Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking
    • Small Business

    Stonesoft FW-1020 Firewall Is a Scalable Solution for SMBs

    By
    Cameron Sturdevant
    -
    July 30, 2007
    Share
    Facebook
    Twitter
    Linkedin

      Stonesoft’s FW-1020 packs effective firewall and VPN technology into a $7,700 1U appliance that can be clustered with up to 15 additional Stonesoft firewalls of varying models to provide scalable, redundant network protection.

      I tested the FW-1020 at eWEEK Labs and found the device suitable for small and midsize organizations that have a small number of distributed offices. The central management console, StoneGate 4.0, effectively corrals firewall policies and made it easy to push these network access rules out to the FW-1020 device.

      The FW-1020, which was part of a flurry of Stonesoft announcements made May 7, is part of a family of appliances that span from 10GB throughput firewalls to branch office models. The FW-1020 comes as an appliance or can by purchased as software only that is installed on approved hardware that you supply. In either case, the product is competitively priced compared to SonicWall, WatchGuard and CheckPoint solutions.

      It’s a good thing that the FW-1020 can be clustered because the chassis has only one power supply and one fan, neither of which is hot-swappable. In fact, there are no user serviceable parts in the device. We voided the warranty on ours and opened the case to have a look inside. Our system was equipped with 1GB of RAM and a 250 GB hard drive for configuration and log storage. While I think that most organizations will want to cluster similar devices, the FW-1020 can be clustered with just about any other Stonesoft firewall.

      /zimages/7/28571.gifClick here to read more about endpoint protection software.

      Like other firewalls in this mid-sized class of products, the FW-1020 provides IPSec and SSL point-to-point and remote user VPN capabilities. I used the remote user VPN client to get access to my lab network while away from the office with a minimum of fuss. As with all other aspects of the product, I configured the FW-1020 VPN through the StoneGate central management console.

      In this case the management software was installed on a Windows 2003 server. I accessed StoneGate from a Windows PC running Windows XP via a StoneGate management client package. While the clients can be deployed using Web deployment tools that Stonesoft provides, I hope that the company considers a Web-based management interface.

      Having to install the management client didn’t really add much to perception of product security but did increase the inconvenience of managing the product. Stonesoft users who upgrade to the StoneGate 4.0 product also need to pay attention to potential management client problems including having to manually upgrade the client when the management console changes versions.

      The management console is quite easy to use. I was up and running on the interface, creating firewall and VPN policies with about half a day of training. While the basics of using the interface are easy to catch on to, IT managers will need to assign experienced security staff to configure and maintain the FW-1020, as is the case with any firewall.

      I did like the automated tools that captured device configuration whenever I updated firewall rules. More than once I needed to roll back to a previous firewall configuration after configuring policies that were too constricting. Many of the configuration tasks in the StoneGate software made it easy to revert to previous configurations. The product also pops up tips to ensure that policies work correctly.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Avatar
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected]

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×