:06 AM
To: NT System Admin Issues
Subject: RE: Question on Upgrade process
DC's are GC's...
So
In this network they are, was done when it was set up.
Z
Edward Ziots
Network Engineer
Lifespan Organization
MCSE,MCSA,MCP+I, ME, CCA, Security +, Network +
ezi...@lifespan.org
Phone:401-639-3505
From: Chyka, Robert [mailto:bch...@medaille.edu]
You would think esata throughput would be much better. I am looking at a
promise tx4302 pci card that specs 3gb/sec for esata. This is for both
the internal connectors and external.
-Original Message-
From: Erik Goldoff [mailto:egold...@gmail.com]
Sent: Wednesday, September 16, 2009 8:20
He's referring to his own DC's. He's the OP, and is referring to himself.
--
ME2
On Wed, Sep 16, 2009 at 10:21 AM, Chyka, Robert bch...@medaille.edu wrote:
Not necessarily. You have to manually make a DC a GC.
Bob C.
--
*From:* Ziots, Edward
Well, it's still less space than Full/Full/Full...
I believe the situation was, someone needing to do a big restore found
that incremenatals were excremental.
--
Richard D. McClary
Systems Administrator, Information Technology Group
ASPCA®
1717 S. Philo Rd, Ste 36
Urbana, IL 61802
So is Symantec Endpoint Encryption, but that could be a good thing.
We're in the process of rolling it out to remote users, large failure rate
of machines not bootable after installing it.
seems to have settled down now, but was a nightmare at the start.
Regards
Tony Patton
Desktop Operations
Yes, potentially.
But, the primary goal of backups is recovery. You have to balance the
ongoing space needs with the time to restore.
With a disk only solution, speed is a little more in your favor, but using
DIFFs rather than INCR backups still gives you the advantage if one
particular day's
Anyway I can block a device from obtaining an IP address from our DHCP
scope? I have a rogue IPhone that appears intermittently on my DHCP range. I
haven't managed to find out who it is yet but if I do I will be sure to
address it via HRturning off the wireless unfortunately is not an
option.
Sure. can you get the MAC address of that device? If so, just give it a
static assignment that is bad and you're all set. J Not quite what you had
in mind, but it works quite well. J
John-AldrichTile-Tools
From: James Rankin [mailto:kz2...@googlemail.com]
Sent: Wednesday, September 16,
Thanks ME2...
Z
Edward Ziots
Network Engineer
Lifespan Organization
MCSE,MCSA,MCP+I, ME, CCA, Security +, Network +
ezi...@lifespan.org
Phone:401-639-3505
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Wednesday, September 16,
Agreed just grab the Mac address and give it the address 127.0.0.1 as a
reservation with the same address as the gateway. Lots of fun.
Jon
On Wed, Sep 16, 2009 at 11:10 AM, John Aldrich jaldr...@blueridgecarpet.com
wrote:
Sure… can you get the MAC address of that device? If so, just give it
Cheers, I did have some thoughts down that route, but didn't know whether
you could give it a bad address in terms of the scope or not. Shows you
how long it is since I set up any DHCP stuff. Let's wait for the support
call from the idiot telling me he can't access the internet from work with
his
You could give it a bogus address, then use an alert system to ping that
address (if it will return one) to let you know to go hunting.
On Wed, Sep 16, 2009 at 10:26 AM, James Rankin kz2...@googlemail.comwrote:
Cheers, I did have some thoughts down that route, but didn't know whether
you
You should be able to setup a reservation for it, where the router/DNS
and IP are all the same. That way the machine doesn't know how to get
anywhere other than local. Naturally, this type of thing doesn't
prevent someone from manually setting the IP config, but nothing you do
in DHCP will.
Do I infer correctly that you have a wide open Wi-Fi in your office? I
am inferring as much because you say someone is able to get on your
network with an iPhone. If so, IMHO you really should look into some
kind of NAC (network admission control) solution.
Yes, and a royal PITA it is too. I am working on getting it secured, but
changing the minds of directors and managers always takes time.
2009/9/16 Mayo, Bill bem...@pittcountync.gov
Do I infer correctly that you have a wide open Wi-Fi in your office? I
am inferring as much because you say
*evil grin* Yup.that's exactly what you do. THEN you can report 'em to HR! J
John-AldrichTile-Tools
From: James Rankin [mailto:kz2...@googlemail.com]
Sent: Wednesday, September 16, 2009 11:27 AM
To: NT System Admin Issues
Subject: Re: Block device from DHCP scope
Cheers, I did have
+1
Sandbox the MAC.
--
ME2
On Wed, Sep 16, 2009 at 11:10 AM, John Aldrich jaldr...@blueridgecarpet.com
wrote:
Sure… can you get the MAC address of that device? If so, just give it a
static assignment that is “bad” and you’re all set. J Not quite what you
had in mind, but it works quite
You might be able to put the MAC address of the phone in your firewall or
something to prevent it from accessing the outside world. That would also
mess 'em up. J
John-AldrichTile-Tools
From: Mayo, Bill [mailto:bem...@pittcountync.gov]
Sent: Wednesday, September 16, 2009 11:35 AM
To: NT
Yes. Actually the first DIFF after a full is the same size as an INCR, but they
do get bigger over time but not all that much. In my experience unless someone
touches a huge file the Friday DIFF is only a couple % bigger than the Monday
DIFF. Also as mentioned it's far smaller than FULL/FULL.
Pointsec on the Windows side...
From: Steven M. Caesare scaes...@caesare.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Wednesday, September 16, 2009 8:13:40 AM
Subject: RE: Anyone using PGP encryption?
PGP was eval’d here, and
Same here - lot of failures on laptops initially and lot of random blue screens.
And, our policy is that no large amount of time is spent trying to fix one if
the encryption renders the disk corrupted or unreadable. The corrupted systems
gets a quick diag to check hardware, then if 5 minutes of
Weird.
When I checked it a few months ago, it seemed bigger.
Wonder what happened...
On Wed, Sep 16, 2009 at 07:05, Sam Cayze sam.ca...@rollouts.com wrote:
That list seems to be lacking a lot of the hardware offerings. TrueCrypt is
not even listed either.
-Original Message-
From:
Can you do MAC filtering?
From: James Rankin [mailto:kz2...@googlemail.com]
Sent: Wednesday, September 16, 2009 10:07 AM
To: NT System Admin Issues
Subject: Block device from DHCP scope
Anyway I can block a device from obtaining an IP address from our DHCP
That may work for POTS lines, but is not as reliable if calling from a PBX, or
a line that is tied to a toll free number. You can't even rely on the number
written on the wall jack at the DMARC (as I found out yesterday).
If you happen to know a field technician at the local telecom, they have
Update on our problem.
User could not run taskmanger, logoff and shutdown were also grayed out.
Winxp sp3 on a AD domain.
This problem was caused by the latest update to the non paid LogMeIn
program.
User uninstalled it and everything went back to normal.
It kinda looked like he was logged in
Problem we have, is that the laptops/desktops in question do not belong to
the company.
They are the personal equipment of the claims managers, about 98% never
set foot in any of the site.
Doesn't help that most are thicker than molasses when it comes to
following very simple instructions.
What you may want is an ANAC number which tells you the phone number for a
particular line.
http://en.wikipedia.org/wiki/Automatic_number_announcement_circuit
-Original Message-
From: Klint Price [mailto:kpr...@arizonaitpro.com]
Sent: Wednesday, September 16, 2009 9:46 AM
To: NT
Uh... ya.
-sc
-Original Message-
From: Miguel Gonzalez [mailto:miguel_3_gonza...@yahoo.es]
Sent: Wednesday, September 16, 2009 2:23 AM
To: NT System Admin Issues
Subject: RE: Disk based backup
are LTO4 already in the market? We are getting info that won't be
available until
I am in the testing phase of rolling out My Docs offline sync via GPO. Is there
a good way to exclude the My Music folder? Or does anyone have a good list of
files to exclude?
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
In the GPO don't move my music, leave it behind on the local machine. Same with
My Pictures if that suits your needs.
From: Chris Blair [mailto:chris_bl...@identisys.com]
Sent: Wednesday, September 16, 2009 2:02 PM
To: NT System Admin Issues
Subject: My Docs Redirection
I am in the testing
I think in the GPO, you can select that you don't want the music folders
redirected...
On Wed, Sep 16, 2009 at 1:01 PM, Chris Blair chris_bl...@identisys.comwrote:
I am in the testing phase of rolling out My Docs offline sync via GPO. Is
there a good way to exclude the “My Music” folder? Or
Start off with *.mp3, *.wma, *.wav. J
John-AldrichTile-Tools
From: Chris Blair [mailto:chris_bl...@identisys.com]
Sent: Wednesday, September 16, 2009 2:02 PM
To: NT System Admin Issues
Subject: My Docs Redirection
I am in the testing phase of rolling out My Docs offline sync via GPO.
starting a new elevated explorer instance from an elevated CMD prompt
may work too.
-sc
From: Jonathan Link [mailto:jonathan.l...@gmail.com]
Sent: Tuesday, September 15, 2009 10:02 PM
To: NT System Admin Issues
Subject: Re: Vista UAC FRV virtualization without AAM
IIRC, you need to
I somehow missed that. Thanks!
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Wednesday, September 16, 2009 1:05 PM
To: NT System Admin Issues
Subject: RE: My Docs Redirection
In the GPO don't move my music, leave it behind on the local machine. Same with
My Pictures if that
I've created a virtual machine and want to test VIPRE and perhaps another
a/v solution against real malware.
What sites can I hit that'll try to push various malware infections?
Roger Wright
___
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
Klint, unless Caller ID blocking is in use, you could always make a call
to your own cellphone and the number will display. Frankly, it can be
slow getting an operator, and I'm not entirely sure they will always be
cooperative. What could be simpler than calling your own
cellphone...if you
Nytimes.com
http://bits.blogs.nytimes.com/2009/09/14/times-site-was-victim-of-a-mali
cious-ad-swap/
From: Roger Wright [mailto:rhw...@gmail.com]
Sent: Wednesday, September 16, 2009 2:52 PM
To: NT System Admin Issues
Subject: Real a/v Testing
I've created a virtual machine and want
Murray,
While it is true that a number will come through on Caller ID, it is not
necessarily going to be the actual number from which a call was placed. If I
make an outbound call from my company phone to my mobile phone, Caller ID shows
it as coming from the company's main line not from my
facebook, youtube, myspace... :-)
From: Roger Wright [mailto:rhw...@gmail.com]
Sent: Wednesday, September 16, 2009 1:52 PM
To: NT System Admin Issues
Subject: Real a/v Testing
I've created a virtual machine and want to test VIPRE and perhaps
another a/v
___
__ Information from ESET NOD32 Antivirus, version of virus
signature database 4431 (20090916) __
The message was checked by ESET NOD32 Antivirus.
http://www.eset.com
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http
You could also do a fresh XP installation, hook it to the internet, and
run absolutely no updates, patches, etc. In a couple of weeks, try to
figure out who really owns it.
Maglinger, Paul pmaglin...@scvl.com wrote on 09/16/2009 02:20:38 PM:
facebook, youtube, myspace... :-)
From: Roger
Interesting because if I make a call from my office, it gives the actual
phone number of my direct dial line.
Murray
-Original Message-
From: Tim Vander Kooi [mailto:tvanderk...@expl.com]
Sent: Wednesday, September 16, 2009 2:12 PM
To: NT System Admin Issues
Subject: RE: Phone
Does anybody here have any experience or knowledge of Symantec's Endpoint
Virtualization Suite?
Our sys admin and clinical analyst met with a vendor who is pushing this
product.
We're a small hospital (90 bed) but with the new HITECH initiatives, we need
to, eventually, implement electronic
weeks = minutes (and quite possibly seconds)
From: richardmccl...@aspca.org [mailto:richardmccl...@aspca.org]
Sent: Wednesday, September 16, 2009 3:26 PM
To: NT System Admin Issues
Subject: RE: Real a/v Testing
You could also do a fresh XP installation, hook it to the internet, and
run
That was happening to us when we switch phone providers. They had to modify
their system to send our main number as the only CID going out.
-Original Message-
From: Murray Freeman [mailto:mfree...@alanet.org]
Sent: Wednesday, September 16, 2009 3:32 PM
To: NT System Admin Issues
4431 (20090916) __
The message was checked by ESET NOD32 Antivirus.
http://www.eset.com
__ Information from ESET NOD32 Antivirus, version of virus
signature database 4431 (20090916) __
The message was checked by ESET NOD32 Antivirus.
http://www.eset.com
sites can I hit that'll try to push various malware infections?
Roger Wright
___
__ Information from ESET NOD32 Antivirus, version of virus
signature database 4431 (20090916) __
The message was checked by ESET NOD32 Antivirus.
http://www.eset.com
It depends on how your phone system is configured and, in some cases,
how your telco has their end configured. Any modern phone system has
rules that govern how your phone number is displayed (or not) to outside
systems. To know whether this is an effective methodology or not, you
need to talk
___
__ Information from ESET NOD32 Antivirus, version of virus
signature database 4431 (20090916) __
The message was checked by ESET NOD32 Antivirus.
http://www.eset.com blockedhttp://www.eset.com
__ Information from ESET NOD32 Antivirus, version of virus
signature database 4431 (20090916
Thanks, all. P0Rn sites, screensavers, warez, should give me some real
tests.
I thought there'd be a site like www.infectmenow.com but I didn't have
access to it.
Roger Wright
___
On Wed, Sep 16, 2009 at 2:51 PM, Roger Wright rhw...@gmail.com wrote:
I've created a virtual machine and
When we changed LD companies, they asked what we wanted as our caller ID
for our dial-out lines. I believe I gave them our local number, so it's not
necessarily what you've got as your incoming number.
-Original Message-
From: Murray Freeman [mailto:mfree...@alanet.org]
Sent:
solution against real malware.
What sites can I hit that'll try to push various malware infections?
Roger Wright
___
__ Information from ESET NOD32 Antivirus, version of virus signature
database 4431 (20090916) __
The message was checked by ESET NOD32
Somehow I am still missing that... where is this setting?
From: Chris Blair [mailto:chris_bl...@identisys.com]
Sent: Wednesday, September 16, 2009 2:44 PM
To: NT System Admin Issues
Subject: RE: My Docs Redirection
I somehow missed that. Thanks!
From:
TVK is correct in stating that you will get *a* phone number, not
necessarily the one you expect.
This is especially true for those using an ISDN PRI from a telco. The
phone number that shows up on caller ID is set by the phone system that
originated the call (or sometimes the telco themselves).
http://freepcsecurity.co.uk/2009/01/16/list-of-known-malicious-sites/
From: Roger Wright [mailto:rhw...@gmail.com]
Sent: Wednesday, September 16, 2009 3:47 PM
To: NT System Admin Issues
Subject: Re: Real a/v Testing
Thanks, all. P0Rn sites, screensavers, warez, should give me some
Hellos to all..
Anyone out there have any template type spreadsheets on budgets that can be
shared out. If so, they would be appreciated.. We are reviewing ours and are
looking for other minds and ideas.
Thanks.
CAR
This e-Mail and any files transmitted
Now you have a legit excuse... :-)
From: Roger Wright [mailto:rhw...@gmail.com]
Sent: Wednesday, September 16, 2009 2:47 PM
To: NT System Admin Issues
Subject: Re: Real a/v Testing
Thanks, all. P0Rn sites, screensavers, warez, should give me some real
tests.
Here's another one:
http://www.malwaredomains.com/
From: Richard Stovall
Sent: Wednesday, September 16, 2009 3:51 PM
To: 'NT System Admin Issues'
Subject: RE: Real a/v Testing
http://freepcsecurity.co.uk/2009/01/16/list-of-known-malicious-sites/
From: Roger Wright
It is part of the spiffy newer group policy preferencesdo you have those
deployed?
UserPoliciesFolder Redirection. You set Documents there then in the same
area the other folders are listed. Hit them and tell them what to do there.
From: David Mazzaccaro
database 4431 (20090916) __
The message was checked by ESET NOD32 Antivirus.
http://www.eset.com
__ Information from ESET NOD32 Antivirus, version of virus signature
database 4431 (20090916) __
The message was checked by ESET NOD32 Antivirus.
http://www.eset.com
Paul,
Full disclosure - I work for Symantec and use this set of products everyday.
Symantec basically took 3 stand alone products, (Altiris Software
Virtualization Solution + AppStream + nSuite) and combined the three
together into a better product with a much more confusing name. The
main goal
Guess not... where can I get those?
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Wednesday, September 16, 2009 3:58 PM
To: NT System Admin Issues
Subject: RE: My Docs Redirection
It is part of the spiffy newer group policy preferencesdo
LOL
--
ME2
On Wed, Sep 16, 2009 at 2:54 PM, Richard Stovall
richard.stov...@researchdata.com wrote:
Nytimes.com
http://bits.blogs.nytimes.com/2009/09/14/times-site-was-victim-of-a-malicious-ad-swap/
*From:* Roger Wright [mailto:rhw...@gmail.com]
*Sent:* Wednesday, September 16,
If you dont see the setting, upgrade your GPO's to 2008 levels... Or you
can add/make custom .ADM's.
--
ME2
On Wed, Sep 16, 2009 at 3:39 PM, David Mazzaccaro
david.mazzacc...@hudsonhhc.com wrote:
Somehow I am still missing that... where is this setting?
--
whitepages.com
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Wednesday, September 16, 2009 4:24 PM
To: NT System Admin Issues
Subject: Re: Real a/v Testing
LOL
--
ME2
On Wed, Sep 16, 2009 at 2:54 PM, Richard Stovall
http://technet.microsoft.com/en-us/library/cc731892(WS.10).aspx
I just deployed the client for the XP workstations today via WSUS.
On Wed, Sep 16, 2009 at 4:23 PM, David Mazzaccaro
david.mazzacc...@hudsonhhc.com wrote:
Guess not... where can I get those?
--
We're using a PRI here, and it displays the actual extension from which
the call was made and not the master corporate number. BTW, while we
have a master number xxx.xxx.1252, the wonderful ATT have us as
xxx.xxx.0776, and that number if dialed will connect to xxx.xxx.1252.
The 0776 never shows up
Check out this article
How to prevent folders from roaming with a profile in Windows Server 2003
http://support.microsoft.com/kb/814592
Mike
Original Message:
-
From: Chris Blair chris_bl...@identisys.com
Date: Wed, 16 Sep 2009 13:44:21 -0500
To:
I wouldnt say it could be anything.
IIRC, if your equipment is incapable of sending ANI [1] or it isnt properly
communicated outward, then your LEC [2] provides the BTN [3] off the primary
line; which is typically the main business number for the account.
1. Automatic Number Identification
2.
Has anyone else looked at abandoning Cisco for their firewall? We have
PIXs and they are trying to get us to move to ASA now that they are
phasing out. The ASA is very expensive and from what I hear, very
complicated to manage.
We are a medium sized business and do not need this IMHO.
Has anyone
Don't let Dr. Tom here you say you're moving away from ASA...
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Expensive? Our Pix cost over $8000 in 2001, we bought *2* ASA's to
replace it and still paid less than that in 2007. There are some
differents in the OS between the Pix and ASA, but they are very similar.
If you can manage a Pix, you can manage an ASA--at least in my
experience.
IMO the ASA was easier to setup and manage than the PIX.
Jon
On Wed, Sep 16, 2009 at 4:58 PM, mqcarp mqcarpen...@gmail.com wrote:
Has anyone else looked at abandoning Cisco for their firewall? We have
PIXs and they are trying to get us to move to ASA now that they are
phasing out. The ASA is
As Bill pointed out the price is much lower. Ours was about 1/3rd the price
of the PIX.
Jon
On Wed, Sep 16, 2009 at 5:13 PM, Jon Harris jk.har...@gmail.com wrote:
IMO the ASA was easier to setup and manage than the PIX.
Jon
On Wed, Sep 16, 2009 at 4:58 PM, mqcarp mqcarpen...@gmail.com
Correctly sized cisco devices are cost-effective. If you're using any other
cisco gear (routers, switches, etc), I'd recommend staying with them.
Interop with other vendors' products can be a nightmare. We've got a few
clients with things like watchguards and when they have to talk to a cisco
box,
To compound the problem, carriers are slow to update their ANI lists, so if you
make a change to the CLID associated with a toll free number, it can take
several months to propagate, and in many cases has to be done at the carrier
level.
For instance, my previous employer had a PBX which
I concur with what both Bill and Jon have said. In addition, if you are a
smaller company, or have a smaller budget, I would consider purchasing from a
grey-market retailer like Network Hardware (you can have Smartnet added to your
order).
Klint
-Original Message-
From: Mayo, Bill
Depends on the phone system and the carrier. On a Nortel Norstar with
multiple PRI T-1s I use to admin the number displayed was the main
office/billing number. They started another company and wanted a different
number displayed for the new company. Called the LEC and had them make sure
it passed
That is not the response I expected. The NSA devices are pretty robust
and could handle anything we have here. I have not seen an ASA quote
yet, so I will have to wait for that.
On Wed, Sep 16, 2009 at 4:15 PM, Klint Price kpr...@arizonaitpro.com wrote:
I concur with what both Bill and Jon have
The ASA don't seem much more complicated than the PIX.
That said, I have always been a fan of the Juniper Netscreen firewalls.
SonicWall isn't a bad choice, either.
What size network are you supporting in terms of bandwidth, number of
interfaces, and total devices?
-ASB:
The ASA is a natural progression from a PIX to me ... And I wouldn't say
very complicated to manage if you're already used to the way Cisco does
things ...
Pricewise, the Cisco ASA starts under $400 , that's comparable to Juniper,
and I guess Sonicwall too ... I haven't touched a sonicwall in 5
Quick comparisons for price from the CDW site :
ASA 5505 : http://www.cdw.com/shop/products/default.aspx?EDC=1065037
Sonicwall TZ 170 :
http://www.cdw.com/shop/products/default.aspx?EDC=1352392
Netscreen 5GT : http://www.cdw.com/shop/products/default.aspx?EDC=780124
Juniper SSG5 :
On Wed, Sep 16, 2009 at 13:58, mqcarp mqcarpen...@gmail.com wrote:
Has anyone else looked at abandoning Cisco for their firewall? We have
PIXs and they are trying to get us to move to ASA now that they are
phasing out. The ASA is very expensive and from what I hear, very
complicated to manage.
1 - 100 of 110 matches
Mail list logo