Firewall suggestions?

Posted on 2008-11-10
Medium Priority
Last Modified: 2012-05-05
Soliciting firewall suggestions here. Let me list the requirements and the intended setup.

1.) Wireless G
2.) WAN port to connect a point to point T1
3.) Less than $500

 The intended setup is as follows: Cable Internet router will be set to function as a pass through to the firewall. The firewall will handle DHCP and NAT. The only other input will be a router from our point to point T1. The only cable coming out of the firewall will go to a 24-port switch that handles our interneal LAN.  

 I was looking at the Sonicwall TZ180 wireless but I can't tell if it can be used with our WAN. Doesn't list a WAN port. We certainly don't need the 3G capability and other bells and whistles of the TZ190 so I don't want to pay the higher price.

 We want to provide more security than what the firewall on our Internet router is giving us. We need to be PIC compliant (credit card information protection) and all the dedicated hardware firewalls I have seen meet this. We need packet inspection, the ability to forward ports, solid wireless security (i.e. something more than WEP), and maybe a few VPN tunnels. That's really it. Suggestions are appreciated.

Also- how does licensing work on hardware firewallls. I see user licensing mentioned on some products. If we have the firewall plugged into our WAN (~6 users) and a switch on our LAN (~25 users) what kind of licensing do we need to get?


Question by:ctamucci
1 Comment
LVL 32

Accepted Solution

dpk_wal earned 375 total points
ID: 22929585
You can look at following vendors products:
Juniper SSG series; Cisco ASA series, Sonicwall, Watchguard X Edge series

The smaller models of any products come with a pre-defined user license limit, which is usually 10 but can vary; this means only a maximum of 10 concurrent users can go to the internet.

I would suggest you to do a price/feature comparison and shortlist among the models/make. If you are familiar with any brand then I would suggest you to give that first preference. The vendors I mentioned are not the only one in business the list is long.

Thank you.

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month15 days, 2 hours left to enroll

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question