ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Cisco vs Pfsense preformance for VPN

    IT Discussion
    vpn cisco pfsense ipsec
    8
    27
    9.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender @scottalanmiller
      last edited by

      @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

      @johnhooks said in Cisco vs Pfsense preformance for VPN:

      Any reason for pfsense over Vyatta?

      That would be my first choice. VyOS.

      Does anyone make a VM appliance.

      stacksofplatesS J S 3 Replies Last reply Reply Quote 0
      • stacksofplatesS
        stacksofplates @Dashrender
        last edited by

        @Dashrender said in Cisco vs Pfsense preformance for VPN:

        @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

        @johnhooks said in Cisco vs Pfsense preformance for VPN:

        Any reason for pfsense over Vyatta?

        That would be my first choice. VyOS.

        Does anyone make a VM appliance.

        Just download the ISO and install it.

        1 Reply Last reply Reply Quote 2
        • J
          Jason Banned @Dashrender
          last edited by Jason

          @Dashrender said in Cisco vs Pfsense preformance for VPN:

          @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

          @johnhooks said in Cisco vs Pfsense preformance for VPN:

          Any reason for pfsense over Vyatta?

          That would be my first choice. VyOS.

          Does anyone make a VM appliance.

          VyOS has an OVF. Pfsense doesn't.

          Quick and dirty was the main reason I was considering Pfsense over VyOS

          Can VyOS act as a VPN concentrator using a single interface (aka just internal no WAN). Does it work with the native Windows client? We don't want to deploy another one besides our Cisco AnyConnect we already use or use the built in Windows one..

          stacksofplatesS 1 Reply Last reply Reply Quote 0
          • stacksofplatesS
            stacksofplates @Jason
            last edited by

            @Jason said in Cisco vs Pfsense preformance for VPN:

            @Dashrender said in Cisco vs Pfsense preformance for VPN:

            @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

            @johnhooks said in Cisco vs Pfsense preformance for VPN:

            Any reason for pfsense over Vyatta?

            That would be my first choice. VyOS.

            Does anyone make a VM appliance.

            VyOS has an OVF. Pfsense doesn't.

            Quick and dirty was the main reason I was considering Pfsense over VyOS

            Can VyOS act as a VPN concentrator using a single interface (aka just internal no WAN). Does it work with the native Windows client? We don't want to deploy another one besides our Cisco AnyConnect we already use or use the built in Windows one..

            I've set up Ubiquiti with the Windows L2TP client. As for the interface, not 100% sure.

            J 1 Reply Last reply Reply Quote 0
            • bbigfordB
              bbigford
              last edited by

              One thing Cisco has going for it is that the software is designed for that device, so that it can reach optimal performance. Having said that, I'd take Pfsense... or M0n0wall, or Smoothwall.

              scottalanmillerS J 2 Replies Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @bbigford
                last edited by

                @BBigford said in Cisco vs Pfsense preformance for VPN:

                One thing Cisco has going for it is that the software is designed for that device, so that it can reach optimal performance.

                Kind of. While that's true, it's like old arcade machines, designed to do one task well, not to scale up. The thing that this causes is for them to push low end hardware to its limits. So because Cisco can design for the device, they do. Because they do, they can spend less on having less hardware power.

                This is why Ubiquiti does for $95 what Cisco struggles to do at $3,000. Cisco hardware gets expensive to be able to handle the throughput needs. The hardware advantages of generic commodity hardware is orders of magnitude faster than the custom Cisco ASICs at the same prices. And VyOS, pfSense and others are written to that commodity hardware pretty heavily, it's not likely they are being emulated. The software advantage here is only 20% at most. But the hardware advantage is easily 10,000% or more.

                bbigfordB 1 Reply Last reply Reply Quote 1
                • J
                  Jason Banned @bbigford
                  last edited by

                  @BBigford said in Cisco vs Pfsense preformance for VPN:

                  One thing Cisco has going for it is that the software is designed for that device, so that it can reach optimal performance. Having said that, I'd take Pfsense... or M0n0wall, or Smoothwall.

                  Don't know about optimal preformance. The CPU is nothing special..

                  When were talking of routing there is no difference in it or a computer. The difference would be in Encrtpyion offload, and DSP you might have in the router for SIP, PRIs, Analog lines etc.

                  1 Reply Last reply Reply Quote 0
                  • J
                    Jason Banned @stacksofplates
                    last edited by

                    @johnhooks said in Cisco vs Pfsense preformance for VPN:

                    @Jason said in Cisco vs Pfsense preformance for VPN:

                    @Dashrender said in Cisco vs Pfsense preformance for VPN:

                    @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

                    @johnhooks said in Cisco vs Pfsense preformance for VPN:

                    Any reason for pfsense over Vyatta?

                    That would be my first choice. VyOS.

                    Does anyone make a VM appliance.

                    VyOS has an OVF. Pfsense doesn't.

                    Quick and dirty was the main reason I was considering Pfsense over VyOS

                    Can VyOS act as a VPN concentrator using a single interface (aka just internal no WAN). Does it work with the native Windows client? We don't want to deploy another one besides our Cisco AnyConnect we already use or use the built in Windows one..

                    I've set up Ubiquiti with the Windows L2TP client. As for the interface, not 100% sure.

                    Looks like it can do a loop back like Cisco IOS for this.
                    http://vyos.net/wiki/NAT_Before_VPN

                    Stupid question, We are thinking about maybe replacing all of our Cisco VPN routers with VyOS since it will do it, instead of just this temp 200 user one. It will be more like 20,000 users..

                    Is there a way to do a failover between to VyOS VMs at two different locations (and two different public ips) users connect via DNS name though..

                    coliverC JaredBuschJ 2 Replies Last reply Reply Quote 0
                    • coliverC
                      coliver @Jason
                      last edited by

                      @Jason said in Cisco vs Pfsense preformance for VPN:

                      @johnhooks said in Cisco vs Pfsense preformance for VPN:

                      @Jason said in Cisco vs Pfsense preformance for VPN:

                      @Dashrender said in Cisco vs Pfsense preformance for VPN:

                      @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

                      @johnhooks said in Cisco vs Pfsense preformance for VPN:

                      Any reason for pfsense over Vyatta?

                      That would be my first choice. VyOS.

                      Does anyone make a VM appliance.

                      VyOS has an OVF. Pfsense doesn't.

                      Quick and dirty was the main reason I was considering Pfsense over VyOS

                      Can VyOS act as a VPN concentrator using a single interface (aka just internal no WAN). Does it work with the native Windows client? We don't want to deploy another one besides our Cisco AnyConnect we already use or use the built in Windows one..

                      I've set up Ubiquiti with the Windows L2TP client. As for the interface, not 100% sure.

                      Looks like it can do a loop back like Cisco IOS for this.
                      http://vyos.net/wiki/NAT_Before_VPN

                      Stupid question, We are thinking about maybe replacing all of our Cisco VPN routers with VyOS since it will do it, instead of just this temp 200 user one. It will be more like 20,000 users..

                      Is there a way to do a failover between to VyOS VMs at two different locations (and two different public ips) users connect via DNS name though..

                      Would sticking something like HAProxy in front of them work? It should be able to proxy VPN connections and be able to load-balance / fail over what you need.

                      1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch @Jason
                        last edited by

                        @Jason said in Cisco vs Pfsense preformance for VPN:

                        @johnhooks said in Cisco vs Pfsense preformance for VPN:

                        @Jason said in Cisco vs Pfsense preformance for VPN:

                        @Dashrender said in Cisco vs Pfsense preformance for VPN:

                        @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

                        @johnhooks said in Cisco vs Pfsense preformance for VPN:

                        Any reason for pfsense over Vyatta?

                        That would be my first choice. VyOS.

                        Does anyone make a VM appliance.

                        VyOS has an OVF. Pfsense doesn't.

                        Quick and dirty was the main reason I was considering Pfsense over VyOS

                        Can VyOS act as a VPN concentrator using a single interface (aka just internal no WAN). Does it work with the native Windows client? We don't want to deploy another one besides our Cisco AnyConnect we already use or use the built in Windows one..

                        I've set up Ubiquiti with the Windows L2TP client. As for the interface, not 100% sure.

                        Looks like it can do a loop back like Cisco IOS for this.
                        http://vyos.net/wiki/NAT_Before_VPN

                        Stupid question, We are thinking about maybe replacing all of our Cisco VPN routers with VyOS since it will do it, instead of just this temp 200 user one. It will be more like 20,000 users..

                        Is there a way to do a failover between to VyOS VMs at two different locations (and two different public ips) users connect via DNS name though..

                        Would the failover not just be the DNS name updating?

                        J 1 Reply Last reply Reply Quote 0
                        • J
                          Jason Banned @JaredBusch
                          last edited by Jason

                          @JaredBusch said in Cisco vs Pfsense preformance for VPN:

                          @Jason said in Cisco vs Pfsense preformance for VPN:

                          @johnhooks said in Cisco vs Pfsense preformance for VPN:

                          @Jason said in Cisco vs Pfsense preformance for VPN:

                          @Dashrender said in Cisco vs Pfsense preformance for VPN:

                          @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

                          @johnhooks said in Cisco vs Pfsense preformance for VPN:

                          Any reason for pfsense over Vyatta?

                          That would be my first choice. VyOS.

                          Does anyone make a VM appliance.

                          VyOS has an OVF. Pfsense doesn't.

                          Quick and dirty was the main reason I was considering Pfsense over VyOS

                          Can VyOS act as a VPN concentrator using a single interface (aka just internal no WAN). Does it work with the native Windows client? We don't want to deploy another one besides our Cisco AnyConnect we already use or use the built in Windows one..

                          I've set up Ubiquiti with the Windows L2TP client. As for the interface, not 100% sure.

                          Looks like it can do a loop back like Cisco IOS for this.
                          http://vyos.net/wiki/NAT_Before_VPN

                          Stupid question, We are thinking about maybe replacing all of our Cisco VPN routers with VyOS since it will do it, instead of just this temp 200 user one. It will be more like 20,000 users..

                          Is there a way to do a failover between to VyOS VMs at two different locations (and two different public ips) users connect via DNS name though..

                          Would the failover not just be the DNS name updating?

                          That's what I'm wondering, as in will is there a DNS server that can swap them if a host is down automatically? We currently are using Network Solutions for external DNS.

                          1 Reply Last reply Reply Quote 0
                          • bbigfordB
                            bbigford @scottalanmiller
                            last edited by

                            @scottalanmiller said in Cisco vs Pfsense preformance for VPN:

                            @BBigford said in Cisco vs Pfsense preformance for VPN:

                            One thing Cisco has going for it is that the software is designed for that device, so that it can reach optimal performance.

                            Kind of. While that's true, it's like old arcade machines, designed to do one task well, not to scale up. The thing that this causes is for them to push low end hardware to its limits. So because Cisco can design for the device, they do. Because they do, they can spend less on having less hardware power.

                            This is why Ubiquiti does for $95 what Cisco struggles to do at $3,000. Cisco hardware gets expensive to be able to handle the throughput needs. The hardware advantages of generic commodity hardware is orders of magnitude faster than the custom Cisco ASICs at the same prices. And VyOS, pfSense and others are written to that commodity hardware pretty heavily, it's not likely they are being emulated. The software advantage here is only 20% at most. But the hardware advantage is easily 10,000% or more.

                            That explanation was better than mine. Considering I failed to include any backing content. 🙂

                            1 Reply Last reply Reply Quote 1
                            • DashrenderD
                              Dashrender
                              last edited by

                              Who provides auto changing on the fly DNS updates like that for failover? Wouldn't something like CloudFlare be more the norm?

                              As for failover VPN, wouldn't be better, easier to setup two DNS records, and have the VPN client try the default one first, and when it fails, failover over to the secondary one in it's list?

                              JaredBuschJ J 2 Replies Last reply Reply Quote 0
                              • JaredBuschJ
                                JaredBusch @Dashrender
                                last edited by

                                @Dashrender said in Cisco vs Pfsense preformance for VPN:

                                Who provides auto changing on the fly DNS updates like that for failover? Wouldn't something like CloudFlare be more the norm?

                                As for failover VPN, wouldn't be better, easier to setup two DNS records, and have the VPN client try the default one first, and when it fails, failover over to the secondary one in it's list?

                                The $60/year plan does it.
                                http://wwwdemo.dnsmadeeasy.com/pricing/

                                1 Reply Last reply Reply Quote 1
                                • J
                                  Jason Banned @Dashrender
                                  last edited by

                                  @Dashrender said in Cisco vs Pfsense preformance for VPN:

                                  As for failover VPN, wouldn't be better, easier to setup two DNS records, and have the VPN client try the default one first, and when it fails, failover over to the secondary one in it's list?

                                  Not likely. when you do that it is basically two seperate VPNs.

                                  JaredBuschJ 1 Reply Last reply Reply Quote 0
                                  • JaredBuschJ
                                    JaredBusch @Jason
                                    last edited by

                                    @Jason said in Cisco vs Pfsense preformance for VPN:

                                    @Dashrender said in Cisco vs Pfsense preformance for VPN:

                                    As for failover VPN, wouldn't be better, easier to setup two DNS records, and have the VPN client try the default one first, and when it fails, failover over to the secondary one in it's list?

                                    Not likely. when you do that it is basically two seperate VPNs.

                                    I apparently did not read his entire post last night.

                                    This is correct, I know of now method to have the basic windows VPN service use multiuple DNS names. IPSEC just does not work that way. use a DNS failover service. like the one I linked above to handle it automatically.

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      Jason Banned
                                      last edited by Jason

                                      So in our limited testing so far.. we've about tripled the throughput of the VPN by going away from the Cisco routers (Which was costing us tens of thousands in user licensing (Per year) for the vpn on top of the router and security bundle costs. )

                                      Still need to setup the failover but so far it's been great. And since the IKEV2 can be fully deployed with a GPO we add them to the VPN AD group and everything from the root CA, to the vpn profile and access via NPS/Radius is all done with a single step.

                                      stacksofplatesS 1 Reply Last reply Reply Quote 2
                                      • stacksofplatesS
                                        stacksofplates @Jason
                                        last edited by stacksofplates

                                        @Jason said in Cisco vs Pfsense preformance for VPN:

                                        So in our limited testing so far.. we've about tripled the throughput of the VPN by going away from the Cisco routers (Which was costing us tens of thousands in user licensing (Per year) for the vpn on top of the router and security bundle costs. )

                                        Still need to setup the failover but so far it's been great. And since the IKEV2 can be fully deployed with a GPO we add them to the VPN AD group and everything from the root CA, to the vpn profile and access via NPS/Radius is all done with a single step.

                                        I wish I could get most of our networking equipment away from Cisco. I sadly I don't pull enough weight as a lowly systems engineer.

                                        J scottalanmillerS 2 Replies Last reply Reply Quote 0
                                        • J
                                          Jason Banned @stacksofplates
                                          last edited by

                                          @johnhooks said in Cisco vs Pfsense preformance for VPN:

                                          I wish I could get most of our networking equipment away from Cisco. I sadly I don't pull enough weight as a lowly systems engineer.

                                          Haha.. I don't want to move most of our stuff. We still like our switches and edge routers from them. Their firewalls and VPNs suck though. We switched to Palo Alto for firewalls a good while back.

                                          1 Reply Last reply Reply Quote 0
                                          • DashrenderD
                                            Dashrender
                                            last edited by

                                            what did you move to for VPN?

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 2 / 2
                                            • First post
                                              Last post