My client has one headquarter and 7 remote offices. Each of them are located in different countries.
All the remote offices has a leased line with the headquarter , and they also have an Internet connection. Main traffic like SAP goes through leases lines, but we will create VPNs to pass email and http traffic through it. Is it neccessary to install a Firewall in each remote office, or it is ok to have just a Firewall in the headquarter. (Let´s suppose each office has just NT Proxy)
Should I expect it is secure working only with routers running VPNs and just one Firewall?
One more question: Can Cisco Secure filter unwanted web pages or detect them like WebSense?
Each Internet entry point must be secure. A proxy filter is not a good stand-alone solution; I wouldnt call it a firewall myself. You could put small PIXs at all the remote offices, get rid of all the leased lines and setup Vpns from all remotes to headquarters and youll end up saving a lot of money in the end. You can use Web Sense with the PIX to restrict your users to only approved Internet locations. It integrates easily with the PIX.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...