
If you wanted to do anything even vaguely ‘ firewall-ish’ with your firewall, the config would extend in size with a ratio like it was getting multiplied by the Fibonacci numbers.

the problem with that was, it was ‘ horrifically terrible in the extreme‘. Cisco tried to ‘Fix’ the switch problem by introducing the BVI interface with version 9.7. The 5506-X was, (to be honest), a massive let down, it shipped with 8 Ports on it, but those ports were independent, so you needed to buy a switch as well, and it didn’t have PoE. It replaced the earlier PIX 501 and the PIX506E (I do have both of these models also tucked away somewhere, I was just too lazy to dig them out). It had built in PoE, a 7 port switch, (you need one port for the WAN.) The only thing that ever let the 5505 down, was, the earlier versions didn’t have enough RAM to update past version 8.3. I know of 5505s that I installed new over 15 years ago that are still chugging away. The 5505, was brilliant, I still see them everywhere, tucked in the bottom of comms cabinets, and balanced on top of other things in Data Centers. Left to Right: ASA 5505, ASA 5506-X, Firepower 1010 The Firepower 1010, will end up being the replacement for the ASA5506-X, which in turn was the replacements for the ASA5505 Then complained that their internet connection was then terrible, ‘ Why is my new firewall slower than the old one!’ So look at the throughput for these things, with inspection enabled before deciding to buy the cheapest one! A Brief History

60950-1, AS/NZS CISPR22 Class AĬoncurrent connections: 100000 ¦ New connections per second: 25000 ¦ VPN peers: 75įirewall throughput (UDP): 2 Gbps ¦ Multiprotocol firewall throughput: 1.*Seriously, I’ve deployed a LOT of 5506-X (and 5508-X) firewalls, and then clients enabled every inspection, IDS/AMP/Web Filtering etc.
