An RV042? If so that is just a router – not a firewall (although it looks like 
it has some sort of optional cloud based web filtering).

We’ve been extremely pleased with our Palo Alto units. They aren’t cheap, but 
they are light-years ahead of anything else out there in terms of their 
protection.

And the best part is that Palo Altos have several Ethernet ports that can be 
configured to provide protection for different applications.

You can use ports in layer 3 mode (as a router/NAT device), or you can use them 
as a layer 2 device where they are transparent.



From: [email protected] [mailto:[email protected]] On 
Behalf Of J- P
Sent: Friday, June 3, 2016 8:07 PM
To: NT <[email protected]>
Subject: [NTSysADM] Perimeter Protection dual FW


Hi all,


A few years back a voip vendor came to a site to install 3CX, at the time he 
claimed the Sonicwalls "didn't play well" so for the 3CX (VOIP) server he 
installed a Cisco RV02 (or something to that affect), so the current design is 
as follows;



isp 1 (fiber)> switch >  1 line to Cisco , 1 line to Draytek  (50 meg)

isp2 (cable)> switch > 1 line to Cisco,1 line to Draytek   (25 meg)


The client finally has agreed that an  additional  "Perimeter" defense  layer 
should be added

(oh did I mention one of his friends got hit by randsomeware [Emoji] ) I bet 
that was influential in his decision-

So the question now remains , is there a way  to have ONE service protect both? 
or should we toss the the second firewall and stick to one?

And either way, what would  you recommend  keeping in mind the client  only has 
a total aggregate bandwidth of 75  megs

any thoughts , feedback recommendations are greatly appreciated

TIA
JP


Reply via email to