Internet Security

Skip to Main Content »

Have a Question? We Can Help!
Call Toll-Free 866.403.5305

Welcome to Firewalls.com.

You're currently on:

Small Flower Shop in Need of Firewall Appliance and VPN Connection to Remote Stores

sonicwall cssrSolutions Designed by: Todd Carper - Firewalls.com, Certified SonicWALL Sales Representative
Contact info: Email: toddc@firewalls.com or Phone: 317-225-4460
  • Customer Scenario
  • We are a small flower shop looking to tighten our network security and provide wireless access to customers. We only have about 5 computers in the shop but want to have wireless available for customers waiting on an order. We also need to be able to connect to our two remote shops so they can safely upload the daily financial records to the main store. Each remote branch only has 2-3 users.


  • Our Solution
  • For the main office you could use a TZ 200 Wireless Total Secure. You can enable guest wireless services for your patrons while keeping your business network separate. You can also filter content you may deem obscene so it cannot be accessed by someone waiting. The TZ 200 will also be able to create site-to-site VPN tunnels to the two remote branches where you could install the TZ 100 Total Secure. This way they could send the financial data across a secure, encrypted tunnel back to the main office.

  • Recommend Products :
  1. Bonus: Free Dell SonicWALL Training Video Access with Any Purchase, 1 Month

    The SonicWALL Training Video Series is designed to meet your objectives of teaching yourself how to setup and configure your SonicWALL firewall quickly and correctly. We stand behind the quality of our videos by offering a 100% money-back guarantee if you are not completely satisfied.
  • Todd Carper - Firewalls.com

  • Email : toddc@firewalls.com
  • Phone : 317-225-4460

  • About the Author: Since 2004 Todd Carper has been provide Internet security solution for small to enterprise networks. He is a SonicWALL Certified Sales Professional and System Administrator.

NOTE: We welcome you to contact the author if you have questions about this solution or would like help with your security problem.