I prefer to keep those functions on the firewall in most cases, if it can
reasonably do so.

More layers of security, smaller attack surface, less downtime associated
with patching, etc






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market…*




On Wed, Jan 22, 2014 at 11:58 AM, J- P <[email protected]> wrote:

> Hi all,
>
> I have a client that has a Sonicwall tz 170 or 190 and the ssl appliance
> 200 I believe, either way both are end of life , and no support on them,
> so we are looking at a replacement , here's the environment;
>
> 2 site to site tunnels (one to a draytek, other to a cisco ) small office
> each 5 users
> Dual wan required & VPN obviously,
>
> HQ;
> VMWARE essential host (guest 2008ts with Citrix Fundamentals)
> 1 OSX server , profile manager (10 macs)
> 1 2003r2 DC
> 1 2003 member with SQL
> 2 hyper v host  running 2012 (Guest on host 1 exchange 2013. Guests on
> host 2008r2 DC, 2012 file server, 2012 RDS in Eval mode not sure if they
> want to convert from Citrix Fundamentals yet)
>
> 50 local users, most of which remote in via citrix, however, the designers
> need to VPN in on their MACs in order to access /edit files with OSX .
>
> Given all the capabilities /options with 2012 VPN , remote web access,
> direct access  etc,
> does it make more sense to still use the firewall to handle all these
> tasks, or should I be looking at server 2012 to handle these connections
> ?
>
>
> Thanks for your imput
>
>
>

Reply via email to