The Cisco Firepower® 1000 Series for small to medium-size businesses and branch offices is a family of four threat-focused Next-Generation Firewall (NGFW) security platforms designed to deliver business resiliency through superior threat defense. The vendor provides that they offers exceptional sustained performance when advanced threat functions are enabled. The 1000 Series’ throughput range addresses use cases from the small office, home office, remote branch office to the Internet edge. The…
N/A
pfSense
Score 8.9 out of 10
N/A
pfSense is a firewall and load management product available through the open source pfSense Community Edition, as well as a the licensed edition, pfSense Plus (formerly known as pfSense Enterprise). The solution provides combined firewall, VPN, and router functionality, and can be deployed through the cloud (AWS or Azure), or on-premises with a Netgate appliance. It as scalable capacities, with functionality for SMBs. As a firewall, pfSense offers Stateful packet inspection, concurrent…
I faced a lot of issues with pfSense. The configuration was very difficult through the dashboard and there were a lot of bugs. Cisco Firepower 1000 Series provides all the security features. I am very happy with this series and its features.
I think it is well suited for smaller companies or (as in our case) extension to a central system with higher performance. My personal guess is, that it can be quite annoying with those delays in bigger environments, when 20 or more devices needed to be managed. From the point of security, support and updates it works quite good and seem to have no downsides.
For fast-growing or SME companies, pfSense is quite suitable because pfSense already had many advanced features such as VPN and multiple WAN / LAN. As a result, we just need to pay for expensive router frequently to upgrade our infrastructure.
My organization is all Cisco and wants to stay in the Cisco life cycle, Firepower 1000 series is great for small to medium-size office.
Very robust enterprise-grade security solution with updated threat features to handle any current and upcoming threats. The solution is backed by Cisco to ensure constant security updates. Integrated AnyConnect remote client VPN is a big plus to allow for secure remote workers access. Easier to set up a site to site VPN due to the large user base and case studies published on integrating to other manufacturer solutions.
pfSense is an excellent firewall - It logs all of your traffic. It has packages you can install to snort bad traffic.
pfSense has a tool called "p0f" which allows you to see what type of OS is trying to connect to you. You can filter these results and you can also block a specific OS from connecting to you.
pfSense is an excellent load-balancer: (Multi-WAN and Server Load Balancing) The fail-over/aggregation works very well. This is perfect if your business uses multiple ISP's to ensure your customers are always able to access their data. Also helps with bandwidth distribution as well.
VPN's - I am not entirely sure if this package was free with pfSense, but it does offer the ability to use OpenVPN which is what I am familiar with.
They also have IPsec in the settings as well, but I am not familiar with that enough to go into any detail with it.
As I mentioned I do use OpenVPN the only thing I don't care for with it is I can create OpenVPN configs for each user I want to be able to VPN into the network and I assumed each one would be "unique" but this does not seem to be the case. I could be doing it wrong, but if I create a config for a specific employee I would expect only that employee should be able to use that config, but I have been able to login to everyone that I made using my credentials.
I mentioned earlier that pfSense had a GUI.
I personally really think it is cool because it has a bunch of reporting graphs for monitoring your networks. I think when I become the full-time admin at the company I am going to try to talk them into getting me a TV I can mount on the wall and display all the graphs and real-time info pfSense shows so I can monitor what is going on with the network(s) at all times. Plus I think it would look rad.
There is no API for making changes. This can be a hindrance in environments where auto-deploying something needs firewall rules or HAProxy configs updated. Since all settings are stored in an XML file and then configs are generated from that, even manually updating config files cannot be done.
Beware that some network cards can have issues. pfSense is based on FreeBSD, so it's best to look on their compatibility list before deploying.
It is quite good, robust and reliable but not always so easy to manage and configure. The tools could be improved and the price is not low for an entry level firewall
Firepowers are secure, reliable, central management and configuration is easy and they fit in well with our existing Cisco infrastructure. Good feature set and support. Good management and control with chassis manager and central control with additional Firepower Management Centre.
Great performance even on the lower end model of the series. You can push a lot of traffic through these devices without much performance impact. If you decide you want to inspect encrypted traffic however, you may take a big hit on the cpu and memory of the box, but they still manage to keep up even with all the bells and whistles turned on.
I have had troubles with Firepower Management Center and the FTD's in the past. Sticking to a Gold Star image and upgrading when the "bugs" are fixed is great. That still doesn't mean you are left vulnerable though. The extra features are just not enabled yet. Great product and calling support is readily available for any issue.
Cisco Meraki MX is much more simple to configure it if you compare to Cisco Firepower 1000, but it is more limited to pur some complex configurations. The Cisco Firepower 1000 Series is typically deployed as a physical appliance, while the Meraki MX can be deployed as a physical or virtual appliance.The Firepower 1000 Series has a more complex user interface, with a steeper learning curve, but offers more customization and configuration options. The Meraki MX has a simpler, more intuitive interface,
Before pfSense we were using consumer and small business rated network appliances from Linksys, Cisco, Buffalo and Netgear. We were replacing them on average of every 6-12 months because they'd fail or would offer poor wifi availability. Switching to pfSense allowed us to use professional grade switches and wifi access points, offloading all of the services that the consumer grade products took care of, onto pfSense (DHCP, DNS, routing, firewall, VPN, etc).
It took several attempts with Cisco engineers to configure the device; it requires a deep set of knowledge to set up in a more complicated environment.
This will allow us to move forward with a more stable and configurable environment with security available we didn't have before.
Moving to a FWaaS solution installed on a decent computer the initial investment was moderate to cover 50 to 250 users, but still being cheaper that a Fortinet, Cisco ASA, or a Sophos UTM.
Paying only for support can be a double edge knife, cause you need to identify what's the goal of the request, or your drown into a an endless list of requirements.
To stay in the top with the half of a regular investment pFSense gives a wide variety of plugins that will give you a deep knowledge of your security flaws and strong points.