Solved

SonicWall TZ200 Content Filtering Service

Posted on 2012-03-21
2
919 Views
Last Modified: 2013-12-06
We recently purchased a SonicWall TZ200 firewall with SonicWall's content filtering service.  My question is to see what others are doing for authentication of users to the firewall.  Are you having your end users logon to the firewall, or are you setting it up through AD and LDAP?

My concern with AD and LDAP is if your LDAP server goes down, then internet access is blocked for all users.

Any thoughts are appreciated.

Thanks,
0
Comment
Question by:tgarrity
2 Comments
 
LVL 3

Accepted Solution

by:
Konsultant earned 500 total points
ID: 37749678
You can try SSO for web (and other) access. You can run two agents each on one domain server. This way you will have some fail over in palace. Since you have only one sonicwall in place and you can not cluster it worrying about the AD server downtime is a moot point.
You would use LDAP more for user authentication when they coming from WAN over IPsec VPN (remote access).

Good luck!
0
 
LVL 1

Author Closing Comment

by:tgarrity
ID: 37765819
Sounds good. Thanks!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Watchguard Firewall Setup 3 90
cannot send E-mails to one company 15 92
Cisco switch SVI 17 96
network error 8 49
We sought a budget ($5,000) firewall solution that would provide all the performance we needed with no single point of failure.  Hosting a SAAS web application in our datacenter, it was critical that we find a way to keep connectivity up and inbound…
Introduction Many times we come across a slowness or instability between two hosts, and almost always we blame the poor networking guys, just because they're an easy target.  Sometimes we forget that other factors including disk bottlenecks, CPU …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question