Introduction to Comodo Dome Firewall - Virtual Appliance
Comodo Dome Firewall (DFW) provides comprehensive security for enterprise networks. The firewall software can be installed on a physical system or a virtual machine.
Dome Firewall simplifies the overall management of network security by delivering a single interface through which administrators can control firewall policy, antivirus, intrusion prevention, website filtering, traffic monitoring, VPN and proxy servers. Dome Firewall also features highly configurable notifications, in-depth reporting and an informative dashboard which offers a panoramic view of all major settings and network events.
Key benefits:
- Fully integrated security - All DFW modules are designed to work in complete harmony with each other, avoiding interoperability issues and without leaving gaps in your protection
- Fast setup and configuration - Simply connect the Dome Firewall virtual appliance to your network and use a single interface to configure your entire network's security
- Slash costs - Dome Firewall costs a fraction of the purchase price of individual systems, consumes less power and means enterprises no longer need to pay for multiple service and support contracts
- Reduced technical requirements - With just one product to learn, technical personnel are released from the need to manage multiple systems and become more productive, effective and efficient
- Central Management – You can manage multiple Dome Firewall appliances remotely using Dome Firewall Central Manager. The central manager allows you to coordinate firewall security policy for multiple networks and customers from a single centralized console.
Key features:
- Policy driven enterprise firewall
- Gateway antivirus
- Advanced Threat Protection
- Intrusion prevention system
- Website/URL filtering
- VPN and hotspot configuration
- Load balancing and traffic shaping
- Traffic monitoring and quality of service controls
- SSL and SSH inspection
- DNS and DHCP configuration
- Web proxy
- Full active directory integration
- Role Based Administrative Control for Administrators
- High Availability
To ensure secure operations, please ensure you deploy Dome Firewall in an acceptable environment:
- Dome Firewall admins should be properly trained in security operations and should know how to configure the product. Passwords and authentication secrets should be adequately protected from unauthorized access.
- Please ensure no other products, virtual appliances or services are running which could conflict with Dome Firewall.
- The Dome Firewall device and related peripheral units should be located in a physically protected area. Physical access to Dome Firewall should be restricted to authorized personnel.
- If the remote logging feature is to be used, it is recommended you run syslog server in protected zones.
Guide Structure