Lead Image © Guido Vrola, 123RF.com

Lead Image © Guido Vrola, 123RF.com

Professional protection for small and mid-size enterprises

Puzzle

Article from ADMIN 63/2021
By
To what extent does the Untangle NG Firewall, where apps come together like pieces of a jigsaw, meet customer criteria for protection, usability, price, and support?

Founded in 2003, US manufacturer Untangle Inc. offers a security solution in the form of NG Firewall [1] tailored to networks in small and medium-sized enterprises (or larger companies with many branch offices). The idea is to empower small companies in particular to achieve a security standard that is otherwise only available to far larger companies, with the integration of successful open source applications combined with an easy-to-use and flexible user interface.

Untangle Firewall is available as a free version with limited capabilities, or admins can purchase individual functions or the complete range of functions as commercial products.

The Untangle NG Firewall can be installed on various systems, and the manufacturer offers hardware appliances, but you can also put together your own system according to your individual requirements. However, you do need to pay attention to the hardware requirements. Alternatively, you can install the software as a virtual appliance for VMware or as a virtual machine (VM) for Hyper-V. Additionally, deployment in the cloud is supported on Amazon Web Services (AWS) or Microsoft Azure.

Firewall Structure

The basis of Untangle NG Firewall is a hardened Debian Linux, which is responsible for managing the network interface cards, routing, network configuration, and other basic services. On top of this operating system sits the Untangle VM, a Java VM within which the various firewall functions run. These functions are encapsulated in individual apps (applications) and can be (de)activated as required.

Traffic arrives at a physical network interface card, and the operating system forwards it to a virtual interface within the Untangle VM, where it is processed in a rules-based session. The firewall then forwards the traffic through another virtual interface to the appropriate physical network

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • New versions of the Endian and Sophos UTM solutions
    UTM systems combat all kinds of dangers under the policy of Unified Threat Management. The demands and expectations of customers fuel competition. Two of the most popular manufacturers – Endian and Sophos – have now released new versions of their solutions.
  • Tested: Barracuda firewall X201
    With a number of new firewalls, Barracuda seeks to expand its portfolio to include small and medium-sized companies. We take a closer look at the Barracuda firewall X201.
  • Network security in the Google Cloud Platform
    Creating complex network infrastructures on the Google Cloud Platform is quick and easy with virtual private clouds, but fast doesn't always mean right. We look at the on-board tools you need to heighten your cloud security.
  • IPv6 Tables
    We design a basic set of ip6tables rules for an IPv6 firewall.
  • Setting up secure RDP connections
    Know when to make RDP available on the Internet for remote access to Windows Server and how to configure connections securely when you do.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=