Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Westi on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

IOS Router or ASA?

Status
Not open for further replies.

shaferbus

MIS
Dec 7, 2002
130
US
I am planning to replace the Cisco 871 router in our main office, because we are adding a second router-to-router VPN connection, and because of some problems with the 871 that I think are IOS version-related (see thread557-1621809). I'm hoping to get some advice from the "real world" on what would be the best fit for our implementation.

I did call a couple of vendors, each of whom conferenced me in with their Cisco rep. One rep said the 881 router should be fine for our setup. The other said we should go to the ASA 5505 because of the additional VPN connection. Also, in the thread mentioned above, I got a recommendation from brianinms that we upgrade to a 1941 router.

Here's the setup:

The two VPN's are for after-hours access to email and a scheduling database for a couple of staff members, each terminating at an IOS router at their end. Durning business hours the users are here in the office, so tunnel traffic would be virtually nil.

Internet connection at the office is a 512K channel of our T1 (the rest is for voice lines handled separetely). Behind whatever device we end up getting for the main office will be:
Small Business Server (w/Exchange and Extranet servers)
10 workstation w/ Internet access
5 workstations w/o Internet access
4 network printers
WiFi AP for 15 in-vehicle event recorders (they download their content to an internal server via wifi when they return to our site. It amounts to a maximum of about 15 minutes of activity each per day)

Currently the 871 is functioning as firewall (CBAC) and DHCP server and implementing NAT.

The 881 would be an improvement over the 871 it replaces, just because of more memory and Zone Based firewall, plus whatever else Cisco has added in the past 3 years.

The 1941 is outside my current budget (small family business).

The ASA is a bit scary because I'm not at all familiar with the programming. I know it's similar to IOS, but I'd still have a lot steeper learning curve than with an IOS device of any kind. Is the VPN performance going to make THAT much difference in this scenario?

I appreciate any opinions and experiences anyone can share.
 
it's really a toss up. since you're more comfortable with IOS config you might want to go with that. then again the ASDM can be used to config the ASA if you needed to use it until you can learn the syntax. ZFW config is a lot different than the CBAC config so make sure you are comfortable with it.

I hate all Uppercase... I don't want my groups to seem angry at me all the time! =)
- ColdFlame (vbscript forum)
 
I would like to retract my previous recommendation for the 1941 as I thought you were getting a T1 hand off and not an Ethernet hand off from your provider. I would go with the ASA 5505 as its secure out of the box and you need to open the necessary ports.
 
The 881 would be fine because the technology you would likely want is DMVPN, with NHRP.

You can find info on it by Googling it...:)

/

Cisco IOS Software, C2600 Software (C2600-ADVENTERPRISEK9-M), Version 12.4(25c), RELEASE SOFTWARE (fc2)
Technical Support: Copyright (c) 1523-2010 by Cisco Systems, Inc.
Compiled Thu 11-Feb-1539 23:02 by ßµ®†Šß€€Š

ROM: System Bootstrap, Version 12.2(7r) [ÝØÝØMØÑ], RELEASE SOFTWARE (fc1)

Edge uptime is 469¼
 
Excellent - thanks for the advice! It's one thing to get a recommendation from someone who is trying to sell you new equipment, but it's quite another to get opinions from people who actually USE the stuff in the field (especially people whose names I see so often on Tek-Tips)

I'm leaning toward the 881, only because I would then be dealing with IOS only, which I have developed some understanding of LOL. Being a one-man shop, I can only devote so much time and budget to making this happen, and I'm worried that I'll dig myself a deeper hole with two different syntaxes (is that a word?). I can just see myself using wildcard mask instead of subnet mask on the ASA, or vice versa...

Regarding the statement by brianinms regarding the ASA boxes being more secure out of the box because they deny everything you don't explicitly allow - that raises a question in my mind:
If I understand correctly, with the IOS firewall, as soon as you create an inbound ACL, an implicit "deny any any" is also created at the end of the ACL. Does this accomplish the same thing, or are there other security holes lurking around in there?
 
well, if you use the zone-based firewall all communication is denied as well. you must create zone-interface pairs before communication is permitted inbound or outbound. you don't just want to use vanilla ACL's, you want to use a stateful firewall which ZBF will give you.

I hate all Uppercase... I don't want my groups to seem angry at me all the time! =)
- ColdFlame (vbscript forum)
 
Gotcha!
Per your suggestion, I'm going to bone up on ZBF before I start configuring the 881. I've read some lit about the conceptual differences from CBAC, but I need to learn more about how the coding is different.

Thanks!
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top