Solved

300-400 user router recommendations

Posted on 2013-10-29
2
333 Views
Last Modified: 2013-11-05
Hello,

I am just looking for recommendations for routers for this amount of users. We have a few different brands of routers we use for our clients but I am looking to explore other options. I am looking for a firewall that can nicely support 300-400 users and do basic things inbound/outbound firewalling bandwidth limiting and IPS. It is going to be used to host WiFi. I am looking for something that is cost effective and reliable. I know there are a lot of options but I am looking for my silver bullet with not tons of overhead and expensive maintenance plan. We currently a PC with open source software doing this.

Thanks in advance for your recommendations.
0
Comment
Question by:JMRSoftware
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Accepted Solution

by:
pergr earned 250 total points
ID: 39610718
The Juniper SRX. Model depends on bandwidth and the number of concurrent sessions, which will depend on the internet access policy for the users. The SRX240 is very strong and can also manage four access points.

The Fortigate is also strong - perhaps FG60 for this.
0
 
LVL 26

Assisted Solution

by:Soulja
Soulja earned 250 total points
ID: 39611502
I second the Juniper SRX Line. Very good firewalls! I have two SRX650 clusters that host thousands of users.
0

Featured Post

Myth Busting: MongoDB Scalability (it scales!)

I was talking with one of my colleagues from our Technical Account Manager team about MongoDB’s scalability. He mentioned to me that several customers have been telling him that “MongoDB doesn’t scale!” MongoDB’s scalability was in question?

My response was, “Is that a joke?"

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question