Securing a web server, Watchguard XTM 22, or Sonicwall TZ 200?

Posted on 2011-02-16
Medium Priority
Last Modified: 2012-05-11
Looking to secure 2 web servers that are co-located in a datacenter, with a firewall...

Considering the watchguard XTM22, or the sonicwall TZ 200.

We currently use the sonicwall NSA and PRO series at our offices, but heard that the XTMs were great for smaller installations...

Street price on both seems to be around $400 or so...

-Block ports so only specific ports are open to the web servers (80, 443), on each server via each IP block.
-Connect via VPN for remote management of the device (VNC)

Not sure if we really need the UTM aspects of the devices?

Thoughts / comments?
Question by:HADDADD3
  • 2
LVL 33

Expert Comment

ID: 34908016
the only thing the comes up immediately is the vpn aspect.  you can perform all the firewall aspects in your question, but the vpn between two sonicwall appliances is going to be more stable and easier to setup than one between a sonicwall and a watchguard.

Author Comment

ID: 34908032
Are both units comparable? Does it boil down to user preference?
LVL 33

Accepted Solution

digitap earned 2000 total points
ID: 34908087
i've used watchguard appliances and i don't like them...at all.  so, you're not going to get constructive advice from that aspect.  also, i'm just not familiar with the XTM22.  i know sonicwall though and i've setup VPNs between the two vendors and helped others here on EE set them up as well.  it was a pain and troubleshooting is even harder.  you can almost guarantee a vpn between two sonicwall appliances (barring any strange unforeseen nuance) is going to take less than 15 min to setup.

that said, both appliances are relatively new, so my guess is they are going to operate at the firewall level about the same.  so, it probably does come down to user preference, but i'm throwing in the consideration of VPN in regards to interoperability.

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
In the video, one can understand the process of resizing images in single or bulk. Kernel Bulk Image Resizer is an easy to use tool for resizing large number of images. One can add and resize multiple images with this tool in single go. The video sh…

588 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question