Solved

Creating secure environment: NAT or PROXY?

Posted on 2009-05-14
4
362 Views
Last Modified: 2013-11-22
I am trying to provide secure internet environment for my users.

   - Should I consider utilizing proxy server, or NAT one?

   - In both cases a hardware firewall will protect LAN from WAN.

Thank you.
0
Comment
Question by:mrmut
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
KevinCovert earned 400 total points
ID: 24390985
It depends on the size of your environment and the money budgeted to implement the solution.  I would start looking at the lower end sonicwalls that provide IDS, content filtering, and spam filtering at the perimeter.  If that is too spendy there are open source solutions out there, but they are not as turn-key, but they can run on some older hardware.  Untangle is one that I have deployed in the past for my church and its pretty feature rich for the cost (FREE).

While there are open source solutions out there, if this is to support a business they may prefer to go with a paid solution to get the phone technical support.  Like I said it all depends.

Hope that helps.
0
 
LVL 6

Expert Comment

by:KevinCovert
ID: 24390988
NAT is the way to go in my book.
0
 

Author Comment

by:mrmut
ID: 24391753
Thansk, tho I don't know if I was specific enough - I am wandering is Proxy we access more secure than NAT.
0
 
LVL 7

Assisted Solution

by:LANm0nk3y
LANm0nk3y earned 100 total points
ID: 24391773
Proxy is a little better to control and easier than NAT, but you tend to have more problems if you run into software that needs direct connection and is not a proxy-aware.  You can't have NAT or Proxy without any third-party add-on to filter the content.

KevinCovert pretty much says it as far as content filtering and such -- barracuda is another good one.  
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

For those of you actively in the Malware fightling business, we now have available an amazing new tool in the malware wars (first recommended to me by rpggamergirl (http://www.experts-exchange.com/M_3598771.html), the Zone Advisor for the Virus and …
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now