![]() Then in subsequent installments, we’ll delve more deeply into additional features. In the first of this series of articles, we’ll discuss some of the benefits of using Sophos UTM as a replacement for TMG and take a look at UTM’s firewall and NAT features and functionalities as well as its Intrusion Prevention System (IPS) feature. Sophos UTM can, of course, be integrated with Active Directory for authentication, or it can use other LDAP, RADIUS, TACACS+ and Novell eDirectory authentication servers. Gartner’s Magic Quadrant now classifies Sophos as Leaders Quadrant members in the unified threat management sector. Their UTM solution is based on Astaro technology, which they acquired around four years ago. Sophos has been in the security business for a long time and you might be familiar with their antivirus software. You can also set up cluster nodes to distribute traffic for redundancy and load balancing, or use the high availability failover feature to create a “hot standby” system that will take over if the primary system fails. So you have plenty of options regardless of the design model you prefer. You can also deploy it in Amazon’s Virtual Private Cloud. The best part is that you don’t have to buy a new appliance you can run UTM on the server on which you run TMG, or in a virtual machine running on Hyper-V or VMware. In fact, Sophos is heavily marketing this product as the idea TMG replacement UTM based appliances are being sold based on that promise. One replacement candidate that I kept hearing great things about, from others who either were still in the testing stage or who had gone ahead and made a replacement decision, was Sophos Unified Threat Management (UTM) solution. You can find the first article in that series here. A while back, I wrote a five-part series about some of the factors you should consider when you start evaluating possible replacement solutions. Since Microsoft announced its plans to stop development and eventually stop support for many of its Forefront products, including our beloved Threat Management Gateway, many of us have started thinking ahead to the day when we’ll have to implement a replacement. We all know that our love affair with TMG will one day come to an end. In addition, the browser must be configured not to use a proxy for the IP address of Sophos UTM on AWS’s internal network card (eth0).If you would like to be notified of when Deb Shinder releases the next part in this article series please sign up to our Real Time Article newsletter. Browser: Sophos UTM on AWS requires the latest version of Firefox (recommended), latest version of Chrome, latest version of Safari, or last two versions of Microsoft Internet Explorer.Processor: Clock signal frequency 2 GHz or higher.The hardware and software requirements for the client PC used to access WebAdmin are as follows: To make the installation and operation of Sophos UTM on AWS Software less error-prone, you are advised to only use hardware that is listed in the HCL. ![]() The Hardware Compatibility List (HCL) is available at the Sophos Knowledge Base. Sophos provides a list of hardware devices compatible with Sophos UTM on AWS Software. Note that this switch must have jumbo frame support enabled. Switch (optional): A network device that connects (and selects between) network segments.USB (optional): One USB port for communications with a UPS device and one USB port for connecting a Sophos UTM on AWS Smart Installer(SUSI).If you want to set up a high-availability system, both units need to be equipped with heart-beat capable network interface cards. ![]() In a high-availability system, the primary and secondary system communicate with one another through so-called heart-beat requests.
0 Comments
Leave a Reply. |