Most of my customers have more than one or two sites which are connected with the IPsec tunnel. For some people, they need VPN to enter the particular main HO site and access all other remote site subnets, such as when there is a file server hosted on another site. This was a simple use case: from one site, they will enter from SSL VPN to one site and access all their remote sites using this VPN policy only. We don't need to require the VPN for all particular single sites; we create only one single VPN, and from that single console, they can access all these sites as well.
Currently I am working at AVH, which is a system integrator that provides solutions such as security and UTM solutions to clients. My task is the complete installation and implementation of these firewalls and, apart from that, post-support calls. If clients are facing any issues, they reach out to our company, and the company assigns me to their tech solutions.
For the initial setup, we create an SSL VPN portal for this customer's public IP, and we make some local subnet so that the user will get some local subnet IP after connecting with Sophos UTM. After that, we allow the security policy, which determines which resources they can access after connecting with Sophos UTM. They access Sophos UTM VPN using the public IP, and then when they enter the site, they can access the limited resources we have allowed in the policies.
The most useful features I have worked with in Sophos UTM mostly involve the DNATing process and their web filters. Many customers require these web filters to be aligned, such as when they need to access resources over the VPN or over the DNATing process.
Application control reduces their bandwidth consumption. When users consume large amounts of bandwidth, this application filter can limit their usage, ensuring they won't face bandwidth failures. Users are limited to a particular bandwidth for a specific application only.
When connecting to Sophos UTM VPN, certain applications can be restricted from being accessible using this VPN policy. It is more secure with more granular security, allowing the user to only access specific, allowed applications.
I can very easily manage my Sophos UTM VPN users and get all the logs, details, and traffic monitoring over my single dashboard console.
For the challenges I've faced, zero trust is one area where I haven't worked much or have sufficient experience.
I have around 2.5 years of experience in this particular domain.
I currently don't have experience with deployment issues.
I have connected with the Sophos UTM technical team one or two times.
It is user-friendly and straightforward, so there are no certain challenges to configuring this VPN with Sophos UTM.
Compared to other OEMs and other vendors' firewalls, Sophos UTM is very user-friendly. It has a user-friendly dashboard so that anyone, even a new beginner, can easily learn where the options are and how to configure UTM profiles. Different industries such as hospitality and manufacturing can have customized UTM profiles. The UTM is a granular and easy step, and non-standard categories can be manually added.
Regarding pricing, it's affordable for the features that Sophos UTM provides; there is no higher price, it is affordable.
When deploying on-premises, all customers have suggested this deployment type. Occasionally, there are certain failures; however, it's mostly user-friendly and reliable, with no major challenges in configuration. I definitely suggest checking it out.
On a scale from one to ten, I rate Sophos UTM a nine.