Hello,
I must also put my bid in for Watchguard. I got to set one up at my
last job (a firebox II). It has a decent windows GUI (It too, is a
Linux box, just already set up). Logging tools are pretty good, VPN is
available and pretty snappy, etc. It talks PPTP and its own flavor of
VPN. I can't tell you just how pleased I am with its ability to be
quiet on the network. I liked the way it responded (or *didn't*
respond) to a wide variety of "tools".
As far as proxies go, it is better than I expected. It had (as of
January) HTTP, FTP, SMTP proxies (maybe others). You can set different
proxies for inbound and outbound and to DMZ. We actually used proxies
to the outside world and then IP filtering everywhere else, but you have
to decide that. I was pleased with the useability of the proxies. HTTP
proxy, for example, can block certain mime types in a web page. SMTP
proxy can block certian *.exe attachments and also attachments by MIME
type. So, you can block all *.exe, *.com, *.pif, etc. This really
helped us with email viruses. We actually never got any infections in
the year or so we had SMTP turned on.
I did have a problem with the NAT daemon. If you are planning a
moderately complex network with multiple external addresses, which we
were, you've got to be really careful. For example, you can NAT
incoming connections on one IP like port 80 goes to 10.0.0.1 and port 25
goes to 10.0.0.2. What you *can't* do is have any *outbound* traffic
reNATed to be a certain external address. So, mail goes in one IP
address and out the other. I didn't like this because then other SMTP
servers were probing AUTH on 113 of the wrong IP address. This really
bugged me. We could have set up an incoming AUTH NAT to the correct
machine, but we could have been blacklisted for sending SMTP over the
wrong IP address, compared to our DNS entry. It also meant that we
couldn't have more than one seperate domain in our subnet, without
having to use the main IP address as SMTP inbound. So, we had to
restructure all our IP addresses to fit this stupid oversight. Or, use
*real* IP addresses in the DMZ and don't NAT them. We supposed the
extra NATting gave us an extra level of protection. YMMV.
Other than that, the box has been awesome and I would recommend it to
anyone with a mostly straightforward IP addressing scheme. Especially
if you only have one external IP address. Then you are golden.
just my $.02
-Steve
rough draft of network:
[ internal lan 10.0.x.x] -- [ Firebox ] -- [ external net block ]
|
|
[ DMZ 192.168.x.x ]
If you are a FreeBSD'er, you might want to note that a genious co-worker
set up multiple NICs in the DMZ servers and installed Jail. The Jailed
root processes couldn't talk to the internal LAN via the firebox because
it wouldn't route anything inside that came from the externally attached
DMZ NICs. They were also on a diffent subnet. Putting them on a switch
would have been a smart move, too. But they could only contact the
outside world. The unjailed processes could talk to the internal lan
and both jailed and unjailed shared files. So, there was no real
network flow between the outside and the inside for certain ports. I
was impressed.
Then again, we had VPN turned on.
Naren T wrote:
> Hi,
>
> Both, Netscreen and Sonicwall are built on the same technology .. stateful
> inspection .. and none is better (or worse) than the other .. apart from
> whatever their own sales team talks of ...
>
> My vote for Watchguard .. (though this too, like NS and Sonicwall does not
> host DNS) ...