I'm not an expert in this area, but it looks like OpenBSD can do some
parts too and for much more lower price.

DHCP snooping

>From info on Cisco page it looks like simple combination of
lists/macros for blocking/allowing certain ports. Tables are possible
with OpenBSD too and you can limit flow rate of packets too

Dynamic ARP Inspection

If I'm not wrong then pf(4) don't operate on this layer, but then
good, secure and simple design come to game

IP Source Guard

sounds like antispoof quick for

Unicast Reverse Path Forwarding (URPF)

sounds like block in quick from urpf-failed to any      # use with care

Access Control Lists

something like SELinux and similar? It's first thing which every good
sysadmin turn off because of unneeded complexity and often bugs too.
If I read this :

More generally, security ACLs can be used to protect against source
address spoofing or to restrict network access to only legitimate
sources, networks, and applications. For example, ACLs should be used
to deny private address space at the ingress of the Internet and
perform some filtering in the campus such that packets can only
originate from customer-assigned addresses. ACLs should also be used
to deny unused multicast addresses, to prevent multicast DoS attacks.
Another interesting example is that of MAC ACLs which could be used to
deny packets with invalid IP versions.

then I can say that all of this is possible with pf(4) without need for ACL


Quality of Service

don't know much about this in OpenBSD, but sounds like at least
something similar is possible with this
http://www.openbsd.org/faq/pf/queueing.html

Port security

buy HW which is capable to avoid CAM overflow

CONTROL PLANE AND MANAGEMENT PLANE PROTECTION

some parts looks like possible with pf(4) some not, but as I said this
must be confirmed by someone who knows much more

Built-In "Special-Case" CPU Rate Limiters

read users' stories and try pf(4) you will see that it can handle DoS very well



It's quite long reading, but for me it looks like it's not needed to
spend so much money in most cases.

On Wed, Feb 17, 2010 at 2:21 PM, Pete Vickers <p...@systemnet.no> wrote:
> On 17. feb. 2010, at 08.47, Claudio Jeker wrote:
>
>> On Wed, Feb 17, 2010 at 03:35:24AM +0200, Kapetanakis Giannis wrote:
>>> On 17/02/10 03:16, FRLinux wrote:
>>>
>>>> Mmmh, you picked my interest here. You mentioned your cisco 6500 but I
>>>> guess you are going to use only gigabit NICs, so you have no need on
>>>> the 10gb range? Just asking, not trying to start a war :)
>>>>
>>>> Cheers,
>>>> Steph
>>>
>>
>>> ps. the cisco crawled when I enabled IOS firewall features (statefull).
>>> Firewall interface == $35K.... come one now... Too much money!
>>>
>>
>> The 6500 and 7600 cisco systems are not able to do stateful firewalling
>> in HW and have also issues with stuff like netflow exports. Unless you buy
>> the super expensive line cards. Even the big SUP boards come with a tiny
>> CPU running at the speed of a loongson -- those can be killed with a few
>> Mbps of multicast traffic.
>>
>> --
>> :wq Claudio
>>
>
> Just to balance the anti-cisco viewpoint:
>
> If you want to do deep packet stuff in HW, then Cisco offer the FWSM & ACE &
> NAM modules for 6500/7600.
>
> The SUPs (meant for switching/routing, not FWing) support CoPP (control-plane
> policing) in HW, which should be configured to prevent abusive traffic hitting
> the CPU, this (amongst a large list of others) includes high PPS multicast.
> For example see:
>
> http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/prod_white_p
> aper0900aecd802ca5d6.html
>
>
> /Pete

Reply via email to