An RV042? If so that is just a router – not a firewall (although it looks like it has some sort of optional cloud based web filtering).
We’ve been extremely pleased with our Palo Alto units. They aren’t cheap, but they are light-years ahead of anything else out there in terms of their protection. And the best part is that Palo Altos have several Ethernet ports that can be configured to provide protection for different applications. You can use ports in layer 3 mode (as a router/NAT device), or you can use them as a layer 2 device where they are transparent. From: [email protected] [mailto:[email protected]] On Behalf Of J- P Sent: Friday, June 3, 2016 8:07 PM To: NT <[email protected]> Subject: [NTSysADM] Perimeter Protection dual FW Hi all, A few years back a voip vendor came to a site to install 3CX, at the time he claimed the Sonicwalls "didn't play well" so for the 3CX (VOIP) server he installed a Cisco RV02 (or something to that affect), so the current design is as follows; isp 1 (fiber)> switch > 1 line to Cisco , 1 line to Draytek (50 meg) isp2 (cable)> switch > 1 line to Cisco,1 line to Draytek (25 meg) The client finally has agreed that an additional "Perimeter" defense layer should be added (oh did I mention one of his friends got hit by randsomeware [Emoji] ) I bet that was influential in his decision- So the question now remains , is there a way to have ONE service protect both? or should we toss the the second firewall and stick to one? And either way, what would you recommend keeping in mind the client only has a total aggregate bandwidth of 75 megs any thoughts , feedback recommendations are greatly appreciated TIA JP

