This hardware solution is suitable for both the hardened teleworker or a small office environment. It brings with it not only a stateful inspection firewall, but also the protection of a VPN. For the user logging into an enterprise, MD5 authentication comes into play. This ensures encrypted communications and also foils any attempt to steal the SonicWALL password.

What this little box accomplishes is internet security, providing security to computers that need to access the internet or connect to their local area network. This ICSA-certified appliance uses network address translation (NAT), so that only a public IP address is used on the internet, providing access for multiple computers through one dedicated box. You can set rules that either allow traffic or disallow it depending on your security needs, while it also protects your user from denial-of-service attacks.

Installation and configuration is not rocket science. With a methodical approach an end-user with little IT experience would be able to get this unit inline and in charge of their internet access and security.

The box simply plugs in and the connections are simple enough to understand. Probably the most demanding aspect is the configuration of the Tele3 to the internet, but with the check list already printed in the Quick Start Guide and a little information from the user's ISP, once armed with this information even that is a simple task.

Once this has been achieved you can set up the management station, which can be any computer attached to your WorkPort (one of three port connections on the rear of the box). Having set the TCP/IP settings the next step is to log in to SonicWALL.

Other steps to configure the WorkPort and HomePort are equally well documented, and the ease of installation and configuration provides the end-user with a secure working environment with little effort.

This small but potent security solution provides strong internet security and puts a stop to the type of threats that can put many businesses and teleworkers off remote working. It provides both user and employee with confidence in their overall ability to secure communications and data alike, giving control over who can access what, and making this a worthy solution and a boon to the small office or branch office environment.