CradlePoint 1200B Small business router
-
The reasons I used these mostly were because of the Dual Wan with Failover capabilities. Also I was told that the integrated firewall and VPN was included.
From the specs:
Stateful packet inspection firewall and NAT (network address translation) to prevent unwanted access to connected computers
IPsec VPN (2 concurrent sessions) with GRE tunneling option, also supports pass-through VPN connections (IPSec, L2TP, PPTP)
WEP, WPA, WPA2, WPA2 Enterprise and AES encryption for secure WiFi
Variety of security features (URL filtering, traffic filtering, DMZ, virtual server, port forwarding) for safer internet access
One of my clients needs to have VPN access from a server in a data center to the local network so they can use the local printers .
3 questions:
- do I need this client to buy a standalone firewall
- do they need a vpn appliance?
- does Pertino have a better fit here?
-
Why CradlePoint over Ubiquiti?
-
@technobabble said:
- do I need this client to buy a standalone firewall
If they don't they fall below my "home line." Even residential customers should have a firewall!!
-
-
@scottalanmiller This was 4 years ago.
-
@technobabble said:
- does Pertino have a better fit here?
Pertino does not support printing over the VPN because Pertino is a full mesh and you cannot put their agent onto printers. If you had a print server that was on Pertino, then perhaps.
-
@scottalanmiller you recommend separate hardware firewall to residential clients?
-
@scottalanmiller Good to know about Pertino and VPN...thanks.
-
So the firewall and VPN functions in my router are useless?
-
@technobabble said:
So the firewall and VPN functions in my router are useless?
Why do you say that?
-
@technobabble said:
@scottalanmiller you recommend separate hardware firewall to residential clients?
Separate from what? I recommend a hardware firewall always, yes.
-
@scottalanmiller said:
@technobabble said:
So the firewall and VPN functions in my router are useless?
Why do you say that?
Trying to understand why I would need extra devices to replace an all in one device so I can intelligently explain it to the client. This client has 4 PCs and will be moving the rest of their servers to an offsite datacenter.
-
Why not use the VPN from the router with OpenVPN or IPSEC client for the roadwariror even though it's a server.
Also does Printer redirect over RDP not work for this situation? or does it need to be a persistent connection, if so hardware is the way to go.
-
The office has a 2 networked printers and they want to be able to print to them from the server at the datacenter.
According to the datacenter I need a Firewall and VPN. I presumed the client only said they were connected to Comcast. I am not getting good information from the "datacenter IT person".
The client never need VPN until now and I thought that the firewall in the router was enough.
-
@technobabble said:
The office has a 2 networked printers and they want to be able to print to them from the server at the datacenter.
According to the datacenter I need a Firewall and VPN. I presumed the client only said they were connected to Comcast. I am not getting good information from the "datacenter IT person".
The client never need VPN until now and I thought that the firewall in the router was enough.
What is the server at the data center? how is it connected to the local network now? a cloud print service might be a easier option if it's not really needed on the local network.
-
@thecreativeone91 said:
Why not use the VPN from the router with OpenVPN or IPSEC client for the roadwariror even though it's a server.
Also does Printer redirect over RDP not work for this situation? or does it need to be a persistent connection, if so hardware is the way to go.
The program they are using is being delivered as a RDP App.
There are a few people working outside of the office that need to print to the local office and of course those printers won't redirect to them since they are not local. She was told that a VPN would solve the probem.
-
@thecreativeone91 said:
@technobabble said:
The office has a 2 networked printers and they want to be able to print to them from the server at the datacenter.
According to the datacenter I need a Firewall and VPN. I presumed the client only said they were connected to Comcast. I am not getting good information from the "datacenter IT person".
The client never need VPN until now and I thought that the firewall in the router was enough.
What is the server at the data center? how is it connected to the local network now? a cloud print service might be a easier option if it's not really needed on the local network.
The server at the datacenter is where their line of business application is running. They are using RDP and/or RPD Apps to connect.
-
@technobabble said:
Trying to understand why I would need extra devices to replace an all in one device so I can intelligently explain it to the client. This client has 4 PCs and will be moving the rest of their servers to an offsite datacenter.
I'm not saying that an all in one isn't okay, just that you can't be without a firewall.
-
@technobabble said:
There are a few people working outside of the office that need to print to the local office and of course those printers won't redirect to them since they are not local. She was told that a VPN would solve the probem.
Yes a site to site or a client to site VPN will make the remote users a part of the network.
-
@scottalanmiller said:
@technobabble said:
Trying to understand why I would need extra devices to replace an all in one device so I can intelligently explain it to the client. This client has 4 PCs and will be moving the rest of their servers to an offsite datacenter.
I'm not saying that an all in one isn't okay, just that you can't be without a firewall.
Not picking a fight, but does that mean a built in firewall is good enough, but not recommended? Is there a size of a business that determines when you should have a hardware firewall? Thanks!