Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Hands-On: SonicWall Brings UTM to SMB Wired and Wireless Networks

Setting up UTM capabilities, as well as gateway anti-malware and intrusion prevention, follows much the same model. I was able to define policies that enforced which features are applied to the traffic. Those policies proved to be much simpler to define than application policies. A wizard-like guide helped to prevent mistakes.

The gateway anti-malware capabilities work hand-in-hand with the firewall, leveraging packet inspection and reassembly to find malicious code. Intrusion prevention works in much the same way, except it examines the traffic for user identities, origins and so forth to determine if an intrusion is being attempted.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

Two features--anti-spam and content filtering--are not commonly found in an SMB edge gateway/firewall appliance, yet SonicWall bundles both of those in to the TZ-215 series. These capabilities are a nice addition and fit well into the UTM process. The anti-spam capabilities are integrated via a service methodology, which uses offsite resources to check email for spam. It is very easy to set up, requiring only some basic email server/account information to start examining email.

The content and URL filtering also works similar to a service. SonicWall maintains a database of websites that are placed into categories. The TZ-215W then uses that database to filter websites, which are either allowed or blocked based on a policy defined by the administrator. All in all, I found it simple to define the policies and set up the controls that make the anti-spam and filtering capabilities work.

Administrators looking to allow remote access and support bring-your-own-device (BYOD) methodologies will appreciate the TZ 215W's ability to validate new clients before admitting access to the network. The device incorporates client anti-malware enforcement: When a new client attaches to the network, the firewall validates that the client has anti-malware technology installed. If it does not, the client can be remediated and granted access to the network, or blocked from accessing the network. That proves to be a valuable capability for networks with a lot of guest traffic and temporary workers who bring their own devices onsite, and proves especially critical for sites offering Wi-Fi access to guests.

The TZ-215Wm includes 802.11 b/g/n connectivity and is controlled by defined policies that allow the device to work both as a public hotspot and a private wireless network. I was able to set up the device to allow guest users to access the Internet, but isolate them from the internal network at the same time. For internal users, I was able to quickly set up a VPN that allowed wireless users (as well as remote users) to access the internal network. The unit features both SSL and IPSec VPN capabilities, and includes a native SSL VPN remote access client for Apple iOS, Google Android, Windows, Mac OS and Linux operating systems.

SonicWall claims that the SPI Firewall offers 500 Mbps of throughput, which should meet the needs of most branch offices. However, it is worth noting that when UTM is enabled, throughput drops down to a reported 60 Mbps. VPN based connections offer 130-Mbps throughput, and the intrusion prevention engine offers 110 Mbps. Simply put, throughput is variable and depends upon the feature mix put in place. That said, performance, which is a combination of UTM/gateway anti-virus/anti-spyware/IPS throughput measured using the Spirent WebAvalanche HTTP performance test and Ixia test tools, is rated at 110 Mbps.

Make the most of your security tools by reading Strategy: Fundamentals of User Activity Monitoring. Free, registration required


Page: « Previous Page | 1 2  


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers