What exactly are you trying to accomplish with the appliance? IMO if you're using Active Directory you can control network access fairly effectively using the built-in options (IPSec, for example).
specifically, torm, my gripes about ALL conventional methods of network authentication are in the mechanisms. Ok for example, ms chap / radius / kerberos / central login server and AD all can control actions, down to the ability to use a printer. However, there's no ideal way in hosting an open wireless lobby (don't ask-it's a brilliant management thing) to prevent DHCP hijacking, password and identity stealing "sniffers," mac address cloning, inside floods or other crap without micromanaging at the switch level. SOOO... this is my alternative.
Ah ok, then the Cisco would work very well. I've been asked to do the same thing on a much smaller (and cheaper) scale and the Fortigate line of routers can authenticate all access against AD so you can limit available ports based on group membership or lack thereof. Their product line runs from SOHO right up into enterprise grade routers though so you might want to check 'em out (you'd gain IDS and definitions-based content management at the same time).
riddla wrote:fucking great shit that fortinet stuff
stable as all fuck too.
How are they for VPN stability? The two Netgear V318s that are connecting the sites now constantly have connection drops (usually in the middle of a backup transfer :icon8: )
fixed it all with a dmz, ftp server, mad scripts and some pinhole trickery. After paying for the secodary UPS, new hardware, and less 3 hours of sleep per night, the same thing was accomplished for about a tenth of the cost. :icon14:
Underpants? wrote:fixed it all with a dmz, ftp server, mad scripts and some pinhole trickery. After paying for the secodary UPS, new hardware, and less 3 hours of sleep per night, the same thing was accomplished for about a tenth of the cost. :icon14: