We have an interesting office setup, and are trying to figure out ways to make it more secure, and was wondering if the AT community could give some suggestions.
Currently:
3 offices
1 server @ main office running Win 2k Server
other 2 offices connect to the main office through Terminal Services
in terms of computers - there are about 10 computers at the main office, and 10 at the other 2 offices combined -- so 10 connect over LAN, and the other 10 connect as TS clients. the 20 computers run either win xp pro or win 2k pro
the software we run uses SQL server
the computers all use business grade dsl w/dynamic ips, forcing the main office to use one of those dynamic ip alias programs like dynalias.
we consulted the person who currently services our network, and he gave us an outrageous estimate (imho) of around $15k to buy a new server, sonicwall firewalls, and create a vpn between two of the three sites. in addition the new server would be placed at one of the other offices, and would hold a duplicate copy of the main server data. this would allow for people to work locally at the 2nd office, and changes would be replicated back and forth.
from my understanding of what i found online, rdp protocol is encryptable and secure when encrypted. our experience with terminal services has shown that we do not really need a local server for performance needs... mainly in case the internet connection breaks (which has happened 2 or 3 times in the past year).
data being transmitted between offices is sensitive and needs to be protected.
is there a necessity for vpn in order to be secure?
is there a necessity for a sonicwall firewall (we currently have a zyxel router/firewall that came iwth the dsl service)?
my main qualm with the sonicwall solution is that there is an inherent subscription charge and other licensing fees associated with it that need to be renewed yearly ... so it is not a one-time cost, but rather a recurring fixed cost.
what are some other good practices/suggestions to increase security?
all suggestions welcome and thanks in advance.
Currently:
3 offices
1 server @ main office running Win 2k Server
other 2 offices connect to the main office through Terminal Services
in terms of computers - there are about 10 computers at the main office, and 10 at the other 2 offices combined -- so 10 connect over LAN, and the other 10 connect as TS clients. the 20 computers run either win xp pro or win 2k pro
the software we run uses SQL server
the computers all use business grade dsl w/dynamic ips, forcing the main office to use one of those dynamic ip alias programs like dynalias.
we consulted the person who currently services our network, and he gave us an outrageous estimate (imho) of around $15k to buy a new server, sonicwall firewalls, and create a vpn between two of the three sites. in addition the new server would be placed at one of the other offices, and would hold a duplicate copy of the main server data. this would allow for people to work locally at the 2nd office, and changes would be replicated back and forth.
from my understanding of what i found online, rdp protocol is encryptable and secure when encrypted. our experience with terminal services has shown that we do not really need a local server for performance needs... mainly in case the internet connection breaks (which has happened 2 or 3 times in the past year).
data being transmitted between offices is sensitive and needs to be protected.
is there a necessity for vpn in order to be secure?
is there a necessity for a sonicwall firewall (we currently have a zyxel router/firewall that came iwth the dsl service)?
my main qualm with the sonicwall solution is that there is an inherent subscription charge and other licensing fees associated with it that need to be renewed yearly ... so it is not a one-time cost, but rather a recurring fixed cost.
what are some other good practices/suggestions to increase security?
all suggestions welcome and thanks in advance.