Yes I have … that’s why I stated outstanding.
Btw, it’s really not a fair comparison between the RB4011 and the RV340 … the Cisco is a security appliance plus it does near line rate NAT +++
@anav @Bionic does not need multi-wan but Bionic does need dual wan PLUS Bionic would benefit greatly from the security mechanisms that come with the Cisco device.
Regarding the subscription security features, I have never considered enabling those pay for play features that the Cisco Rv has. But, in all fairness I have never owned a router that offered such subscription services. To those who have actually used these type of subscription features, do you feel they are worth the price, and which subscription features do you use? If you have used them and are now no longer paying for the features, what made you change?
Because 92% of Internet Traffic today is encrypted .. malware, virus and Ransomewhere hides very easily – and the only way to detect that is to decrypt, inspect and accept or reject … all of that happens at layer 7
A very capable blacklist can be a big help … identify IP addresses of the bad guys etc … but nothing compares to Layer 7 work if that is done efficiently preferable at line rate.
To justify the budget for security is always complicated, as the damage feels abstract and unreal to the CFO until the company gets actually hit.
In simple words, Layer 7 analysis does more or less the same like an anti-virus running on the endpoint: it scans the application data flowing through it for occurrence of typical patterns (signatures) of known malware.
What is important is that the list of those signatures needs to be constantly updated, as a result of continuous threat research and analysis, which explains the need for a subscription. So without the subscription, the whole Layer 7 part becomes obsolete, and hence pointless, very quickly.
Layer 7 analysis has to execute man-in-the-middle attacks to the encrypted connections in order to see the application data in plaintext, otherwise it would be useless.
@Sindy provided a very nice description of Layer 7 work Thank You.
@Bionic … IMO, Yes they are worth the price especially for IDS/IPS and Application Control. I typically use Untangle for UTM work because the machines my untangle installations are very capable and yes expensive. With the RV340 you have 90 day free trial of the UTM capabilities which time is enough for you and your client to determine the performance impacts. BTW, UTM stands for Unified Threat Management.
My typical UTM chain looks like : Internet >>ISP device>>Router>>Untangle [bridged]>>switch>>etc
Out of curiousity Mozerd, at home do you run MT with mOAB or are you using CISCO with UTM.
What do you recommend for your clients… ie what threshold do you insist they move to CISCO
At home I run MikroTik with MOAB
For my clients – majority is MikroTik + MOAB
Threshold = level of client paranoia.
For non paranoid clients I offer MikroTik + MOAB first and if after 6 months if level of intrusions are not acceptable I will switch to UTM solutions – they only pay for the UTM integration. I have not had any switch-overs yet – so far MOAB has been effective … very effective.
For paranoid clients its CISCO UTM first and if the budget is not there then MikroTik+Untangle …
i don’t use anything like these at home but we do for our customers. To be honest I’m not a fan of the Cisco Small Business products (although their L2 switches can be OK). Aside from that we’ve had disappointments where they didn’t support something you’d take for granted in anything called “Cisco”, or where a feature had to be configured in a bizarre way. I don’t suppose much has changed aside from renaming the range as “Business” rather than “Small Business”. Pure prejudice tells me that since Cisco has Firepower as their premium firewall family, and Meraki below that, it stands to reason that the Small Business products must be less capable.
So we don’t have anyone running Small Business security products. Of the customers running Meraki with Advanced Security, they are mainly interested in policy enforcement by URL categorisation, and application control (limit bandwidth for iTunes for example). Also ad blocking. Bigger outfits running Firepower tend to be interested in malware filtering and intrusion detection, but also the same classification and policy enforcement.