UTM

  • Securityut12.1_03

    Untangle 12.1 Review and Impressions

    So virtual firewalls and appliances are all the rage these days and there are many options to choose from. ย Historically, I have used a variety of different firewall/UTM platforms. ย I have always been a fan of the Untangle product as…

  • Networkingsite2sitefeat

    How to Configure Untangle site to site VPN

    In working on a DR project utilizing two Untangle virtual appliances, I had the need to setup a site to site VPN connection between the Untangle firewalls. ย The OpenVPN documentation is fairly decent on the Untangle site, however, the information…

  • Securityut12_12

    Untangle 12 Installation and configuration

    I am constantly on a quest to keep finding the better or best firewall/UTM appliance for home/lab purposes as well as for small business use cases where installing a virtual appliance or other whitebox appliance makes sense. ย I have been…

  • Securitysophos_xg18

    Sophos XG UTM firewall virtual appliance install and configure

    So the other day I received the announcement from Sophos they had released their “next generation” firewall appliance that would be providing the way forward for current 9.x users. ย Sophos did mention they are keeping both code branches however and…

  • Securitysecurity_01

    How to Increase Home Network Security

    Let’s face it, these days, our digital security is under attack just about anywhere we are and access our data. ย However, we may not think about security when we are at home. ย After all, home is our private place, our…

  • Securitysophosvpn2

    How to connect Shrew Soft VPN client to Sophos IPsec VPN

    So far I have really been impressed with the features and power of the Sophos UTM appliance. ย I have ran it both in a software based applianced running on a whitebox atom powered machine and also in a VMware virtual…

  • Securitysophos03

    Sophos UTM vs Untangle

    UTM or Unified Threat Management devices are becoming more and more popular as businesses and corporations have realized in the past couple of years that a simple tradition firewall of allows and denies is not adequate any longer. ย Hackers and…

  • Securityuntanglecryptofeat

    How to use Untangle to help prevent Cryptolocker infections

    Cryptolocker is probably one of the most malicious and feared malware infections in quite some time. ย Most malware infections are a nuisance at most and a good sweep by a spyware utility such as malwarebytes will clean up the infection…

  • Securityspamblock1

    How to find an infected network host sending SPAM messages

    A very challenging situation in a network environment where you may have several or even hundreds of network hosts is finding a specific host that is infected with malware.ย  Many variants of malware may send SPAM messages from the infected…

  • Networkingbypass3

    How to configure and implement network QoS using Untangle

    In today’s networks, connectivity is an essential part of successful communication in businesses an enterprise environments. ย Even though bandwidth is cheap these days, it is still a priority for network administrators to prioritize and limit mission critical traffic and non…