Need Firebox x1000 managment software

Anyone know where I can obtain Firebox MSW for an X1000 I obtained off of E-bay?
Sheldon LivingstonConsultantAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Blue Street TechLast KnightCommented:
Hi classnet,

This is a discontinued firewall. It's going to be tough. I'd recommend upgrading this to the NGFW/UTM that can actually handle today's current threat landscape. The technology used in this firewall is deprecated now.

It looks like you need Fireware v8.0 (includes WFS v7.4) and WSM 8.0 here: http://watchguard-system-manager.software.informer.com/8.0/

WARNING: Most of the web seems to think this is a safe website, but I can't warrant it so download it at your own risk.

Here are the guides to your version needed (v8): http://www.watchguard.com/help/documentation/legacy.asp#Early

I doubt that WSM v11.10 (latest release) would work for you? But in any case it's located here: https://watchguardsupport.secure.force.com/software/ on the right hand side under Quick Links.

Let me know how it goes!
Blue Street TechLast KnightCommented:
I updated my last post, please refresh and re-read. thanks!
Sheldon LivingstonConsultantAuthor Commented:
Does " I'd recommend upgrading this to the NGFW/UTM that can actually handle today's current threat landscape." mean that this unit, this piece of hardware, can be upgraded to the NGFW/UTM or are you stating to scrap this and get a new unit all together?
SolarWinds® IP Control Bundle (IPCB)

Combines SolarWinds IP Address Manager and User Device Tracker to help detect IP conflicts, quickly identify affected systems, and help your team take near instantaneous action. Help improve visibility and enhance reliability with SolarWinds IP Control Bundle.

Blue Street TechLast KnightCommented:
If you are concerned about security, I'd recommend a new unit altogether. :(

Firewalls because they are a part of the security matrix must be as current as possible...they are at the top of the security food chain. Older units lack the fundamental security technology needed for todays threats.

I'd suggest a 3 year refresh cycle.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Sheldon LivingstonConsultantAuthor Commented:
Thank you for the input... in model you'd recommend?  This is for a school getting ready to phase in iPads... starting a 1 to 1 initiative.
Blue Street TechLast KnightCommented:
How many users/students will this be handling?

What will be its main duties (types of traffic), e.g. Exchange, Wifi Connections, VPNs, DHCP, etc.?
Sheldon LivingstonConsultantAuthor Commented:
In 3 years or so about 500 users... about 50 now.  We use Google Apps for the 35 faculty email... no email for students...

iPads will be WiFi.  

Plan on using VLANs to for content filtering with our managed switches
Blue Street TechLast KnightCommented:
OK, great. To clarify when you say 1:1 you are referring to an iPad to student ratio, but does this account for any other computers/nodes, e.g. computer labs, etc. because initiatives do not account for what already exists? Also, are there any multipliers, e.g. student smartphones, student desktops, guest WiFi access, etc.? The idea here is to make sure that if you have 50 students that doesn't equate to 100 or 200 devices/nodes between them...and if it does that is OK but we need to know this upfront to accurately size the solution. Developing a good VLAN strategy will be critical for security contexting (the allocation of devices separated by Zones so that one device cannot maliciously attack another Zone and additionally cannot communicate with another device in the same Zone (single node privacy). This would be mandatory to segregate student networks from faculty networks for improved security using one physical security appliance but also to for any servers within the network. Don't worry about Zones needing to talk with one another that will be handled explicitly in Access Rules with specific rules based on Service level access needs.

With the specs you have provided me thus far (provided that they don't change from my questions above) all of the systems I have recommended below will be able to handle any VPN need, management of all the WAPs (Wireless Access Points provided that they are SonicPoints), multiple VLANs for a dynamic network segmentation and the current user count with the ability to scale to 550+.

WatchGuard and SonicWALL are competitors but in my opinion SonicWALL beats them hand over fist in regards to security and functionality advancements...best bang for your buck by far. I'm going to be referring to nodes below and for clarity nodes can be any network objects requiring an IP. Nodes are used to understand the network needs because you could easily have 1 user that consumes 4 nodes (Desktop, laptop, tablet, & a smartphone). This is why I asked about the multipliers earlier.

I'd recommend an DELL SonicWALL NSA 2600 or an NSA3600, which will both scale and be able to support up to 50-500 nodes (they can do less than 50 obviously but the sizing would be skewed). You'll want to order them with CGSS (Comprehensive Gateway Security Suite) - it provides a Gateway security sweet that is vital part of a multi-layered defense, firmware upgrades and 24/7 tech support. You could make them last 5 years provided that you renew this subscription, but any longer would be unwise. In three years or when you reach the 500+ mark...say 600, 700 you'll want to get into an NSA 5600 (500-1000 nodes). Here are the links below so you can see more details about them:

DELL SonicWALL NSA 2600: http://www.sonicwall.com/us/en/products/NSA-2600.html
DELL SonicWALL NSA 3600: http://www.sonicwall.com/us/en/products/NSA-3600.html
DELL SonicWALL NSA 5600: http://www.sonicwall.com/us/en/products/NSA-5600.html

Here is a comparison: http://www.sonicwall.com/us/en/products/NSA-Series.html#tab=compare

I'd be happy to dial you all in when you are ready to order and configure/install it if you like. We can go over VLAN & Wireless strategies, functionality, security best practices, etc. If you are interested click on my name, which will take you to my profile where you can contact me.
Peter WilsonITCommented:
Good solution. I need this for our school. Currently we are having major issues with throughput with our firewall. How can I have dual wan failover with a sonicwall?
Blue Street TechLast KnightCommented:
Hi Peter,

Thanks. You can easily achieve dual WAN failover with any NGFW SonicWALL, but please post a new question about this since its off topic and this questions is already closed. I'll lookout for your questions and answer it in detail. Thanks!
Sheldon LivingstonConsultantAuthor Commented:
Thank you diverseit
Blue Street TechLast KnightCommented:
My pleasure!
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Hardware Firewalls

From novice to tech pro — start learning today.