What are y'all doing for CALEA compliance?
eric at nixwizard.net
Thu Jul 4 18:21:54 UTC 2013
On Mar 15, 2013 11:37 AM, "Christopher Morrow" <morrowc.lists at gmail.com>
> On Fri, Mar 15, 2013 at 11:32 AM, Joshua Goldbard <j at 2600hz.com> wrote:
> > God I want one of those PA firewalls just to play with in the lab. I
> > justify the expense, but as far as firewalls go they're gorgeous. From
> > chassis to the UI, PA is just doing it right.
> > If anyone has a different experience, I'd love to hear it.
> for any firewall/appliance .. ask this:
> "How can I manage 200 of these things remotely"
> UI is pretty and nice and cool.. but utterly useless if you have more
> than 1 of the things.
> also, a firewall is a firewall is a firewall... they all do the basics
> (nat/filter/'proxy') nothing else in that category really matters...
> management matters.
I know I'm necro'ing a thread, but PA has a centralized management product
called Panorama. I threw up a Panorama VM the other day at work and I was
thoroughly impressed with how easy it was to set up ("establish SIC? What's
that?") and the slick management UI on Panorama that basically mirrors the
normal PA UI.
The App-ID thing that PA implemented *does* matter in my humble opinion...
being able to say "allow specifically traffic that looks and smells like
RADIUS" instead of "allow UDP 1812 and 1813" is neato
PA has had some rough edges (their client VPN solution for Windows and OSX
is not ready for prime time in my opinion) but this is one thing they
Chris Morrow - if it's in your budget you can pick up a PA200 on eBay for
like $1k. I've only played with PA over the year and a half I've been with
my current employer, but they've got a neat product. I've been tempted to
buy one for the house even honestly... having URL filtering, SSL decrypt,
SSH decrypt (via man-in-the-middle), App-ID, some basic DLP and even some
malware analysis (Wildfire) built right in is kind of compelling
More information about the NANOG