?
Solved

SonicWall TZ200 Content Filtering Service

Posted on 2012-03-21
2
Medium Priority
?
925 Views
Last Modified: 2013-12-06
We recently purchased a SonicWall TZ200 firewall with SonicWall's content filtering service.  My question is to see what others are doing for authentication of users to the firewall.  Are you having your end users logon to the firewall, or are you setting it up through AD and LDAP?

My concern with AD and LDAP is if your LDAP server goes down, then internet access is blocked for all users.

Any thoughts are appreciated.

Thanks,
0
Comment
Question by:tgarrity
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
Konsultant earned 2000 total points
ID: 37749678
You can try SSO for web (and other) access. You can run two agents each on one domain server. This way you will have some fail over in palace. Since you have only one sonicwall in place and you can not cluster it worrying about the AD server downtime is a moot point.
You would use LDAP more for user authentication when they coming from WAN over IPsec VPN (remote access).

Good luck!
0
 
LVL 1

Author Closing Comment

by:tgarrity
ID: 37765819
Sounds good. Thanks!
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many network operators, engineers, and administrators do not take several factors into consideration when troubleshooting network throughput and latency issues.  They often  measure the throughput by performing a measurement  by transferring a large…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month7 days, 22 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question