Solved

Cisco ASA 5505 or Fortinet FortiGate 60C

Posted on 2012-04-12
3
2,145 Views
Last Modified: 2012-04-12
I'm looking to purchase a security appliance in the ballpark of $500 to add an extra layer of security at my office location. There are 50 internal users at the office, with an additional 50 external users on our network, at any given time. The 50 external users only access email and FTP services at our office a few times a day, so the majority of traffic originates from the inside of our network in the form of email, web, and other services.

With that being said, which device would be best for simple ACL implementation? We already have a managed solution in place through our ISP in the form of a FortiGate 80C, which handles our UTM requirements, so it's not imperative that this device offer such features. On paper, the 60C appears to outperform the 5505 and features Gigabit ports, whereas the Cisco offering does not. I'm more familiar with Cisco products, as far as configuration is concerned and I would like to install a device from a different manufacturer than what our ISP installed, for this additional security layer, but is the FortiGate simply a much better way to go, performance-wise?

Any and all advice would be greatly appreciated, and I'm open to other ideas, as long as the price remains within the $500 range (give or take $100).
0
Comment
Question by:josh_e
  • 2
3 Comments
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 500 total points
ID: 37838044
The main advantage of the ASA seems to be that your familiar with it. So it would be easier for you to setup/maintain/troubleshoot.
The question would be, do you need the extra performance (now or in the future) and are you willing/able to learn something new (let alone, do you have the time)? If so, go for the fortigate. If not, stick to what you know already.

Just my 2 cents.
0
 

Author Closing Comment

by:josh_e
ID: 37839095
Very good point, time is definitely hard to come by, and while learning a new system would be great, it might not be feasible for this project. Thanks for the advice!
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 37839420
Glad I could help you out :)

Thx 4 the points.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Hi All,  Recently I have installed and configured a Sonicwall NS220 in the network as a firewall and Internet access gateway. All was working fine until users started reporting that they cannot use the Cisco VPN client to connect to the customer'…
Before I go to far, let's explain HA (High Availability) and why you should consider it.  High availability is the mechanism used to provide redundancy to any service at the same site and appears as a single service to the users of that service.  As…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now