Solved

Firewall / Proxy Software recommendation for a large network

Posted on 2013-05-13
1
238 Views
Last Modified: 2013-05-20
We are currenlty using ISA 2006, out of date and causing a lot of issues. I wish to install a new firewall software based solution and was wondering what you would recommend.

I want the solution to do the following:
1) Act as a proxy server
2) Allow authenicated users in externally
3)Possible DHCP & DNS roles

Any feedback is appreciated
0
Comment
Question by:James Danahay
1 Comment
 
LVL 1

Accepted Solution

by:
Mad-Mac earned 500 total points
ID: 39164040
I propose a solution:

http://www.endian.com/en/community/overview/

Download link: http://www.endian.com/index.php?id=400

Very simple free solution. Knowledge of Unix - not required :)
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sonic Firewall re-routing 443 wrong server IP 10 123
Do I need a hardware firewall? 12 84
Windows Firewall Dropping Allowed Packets 7 316
Cisco asax sourcefire Ips 7 69
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question