Pjbrown
New Member
- Joined
- Jan 24, 2014
- Messages
- 9
- Reaction score
- 1
Is a home or small business router with built-in firewall considered a hardware-based firewall that is acceptable for protecting PBX in a Flash (PIAF) from the internet?
I know that the recommendation is to place your PIAF behind a hardware based firewall, and don't open any incoming ports to the PIAF.
But I'm confused whether or not the firewalls built in to many of the consumer and small business routers is considered acceptable. For example, there are many wifi access points with built-in routers and firewalls that sell for about $200USD or less.
Is the recommendation that the firewalls built into most of the consumer oriented WIFI routers is NOT SUFFICIENT. For example, the Apple Airport Extreme, or one of the home-oriented D-Link, Netgear, Asus or DD-WRT based solutions? Are these even included in what you mean when you recommend a hardware-based firewall?
Or is the recommendation that these aren't acceptable, and we really need to buy a higher-end business class router with security (@ $300 - $500+ USD), or add a separate, dedicated security appliance such as some of the lower-end offerings ($200-$400USD) from companies such as Fortigate, sonicwall, and other brands?
Some Examples of lower-cost dedicated Security appliances I quickly found at newegg include:
NETGEAR FVS318 ProSafe VPN Firewall Switch ($235 USD)
ZyXEL ZyWALL USG50 Internet Security Firewall with Dual-WAN ($150 USD),
Fortinet FortiGate 20C Consolidated Security Appliance ($259 USD),
SonicWALL TZ 105 Network Security Appliance ($235 USD),
Cisco ASA5505-K8 Security Appliance with SW, 10 Users, 8 ports ($380 USD)
I'm confused on the topic, and don't want to spend money unnecessarily, but I will spend it in a heartbeat if that is the recommendation.
Thanks!
Sincerely,
-Philip
P.S. - I'm aware of QOS and VLANs as separate issues that can impact voice quality and performance... but that isn't my question. This post is strictly focused on securing the PBX from dangers of the big-bad internet.
I know that the recommendation is to place your PIAF behind a hardware based firewall, and don't open any incoming ports to the PIAF.
But I'm confused whether or not the firewalls built in to many of the consumer and small business routers is considered acceptable. For example, there are many wifi access points with built-in routers and firewalls that sell for about $200USD or less.
Is the recommendation that the firewalls built into most of the consumer oriented WIFI routers is NOT SUFFICIENT. For example, the Apple Airport Extreme, or one of the home-oriented D-Link, Netgear, Asus or DD-WRT based solutions? Are these even included in what you mean when you recommend a hardware-based firewall?
Or is the recommendation that these aren't acceptable, and we really need to buy a higher-end business class router with security (@ $300 - $500+ USD), or add a separate, dedicated security appliance such as some of the lower-end offerings ($200-$400USD) from companies such as Fortigate, sonicwall, and other brands?
Some Examples of lower-cost dedicated Security appliances I quickly found at newegg include:
NETGEAR FVS318 ProSafe VPN Firewall Switch ($235 USD)
ZyXEL ZyWALL USG50 Internet Security Firewall with Dual-WAN ($150 USD),
Fortinet FortiGate 20C Consolidated Security Appliance ($259 USD),
SonicWALL TZ 105 Network Security Appliance ($235 USD),
Cisco ASA5505-K8 Security Appliance with SW, 10 Users, 8 ports ($380 USD)
I'm confused on the topic, and don't want to spend money unnecessarily, but I will spend it in a heartbeat if that is the recommendation.
Thanks!
Sincerely,
-Philip
P.S. - I'm aware of QOS and VLANs as separate issues that can impact voice quality and performance... but that isn't my question. This post is strictly focused on securing the PBX from dangers of the big-bad internet.