ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Home Network Firewall Options

    IT Discussion
    17
    118
    26.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • wrx7mW
      wrx7m @MattSpeller
      last edited by

      @MattSpeller I do like my Sophos too. Although, I am starting to see the benefit to having fewer things running on the same box. Troubleshooting might actually be easier. "Is it a proxy issue or firewall rule? Could be either."

      MattSpellerM 1 Reply Last reply Reply Quote 1
      • MattSpellerM
        MattSpeller @wrx7m
        last edited by MattSpeller

        @wrx7m said:

        @MattSpeller I do like my Sophos too. Although, I am starting to see the benefit to having fewer things running on the same box. Troubleshooting might actually be easier. "Is it a proxy issue or firewall rule? Could be either."

        Just remember that sometimes the grass isn't really greener haha. I would love to do all these boxes myself and learn a bunch of new junk but that'd be a huge chunk of time I don't have.

        1 Reply Last reply Reply Quote 2
        • JaredBuschJ
          JaredBusch
          last edited by

          @NETS the point is not to always separate or always to use an all in one. The point of every IT solution should be to find the correct solution to the problem.

          Very rarely is an UTM actually ever required when you break all the pieces down and look at what they do and what the business needs.

          I have never needed a full UTM at a single client.

          The good place to find the need is in libraries and education. They have laws or ordinances mandating things and vendors have provided solid solutions for them.

          1 Reply Last reply Reply Quote 1
          • wirestyle22W
            wirestyle22
            last edited by

            Are you guys using actual server hardware to make the devices to fill those roles?

            DashrenderD 1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @wirestyle22
              last edited by

              @wirestyle22 said:

              Are you guys using actual server hardware to make the devices to fill those roles?

              Why are you worrying about those holes in the first place?

              wirestyle22W 1 Reply Last reply Reply Quote 0
              • wirestyle22W
                wirestyle22 @Dashrender
                last edited by wirestyle22

                @Dashrender said:

                @wirestyle22 said:

                Are you guys using actual server hardware to make the devices to fill those roles?

                Why are you worrying about those holes in the first place?

                I'm not. I'm just curious if actual server hardware would be required for my own knowledge

                travisdh1T 1 Reply Last reply Reply Quote 0
                • travisdh1T
                  travisdh1 @wirestyle22
                  last edited by

                  @wirestyle22 said:

                  @Dashrender said:

                  @wirestyle22 said:

                  Are you guys using actual server hardware to make the devices to fill those roles?

                  Why are you worrying about those holes in the first place?

                  I'm not. I'm just curious if actual server hardware would be required for my own knowledge

                  They're all virtual right? So what does it matter, hardware agnostic. That said, a solid server box is definitely preferred.

                  wirestyle22W 1 Reply Last reply Reply Quote 1
                  • wirestyle22W
                    wirestyle22 @travisdh1
                    last edited by

                    @travisdh1 said:

                    @wirestyle22 said:

                    @Dashrender said:

                    @wirestyle22 said:

                    Are you guys using actual server hardware to make the devices to fill those roles?

                    Why are you worrying about those holes in the first place?

                    I'm not. I'm just curious if actual server hardware would be required for my own knowledge

                    They're all virtual right? So what does it matter, hardware agnostic. That said, a solid server box is definitely preferred.

                    What if the company has a ton of remote sites like mine? Wouldn't that be a pretty big cost?

                    travisdh1T 1 Reply Last reply Reply Quote 0
                    • travisdh1T
                      travisdh1 @wirestyle22
                      last edited by

                      @wirestyle22 said:

                      @travisdh1 said:

                      @wirestyle22 said:

                      @Dashrender said:

                      @wirestyle22 said:

                      Are you guys using actual server hardware to make the devices to fill those roles?

                      Why are you worrying about those holes in the first place?

                      I'm not. I'm just curious if actual server hardware would be required for my own knowledge

                      They're all virtual right? So what does it matter, hardware agnostic. That said, a solid server box is definitely preferred.

                      What if the company has a ton of remote sites like mine? Wouldn't that be a pretty big cost?

                      Only if you have a reason to need one at every site. If you get to a LANless design then you don't really need the security appliances at every location, and if you're still running traditional LAN and VPN then you only need the one at the head office.

                      DashrenderD 1 Reply Last reply Reply Quote 1
                      • DashrenderD
                        Dashrender @travisdh1
                        last edited by

                        @travisdh1 said:

                        Only if you have a reason to need one at every site.

                        In other words - only if you need those UTM services at every site.

                        If you get to a LANless design then you don't really need the security appliances at every location,

                        I still really like the idea of a hardware firewall (though I suppose a firewall VM would be fine) between you and the internet whenever possible.

                        and if you're still running traditional LAN and VPN then you only need the one at the head office.

                        This assumes you have the bandwidth to bring all internet traffic back to the home office for filtering before going out to the internet. I don't know anyone who does that anymore.

                        1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender
                          last edited by

                          I suppose if you really need UTM things at remote locations, then the UTM appliance is the most cost effective way to do this. But the real question is... do you REALLY need it?

                          wirestyle22W 1 Reply Last reply Reply Quote 1
                          • wirestyle22W
                            wirestyle22 @Dashrender
                            last edited by wirestyle22

                            @Dashrender said:

                            I suppose if you really need UTM things at remote locations, then the UTM appliance is the most cost effective way to do this. But the real question is... do you REALLY need it?

                            Not at every site. What I'm going to do is install a Squid proxy at one specific location because we have two client computer labs there. It's extremely vulnerable with the developmentally disabled clicking on anything and everything--not that I would expect anything but that in this situation. So I basically block everything except YouTube and a few educational websites that they use daily. I do this only for their computers and have standard content policies in place for the others.

                            I'm getting rid of my Sonicwalls in favor of Ubiquiti Security Gateways but I lose content filtering basically.

                            DashrenderD 1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender @wirestyle22
                              last edited by

                              @wirestyle22 said:

                              @Dashrender said:

                              I suppose if you really need UTM things at remote locations, then the UTM appliance is the most cost effective way to do this. But the real question is... do you REALLY need it?

                              Not at every site. What I'm going to do is install a Squid proxy at one specific location because we have two client computer labs there. It's extremely vulnerable with the developmentally disabled clicking on anything and everything--not that I would expect anything but that in this situation. So I basically block everything except YouTube and a few educational websites that they use daily. I do this only for their computers and have standard content policies in place for the others.

                              I'm getting rid of my Sonicwalls in favor of Ubiquiti Security Gateways but I lose content filtering basically.

                              yep - I was in the same boat 4 months ago. Though - just wondering, why the USGs vs the ERLs?

                              wirestyle22W 1 Reply Last reply Reply Quote 0
                              • J
                                Jason Banned @NETS
                                last edited by

                                @NETS said:

                                @scottalanmiller said:

                                @NETS said:

                                So without a UTM device how are you monitoring the network and locking down the traffic?

                                1. What is the actual need here? A firewall already monitors and locks down the traffic. Those are not UTM functions.
                                2. With a UTM, how are you doing it?

                                I look at UTM's as a single device that can easily secure and monitor and a variety of network traffic with minimal effort. Running a regular ERX works but you lose the malware, mail filtering and IPS features of a UTM. Sure there are other methods of gaining those features back but not on a single box. For SMB that single box is a big sell.

                                If you use a Edge router how are you adding back in the other security features that a UTM or Nextgen firewall offers?

                                Why are you filtering mail at the firewall anyway?. Even with onsite mail cloud based email filter is way more powerful at detecting things.

                                wirestyle22W 1 Reply Last reply Reply Quote 1
                                • wirestyle22W
                                  wirestyle22 @Jason
                                  last edited by

                                  @Jason said:

                                  @NETS said:

                                  @scottalanmiller said:

                                  @NETS said:

                                  So without a UTM device how are you monitoring the network and locking down the traffic?

                                  1. What is the actual need here? A firewall already monitors and locks down the traffic. Those are not UTM functions.
                                  2. With a UTM, how are you doing it?

                                  I look at UTM's as a single device that can easily secure and monitor and a variety of network traffic with minimal effort. Running a regular ERX works but you lose the malware, mail filtering and IPS features of a UTM. Sure there are other methods of gaining those features back but not on a single box. For SMB that single box is a big sell.

                                  If you use a Edge router how are you adding back in the other security features that a UTM or Nextgen firewall offers?

                                  Why are you filtering mail at the firewall anyway?. Even with onsite mail cloud based email filter is way more powerful at detecting things.

                                  I inherited all of this stuff. It predates me. I'm making the changes now in the hopes that I am ML compliant one day ^_^

                                  1 Reply Last reply Reply Quote 0
                                  • NETSN
                                    NETS
                                    last edited by

                                    @Jason said:

                                    @NETS said:

                                    @scottalanmiller said:

                                    @NETS said:

                                    So without a UTM device how are you monitoring the network and locking down the traffic?

                                    1. What is the actual need here? A firewall already monitors and locks down the traffic. Those are not UTM functions.
                                    2. With a UTM, how are you doing it?

                                    I look at UTM's as a single device that can easily secure and monitor and a variety of network traffic with minimal effort. Running a regular ERX works but you lose the malware, mail filtering and IPS features of a UTM. Sure there are other methods of gaining those features back but not on a single box. For SMB that single box is a big sell.

                                    If you use a Edge router how are you adding back in the other security features that a UTM or Nextgen firewall offers?

                                    Why are you filtering mail at the firewall anyway?. Even with onsite mail cloud based email filter is way more powerful at detecting things.

                                    98% of the time we do use some form of cloud based email filtering but if they have the license we also kick on mail filtering in the UTM. While it might be over kill it's caught a few things that we didn't want coming in.

                                    I agree that UTM's are costly and single devices could potentially a better job but from a manageability perspective UTM's make it easier.

                                    1 Reply Last reply Reply Quote 0
                                    • wirestyle22W
                                      wirestyle22 @Dashrender
                                      last edited by

                                      @Dashrender said:

                                      @wirestyle22 said:

                                      @Dashrender said:

                                      I suppose if you really need UTM things at remote locations, then the UTM appliance is the most cost effective way to do this. But the real question is... do you REALLY need it?

                                      Not at every site. What I'm going to do is install a Squid proxy at one specific location because we have two client computer labs there. It's extremely vulnerable with the developmentally disabled clicking on anything and everything--not that I would expect anything but that in this situation. So I basically block everything except YouTube and a few educational websites that they use daily. I do this only for their computers and have standard content policies in place for the others.

                                      I'm getting rid of my Sonicwalls in favor of Ubiquiti Security Gateways but I lose content filtering basically.

                                      yep - I was in the same boat 4 months ago. Though - just wondering, why the USGs vs the ERLs?

                                      I'm open to recommendations of course. Do you think the ERL is a better choice?

                                      DashrenderD 1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender @wirestyle22
                                        last edited by

                                        @wirestyle22 said:

                                        @Dashrender said:

                                        @wirestyle22 said:

                                        @Dashrender said:

                                        I suppose if you really need UTM things at remote locations, then the UTM appliance is the most cost effective way to do this. But the real question is... do you REALLY need it?

                                        Not at every site. What I'm going to do is install a Squid proxy at one specific location because we have two client computer labs there. It's extremely vulnerable with the developmentally disabled clicking on anything and everything--not that I would expect anything but that in this situation. So I basically block everything except YouTube and a few educational websites that they use daily. I do this only for their computers and have standard content policies in place for the others.

                                        I'm getting rid of my Sonicwalls in favor of Ubiquiti Security Gateways but I lose content filtering basically.

                                        yep - I was in the same boat 4 months ago. Though - just wondering, why the USGs vs the ERLs?

                                        I'm open to recommendations of course. Do you think the ERL is a better choice?

                                        I haven't actually played with a USG yet. They are 20-40 more than an ERL... as far as I can tell... the main difference is the ability to controll the USG with the Ubiquiti Controller software, you can't do that with the EdgeRouter stuff

                                        wirestyle22W J 3 Replies Last reply Reply Quote 0
                                        • wirestyle22W
                                          wirestyle22 @Dashrender
                                          last edited by

                                          @Dashrender said:

                                          @wirestyle22 said:

                                          @Dashrender said:

                                          @wirestyle22 said:

                                          @Dashrender said:

                                          I suppose if you really need UTM things at remote locations, then the UTM appliance is the most cost effective way to do this. But the real question is... do you REALLY need it?

                                          Not at every site. What I'm going to do is install a Squid proxy at one specific location because we have two client computer labs there. It's extremely vulnerable with the developmentally disabled clicking on anything and everything--not that I would expect anything but that in this situation. So I basically block everything except YouTube and a few educational websites that they use daily. I do this only for their computers and have standard content policies in place for the others.

                                          I'm getting rid of my Sonicwalls in favor of Ubiquiti Security Gateways but I lose content filtering basically.

                                          yep - I was in the same boat 4 months ago. Though - just wondering, why the USGs vs the ERLs?

                                          I'm open to recommendations of course. Do you think the ERL is a better choice?

                                          I haven't actually played with a USG yet. They are 20-40 more than an ERL... as far as I can tell... the main difference is the ability to controll the USG with the Ubiquiti Controller software, you can't do that with the EdgeRouter stuff

                                          I haven't either. I may get one to test though

                                          1 Reply Last reply Reply Quote 0
                                          • wirestyle22W
                                            wirestyle22 @Dashrender
                                            last edited by wirestyle22

                                            @Dashrender said:

                                            @wirestyle22 said:

                                            @Dashrender said:

                                            @wirestyle22 said:

                                            @Dashrender said:

                                            I suppose if you really need UTM things at remote locations, then the UTM appliance is the most cost effective way to do this. But the real question is... do you REALLY need it?

                                            Not at every site. What I'm going to do is install a Squid proxy at one specific location because we have two client computer labs there. It's extremely vulnerable with the developmentally disabled clicking on anything and everything--not that I would expect anything but that in this situation. So I basically block everything except YouTube and a few educational websites that they use daily. I do this only for their computers and have standard content policies in place for the others.

                                            I'm getting rid of my Sonicwalls in favor of Ubiquiti Security Gateways but I lose content filtering basically.

                                            yep - I was in the same boat 4 months ago. Though - just wondering, why the USGs vs the ERLs?

                                            I'm open to recommendations of course. Do you think the ERL is a better choice?

                                            I haven't actually played with a USG yet. They are 20-40 more than an ERL... as far as I can tell... the main difference is the ability to controll the USG with the Ubiquiti Controller software, you can't do that with the EdgeRouter stuff

                                            Here's a signup for the beta if you're interested and have the tech to use it in the future.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 1 / 6
                                            • First post
                                              Last post