Solved

Is the use of a Sonic TZ 210 transparent to the client

Posted on 2011-03-03
5
1,086 Views
Last Modified: 2012-05-11
We currently have a Gatedefender Integra as our UTM.  Our service contract is coming for renewal and I would like to replace it with a new UTM.  I am looking at Sonicwall TZ 210.  Can anyone tell me if the user has to login (other than his Window 2003 account) to have access to the services offered by the TZ 210?  Before, getting the Gatedender Integra, I had been looking into UTMs and some required the user to not only log in to their windows account, but also into a UTM account.  

Any input would be greatly appreciated.
0
Comment
Question by:MomForLife
  • 3
  • 2
5 Comments
 
LVL 33

Accepted Solution

by:
digitap earned 500 total points
ID: 35030729
no, users do not. the sonicwall initially applies its security services based on zones. you can, however, customize different types of content filters, for instance. then, have users login to the sonicwall to get their content filter applied.  but, by default, they do not have to login.
0
 

Author Comment

by:MomForLife
ID: 35030924
Do you know if it can run as a router or does it have to run in transparent mode?
0
 
LVL 33

Expert Comment

by:digitap
ID: 35030971
i'm not sure what your question means. you don't have to run it in transparent mode. it is a firewall and will route traffic regardless. the key here is what's happening with the traffic as it passes LAN <> WAN. since it is a firewall, it will NAT that traffic. you can't turn that off...well, you could, in a way, but you'd be using it outside of the scope the hardware was meant to be used.

make sense. am i understanding correctly?
0
 

Author Comment

by:MomForLife
ID: 35061457
Thank you
0
 
LVL 33

Expert Comment

by:digitap
ID: 35061536
you're welcome. thanks for the points!
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now