Friday, September 28, 2018

Network firewall config recommendation needed - former admin "installed" Sonicwalls but never connected them to network.

We recently discovered some tampering in one of our datacenters and realized our former systems/network admin left us in worse shape than we were led to believe - need recommendations on best practices config. I stopped doing network admin back early 90's, so my more contemporary network skills stop at your typical home routers.

We have two datacenters with multiple public IPs, a Cisco 2800, and a Sonicwall TZ600 in each. Our original layout has the Cisco's providing NAT, the VPN link between the two datacenters, and VPN connectivity for a few clients. We picked up the Sonicwalls about 3 years ago and were under the impression the former admin had installed them, but on a recent trip to the datacenters the owner and I found that they were powered on, but not cabled in.

The owner is under the impression we can enable some type of 'passthrough' mode in the Sonicwall that would allow him to put them between the datacenter drop and our Cisco, but from what I'm reading it feels like we should be moving the NAT to the Sonicwall, and possibly either eliminate the Cisco or relegate it to working as a switch.

What is the recommended way to put these into our network?



No comments:

Post a Comment