ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    VPN hardware suggestions.

    Scheduled Pinned Locked Moved IT Discussion
    23 Posts 10 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @Dashrender
      last edited by

      @Dashrender said in VPN hardware suggestions.:

      @siringo said in VPN hardware suggestions.:

      Thanks Scott. These sites don't always have staff, so it'd be good to be able glance at something to make sure everything is still up.

      I'll take a look at the Unifi stuff.

      If there is no staff, why does it matter if it's up?
      That said you could use other things to test the VPN status - like a ping test.

      Which is a better test, anyway.

      1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @siringo
        last edited by

        @siringo said in VPN hardware suggestions.:

        Thanks Scott. These sites don't always have staff, so it'd be good to be able glance at something to make sure everything is still up.

        I'll take a look at the Unifi stuff.

        You'll want pings for that. A VPN GUI isn't as reliable as monitoring at the network level. You don't want a GUI that shows things up, you want monitoring that alerts when things go down. A GUI that shows up would only be beneficial if you had excess IT staff with nothing to do with their time and you were trying to keep them busy. Since you have less staff than you'd like, it's monitoring that you need so that you don't have to worry about it until an alarm goes off.

        1 Reply Last reply Reply Quote 2
        • hobbit666H
          hobbit666 @Dashrender
          last edited by

          @Dashrender said in VPN hardware suggestions.:

          That said you could use other things to test the VPN status - like a ping test.

          That's what we do with our MPLS sites just use zabbix to ping all endpoints see if they are "up" and notify when down

          scottalanmillerS 1 Reply Last reply Reply Quote 2
          • scottalanmillerS
            scottalanmiller @hobbit666
            last edited by

            @hobbit666 said in VPN hardware suggestions.:

            @Dashrender said in VPN hardware suggestions.:

            That said you could use other things to test the VPN status - like a ping test.

            That's what we do with our MPLS sites just use zabbix to ping all endpoints see if they are "up" and notify when down

            Yup, just keep doing that with a VPN. A point to point VPN system should require you to change nothing from the MPLS setup. MPLS is built to mimic standard VPN setups. It's all the same to the network user level of things.

            1 Reply Last reply Reply Quote 1
            • iroalI
              iroal
              last edited by iroal

              I like Pfsense, I use it with Openvpn with good results.

              Last version includes Wireguard support.

              1 Reply Last reply Reply Quote 0
              • siringoS
                siringo
                last edited by

                Thanks everyone for the help. I'll look into everything mentioned.

                J 1 Reply Last reply Reply Quote 0
                • J
                  JasGot @siringo
                  last edited by JasGot

                  @siringo said in VPN hardware suggestions.:

                  Thanks everyone for the help. I'll look into everything mentioned.

                  Some of the comments would lead you to believe Sonicwall is not a good solution, either from central management issues or license fees.

                  I can't speak to the central management issues because we've chosen to not bother with it.

                  We have about 350 Sonicwalls in the field and nearly all of them have S2S VPNs setup among branches, as well as Global VPN setup for remote users (there is a fee for the Global VPN license).

                  Every one of them has a VPN into our lab for end user support. I fired up #7 to get this screenshot.

                  As far as your main question about reliable VPN end points, I have been happy with the Sonicwall devices. I like their "Wizard" setups for staff that are new to Sonicwall. It makes a S2S VPN about a 5 minute task (for both sides, not each side, but then, that would still only be 10 minutes!)

                  We also use the IP Tunnel connections in the Sonicwall when we need to control routing, ie not hub and spoke type routing.

                  The appliances can be pricey if you want to take full advantage of todays high speed broadband, but overall, we have been very satisfied with the products, especially the VPN stability.

                  Here's a SS of one:
                  No special/Add-on licensing; note the 1000 S2S VPNs allowed and the 12 Global VPNs allowed.
                  This Sonicwall does have 60 VPN Clients licensed to it, about 45 are in use daily.

                  5dd6782e-209c-4bc2-afd5-72ee1d55d99e-image.png

                  siringoS 1 2 Replies Last reply Reply Quote 2
                  • siringoS
                    siringo @JasGot
                    last edited by

                    @JasGot Thanks for the help, there's some real world product experience there, which I can use. I appreciate the effort. Thanks.

                    1 Reply Last reply Reply Quote 0
                    • 1
                      1337 @JasGot
                      last edited by 1337

                      @JasGot said in VPN hardware suggestions.:

                      5dd6782e-209c-4bc2-afd5-72ee1d55d99e-image.png

                      @JasGot On a side note aren't you running insecure cryptos?
                      I thought 3DES-HMAC-SHA1 was considered obsolete and insecure.

                      Normally you'd see something like AES-CBC-256-SHA256 or AES-GCM-256-SHA256.

                      J 1 Reply Last reply Reply Quote 0
                      • J
                        JasGot @1337
                        last edited by

                        @Pete-S said in VPN hardware suggestions.:

                        thought 3DES-HMAC-SHA1 was considered obsolete and insecure.
                        Normally you'd see something like AES-CBC-256-SHA256 or AES-GCM-256-SHA256.

                        It is. I had it changed right after I took the screen shot. It's an HR problem. 🙂

                        DashrenderD 1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @JasGot
                          last edited by

                          @JasGot said in VPN hardware suggestions.:

                          @Pete-S said in VPN hardware suggestions.:

                          thought 3DES-HMAC-SHA1 was considered obsolete and insecure.
                          Normally you'd see something like AES-CBC-256-SHA256 or AES-GCM-256-SHA256.

                          It is. I had it changed right after I took the screen shot. It's an HR problem. 🙂

                          I'm curious - how is that an HR problem?

                          J 1 Reply Last reply Reply Quote 0
                          • J
                            JasGot @Dashrender
                            last edited by JasGot

                            @Dashrender said in VPN hardware suggestions.:

                            I'm curious - how is that an HR problem?

                            Employee didn't complete assigned duties.

                            1 Reply Last reply Reply Quote 0
                            • 1
                            • 2
                            • 2 / 2
                            • First post
                              Last post