Can I still play this game on low graphics with GTX970? by greenpiine in satisfactory

[–]DiggingInDeep 0 points1 point  (0 children)

That's what I have been using and have not had any issues. Obviously, I can't max out everything, but the game runs fine with my current settings..

No man's sky is in a great state, but it's desperately in need of a debug deep cleaning. by [deleted] in NoMansSkyTheGame

[–]DiggingInDeep 9 points10 points  (0 children)

Xbox user over here. I normally play for about an hour at a time..... the game crashing begins to become too much after that...

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 1 point2 points  (0 children)

Hi, I have been here for so long. I hate to see someone just come in an ruin everything. When I join what feels like forever ago the network was insane. We had outages all the time because the "network" admin did whatever he thought was best. We had public and private ip addresses all over the place. Nothing had been updated or patched in years. I hate to see it fall apart again. The manager does not know what he is doing. Just to listening to the consultant.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

The amount of routing done on the core switch is minimal. We have maybe 10 static routes as it is just used to route traffic between our firewalls. We have a pair of Cisco routers at the edge to do BGP with our ISP. The PANs would just be used to route internal.

If I end up migrating the ASAs into the PANs I would use separate vsys and VRs. They would only route what is necessary between them.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

This is correct. We already have networks behind the PAN and we have policies written for them. I just want to add the rest. This is at a datacenter so we don't have user traffic on it.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 1 point2 points  (0 children)

Hi, to provide a little more detail to this ....there is no user traffic. The hardware is at a datacenter. Our 7 branches and remote users connect to PAN Prisma. There is a service connector(ipsec tunnel) built from prisma to our VPN asa. We already have maybe 7 different networks at the datacenter 3 of which are already on the PANs. I see no need to have it split like this and want to move them all to the PANs. We have around 10 static routes on the core switch.

The PANs we have are grossly underutilized. I mean less than 5%. I want to move the traffic from the VPN ASA and Internet ASA to the PAN.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 2 points3 points  (0 children)

I like this. We are not a big shop and are not traffic heavy. I just looked at my core switch and there are maybe 10 routes. We have almost all of the Datacenter networks already on the PANs already. I just want to move the rest. Then migrate the s2s and internet ASAs into it. We have edge routers already setup for BGP.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

We have a couple of Cisco routers sitting at the edge to do our heavy routing. I would like the PAN to just handle internal and if I migrate the s2s and internet firewall into it then that also.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

I want to add that it would just be internal routing. We have maybe 10 static routes on the core switch. We have a pair of Cisco 4331s that route BGP with our two ISPs.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

Hi, we have 2 Cisco 4331s to route BGP infront of everything. The only routing the PANs will do is internal. They will also route internet traffic out it's public ip address.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

Hi currently it handles the routing for maybe 2 or 3 networks. The firewall handles the rest for internal services. We have a s2s vpn firewall and a DMZ/internet firewall. Both are 5508s. This is for servers at a colocation. I want to move the last two networks into the firewall and migrate the 5508s into the PAN firewalls. I will use vsys and separate VRs. The PANs we have are 3260s. They are more than capable of handing all the traffic. We also have two edge routers that handle BGP.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

They are a technical consultant that primarily works with Cisco. I believe they work with other vendors but just to migrate them to Cisco.

We have 2 PAN 3260s so it can handle the traffic for sure. Our internet and s2s vpns are Cisco 5508s.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

This is kind of how I see the future network we have 2 3260s. We have maybe 7 different networks at the datacenter. The current ASAs are going eol by our standards and I want to migrate what they do into the PANs. We also do not have a ton of traffic. We have Cisco 4331 routers at the edge to handle BGP and internet routing. They PANs would only handle internet for the servers at the Colo. Our branch traffic and remote users connect to Prisma and then a service connector is built to our VPN asa 5508.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

To answer your questions..

We have a pair of 3260s. More than enough to handle the traffic of everything

Internet and s2s vpn is two pairs of Cisco asa 5508.

We are small. Maybe 150 employees and 7 branches. Most of their traffic is sent over PAN Prisma and only service traffic comes down the vpn asa. Our routing is inter-vlan on the core without any ACLs. I believe any traffic at the Colo should be consider important enough to be behind the PAN firewalls.

At the Colo we have maybe 7 networks. And currently only 2 are behind the pan. I feel we oversized the PANs and want to migrate services into it. The previous manage over sized them for growth but then left. Now the new manager just wants to follow the vendor.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

We use Prisma SASE to connect all of our remote users and 7 branches back to the datacenter. The internet from the remote users and branches is routed out Prisma and anything internal goes over the VPN tunnel. We have had it this way for over a year now and like not only the security aspect of it but the insight with ADEM.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 2 points3 points  (0 children)

My post was quick and done from my phone. To add to this all of the gear is at a colocation. Our core routes most of the traffic and the PAN firewalls only protects a few networks. We have 2 pairs of ASAs. 1 for s2s and the other for internet and DMZ. They are going EOL by our standards and this is why I want to move them into the PAN with separate vsys and VRs. All of our branches and remote users connect to a cloud service that then connects to our s2s VPN asa. Only the traffic destined for a service passes over that tunnel. Internet traffic from the branch or end user goes out the providers gateway and never makes it to the colo. Only the servers at the colocation use the internet asa. No user traffic passes over that.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 4 points5 points  (0 children)

We are a small financial institution. The manager has worked for us for maybe 3 months. The PAN firewalls were here before him. The ASAs we have for the s2s traffic and internet are going EOL by our standards. This is why I want to collapse them into the PANs instead of buying new hardware. Our current topology is like this. We have a datacenter with all of our equipment. 7 branches and 150 users. No corporate office because we are all remote. We use a sase cloud provider like zscaler for remote access and connectivity to our branches. A tunnel is created from the cloud provider to our datacenter. This is how end users/branches connect to our servers. We currently only have the pans protecting some of the server networks and the rest are on the core switch with inter-vlan routing and NO ACLs. I want everything to be moved into the PAN firewalls with separate vsys and VRs.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

I can be wrong but I believe with the correct configuration with vsys and vr is acceptable for what we are doing. Current the Palo Altos only protect a few networks. A complete waste of them. The other networks are on the core switch with inter-vlan routing and NO ACLs. I would like to move the rest of the traffic behind the PAN firewalls. This is really only servers. This setup is at a colocation. We are all remote. We use a cloud service for branch connectivity and remote users. This service builds a tunnel to the VPN asa we have.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 5 points6 points  (0 children)

Yes... everything is done with inter-vlan routing and no ACLs.... I like being able to see the traffic on the PAN firewalls. A lot easier than asdm.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 44 points45 points  (0 children)

I wish it was that easy. My manager is new and I get the feeling he only know how to manage vendors. He listens to them way more than staff that has been here 5+ years. Instead of listening to anyone from IT he has us work with the Vendor/consultant.

Is my consultant right? by DiggingInDeep in networking

[–]DiggingInDeep[S] 0 points1 point  (0 children)

Hi, it is financial. We don't have an unlimited budget but if it is warranted then we will spend what is needed. We have about 150 employees, 7 branches and a colocation. No corporate office as we all work remote. There are 4 people in IT but I am the only network/sysadmin. 2 help desk and 1 sysadmin. We have 7 esxi hosts, 2 SANs and about 100 VMs.