Solved

Securing a web server, Watchguard XTM 22, or Sonicwall TZ 200?

Posted on 2011-02-16
3
934 Views
Last Modified: 2012-05-11
Looking to secure 2 web servers that are co-located in a datacenter, with a firewall...

Considering the watchguard XTM22, or the sonicwall TZ 200.

We currently use the sonicwall NSA and PRO series at our offices, but heard that the XTMs were great for smaller installations...

Street price on both seems to be around $400 or so...

Requirements:
-Block ports so only specific ports are open to the web servers (80, 443), on each server via each IP block.
-Connect via VPN for remote management of the device (VNC)

Not sure if we really need the UTM aspects of the devices?

Thoughts / comments?
0
Comment
Question by:HADDADD3
  • 2
3 Comments
 
LVL 33

Expert Comment

by:digitap
ID: 34908016
the only thing the comes up immediately is the vpn aspect.  you can perform all the firewall aspects in your question, but the vpn between two sonicwall appliances is going to be more stable and easier to setup than one between a sonicwall and a watchguard.
0
 

Author Comment

by:HADDADD3
ID: 34908032
Are both units comparable? Does it boil down to user preference?
0
 
LVL 33

Accepted Solution

by:
digitap earned 500 total points
ID: 34908087
i've used watchguard appliances and i don't like them...at all.  so, you're not going to get constructive advice from that aspect.  also, i'm just not familiar with the XTM22.  i know sonicwall though and i've setup VPNs between the two vendors and helped others here on EE set them up as well.  it was a pain and troubleshooting is even harder.  you can almost guarantee a vpn between two sonicwall appliances (barring any strange unforeseen nuance) is going to take less than 15 min to setup.

that said, both appliances are relatively new, so my guess is they are going to operate at the firewall level about the same.  so, it probably does come down to user preference, but i'm throwing in the consideration of VPN in regards to interoperability.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

We sought a budget ($5,000) firewall solution that would provide all the performance we needed with no single point of failure.  Hosting a SAAS web application in our datacenter, it was critical that we find a way to keep connectivity up and inbound…
Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now