phoenix26
asked on
ASA & stone beat check point firewall
Hi all,
We are currently planning to replace existing 2 stone beat firewalls to 4 ASA firewalls.
It is already approved and needs to be completed with in 15 days.
I donot have much exposure towards stone beat firewalls.
1.Can any one help me with useful websites to learn about stone beat firewalls?
2.Any workaround to convert the stone beat firewalls to ASA firewalls?
Any suggestions from any one who have done this a project previously?
Please explain me starting from the scratch
Plss help asap
We are currently planning to replace existing 2 stone beat firewalls to 4 ASA firewalls.
It is already approved and needs to be completed with in 15 days.
I donot have much exposure towards stone beat firewalls.
1.Can any one help me with useful websites to learn about stone beat firewalls?
2.Any workaround to convert the stone beat firewalls to ASA firewalls?
Any suggestions from any one who have done this a project previously?
Please explain me starting from the scratch
Plss help asap
ASKER
Hi ,
Iam from singapore.
Can u please help me out through the process?
Kindly assist.
Many Thanks,
phoenix
Iam from singapore.
Can u please help me out through the process?
Kindly assist.
Many Thanks,
phoenix
I will assist as much as I can... Can you provide a "diagram" or "summary" of your network. I don't need to know the actual IP addresses, however you can give me site names instead of network addresses, etc.
Also tell me how your firewalls are configured, i.e. centrally configured and managed; independantly managed, with unique rule set on each firewall which is managed separately.
If you can provide any of the firewall policies, that would be helpful. I think at this point the most important part is understanding the relationship of the firewall to the enterprise.
Also tell me how your firewalls are configured, i.e. centrally configured and managed; independantly managed, with unique rule set on each firewall which is managed separately.
If you can provide any of the firewall policies, that would be helpful. I think at this point the most important part is understanding the relationship of the firewall to the enterprise.
WhackAMod -- thanks for the info, we will comply with that rule.
ASKER
Hi ,
We will comply by the rules
Iam sorry for my belated reply.Stuck up in my family commitments
Please find the diagrams where the stone beat firewall from below attachment.
Actually the configuration of stone beat firewall runs on 4 windows NT box and now we plan to replace this 4 with 4 ASA.
The stone beat firewall has rules in them for management of all the cutomer devices infra node management.This stone beat comes under managed infra to manage around 10 customer nodes.
Please let me know if any further information is needed and guide me on where to start off?
plss assist.
Many thanks,
phoenix
stonebeat.bmp
We will comply by the rules
Iam sorry for my belated reply.Stuck up in my family commitments
Please find the diagrams where the stone beat firewall from below attachment.
Actually the configuration of stone beat firewall runs on 4 windows NT box and now we plan to replace this 4 with 4 ASA.
The stone beat firewall has rules in them for management of all the cutomer devices infra node management.This stone beat comes under managed infra to manage around 10 customer nodes.
Please let me know if any further information is needed and guide me on where to start off?
plss assist.
Many thanks,
phoenix
stonebeat.bmp
ASKER
Hi Halejr,
Please go through the network diag and plss help.
Many Thanks
Please go through the network diag and plss help.
Many Thanks
ASKER CERTIFIED SOLUTION
membership
Create a free account to see this answer
Signing up is free and takes 30 seconds. No credit card required.
ASKER
Hi ,
thanks a lot.
Fyi
1.The two devices below the access layer switches are stone beat firewalls.
2.one of the tasks ofstone beat firewall is configured to permit email traffic .
Plss let me know the plan.
Many Thanks
thanks a lot.
Fyi
1.The two devices below the access layer switches are stone beat firewalls.
2.one of the tasks ofstone beat firewall is configured to permit email traffic .
Plss let me know the plan.
Many Thanks
ASKER
Hi,
Can u please pass on any template which u used for this project which u did already?
All related documents hiding real ips ,
plss help
Can u please pass on any template which u used for this project which u did already?
All related documents hiding real ips ,
plss help
ASKER
Hi Hale,
I saw you help me with solution on my previous posts.
plss help with this .Iam getting pissed off
I saw you help me with solution on my previous posts.
plss help with this .Iam getting pissed off
Phoenix-- no need to get pissed off... I think our hours are different.
First, you haven't provided me with much information. Here is what you need to do:
evaluate all policies of stonebeat firewalls
Line by line
create similar code for ASA devices to match requirements of Stonebeat.
Configure ASA device prior to putting into action--
Move ASA device into production environment -- failover plan is to roll-back to stonebeat firewalls.
What are the characteristics to your site? i.e. number of users, # of servers.. services required.
I can't do the work for you but I can advise you on your actions. Let me know what you think.
First, you haven't provided me with much information. Here is what you need to do:
evaluate all policies of stonebeat firewalls
Line by line
create similar code for ASA devices to match requirements of Stonebeat.
Configure ASA device prior to putting into action--
Move ASA device into production environment -- failover plan is to roll-back to stonebeat firewalls.
What are the characteristics to your site? i.e. number of users, # of servers.. services required.
I can't do the work for you but I can advise you on your actions. Let me know what you think.
ASKER
Hi Hale,
I will do according to your advice ,and will ping you shortly.
Thanks
I will do according to your advice ,and will ping you shortly.
Thanks
Where are you (Phoenix?)