Solved

FortiWiFi-30D

Posted on 2014-02-12
4
1,024 Views
Last Modified: 2014-02-13
Does anyone have experience with any of the FortiWiFi products?

20C
20D
30C
30D

???

I'm particularly looking at the 30D...it looks highly capable and it has the FortiOS v.5.0.

I'd hope to gather experience, opinions, and establish dependability and ability to thwart threats...

Thank you Friends,
0
Comment
Question by:neowillendit
  • 2
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Garry-G earned 500 total points
ID: 39855587
From a functional point of view, all current FortiGate products are more or less identical, apart from the performance. The "D" products use the most current set of custom chips, which have improved the pattern scanning on the devices even further. If the 30D model fits your needs would have to be decided depending on your requirements ... e.g., mainly what bandwidth of uplink do you have ...
Judging from the spec sheet (http://www.fortinet.com/products/fortigate/20-30-40Series.html), the 30D (at almost hte same price as the 40C) delivers clearly higher (in most areas) or identical (for AV flow) performance as the older model, so it should definitely be preferred over the 40C model. The 20 model might be barely sufficient for a home user/office, but could be overloaded with current broadband connections ... so I'd stay away from that ...
0
 
LVL 1

Author Comment

by:neowillendit
ID: 39856522
This is awesome news, thank you Garry-G.

Is there anything I should consider, and do you have good experiences with them?
0
 
LVL 17

Expert Comment

by:Garry-G
ID: 39856858
We have something like 4-5 dozens of FGs (mostly 60C/D, couple 40/110 and larger) out in the field, pretty reliable in general ...
In general, FGs are very good value for the price, out-performing many other higher-priced manufacturers both in straight out performance and features ... for most of the usual use in the area of connecting a site to the Internet, you should be fine getting one on the uplink ... also, configuration is pretty much straightforward at least for most of the common tasks, though there are some tricky areas ...
0
 
LVL 1

Author Closing Comment

by:neowillendit
ID: 39857319
Great information, thank you Garry-G
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Cisco 1830 AP behaving wierdly 7 21
Read-only access for auditors 5 42
SIEM traffic 5 26
Set cookies HttpOnly and Secure 4 51
Need WiFi? Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it.  - Perhaps you have an Ethernet port into a network but no WiFi nearby. - Perhaps you have a powerline extender and no WiFi at the…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now