Mid Range Firewalls

User Manual: Mid-range-Firewalls of /wp-content/uploads/2017/11

Open the PDF directly: View PDF PDF.
Page Count: 15

DownloadMid-range-Firewalls
Open PDF In BrowserView PDF
SonicWall Network Security
Appliance (NSA) series
Industry-validated security effectiveness and performance for
mid-sized networks

The SonicWall Network Security
Appliance (NSA) series provides
mid-sized networks, branch offices and
distributed enterprises with advanced
threat prevention in a high-performance
security platform. Combining nextgeneration firewall technology with
our patented* Reassembly-Free Deep
Packet Inspection (RFDPI) engine on a
multi-core architecture, the NSA series
offers the security, performance and
control organizations require.

Superior threat prevention and
performance
NSA series next-generation firewalls
(NGFWs) integrate advanced security
technologies to deliver superior threat
prevention. Our patented singlepass RFDPI threat prevention engine
examines every byte of every packet,
inspecting both inbound and outbound
traffic simultaneously. The NSA series
leverages on-box capabilities including
intrusion prevention, anti-malware and
web/URL filtering in addition to cloudbased SonicWall Capture multi-engine
sandboxing service to block zero-day
threats at the gateway. Unlike other
security products that cannot inspect
large files for hidden threats, NSA
firewalls scan files of any size across
all ports and protocols. The security
architecture in SonicWall NGFWs has
been validated as one of the industry’s
best for security effectiveness by NSS
Labs for five consecutive years.
Further, SonicWall NGFWs provide
complete protection by performing
full decryption and inspection of

TLS/SSL and SSH encrypted connections
as well as non-proxyable applications
regardless of transport or protocol.
The firewall looks deep inside every
packet (the header and data) searching
for protocol non-compliance, threats,
zero-days, intrusions, and even defined
criteria to detect and prevent hidden
attacks that leverage cryptography,
block encrypted malware downloads,
cease the spread of infections, and
thwart command and control (C&C)
communications and data exfiltration.
Inclusion and exclusion rules allow total
control to customize which traffic is
subjected to decryption and inspection
based on specific organizational
compliance and/or legal requirements.
When organizations activate deep
packet inspection functions such as
intrusion prevention, anti-virus, antispyware, TLS/SSL decryption/inspection
and others on their firewalls, network
performance often slows down,
sometimes dramatically. NSA series
firewalls, however, feature a multi-core
hardware architecture that utilizes
specialized security microprocessors.
Combined with our RFDPI engine,
this unique design eliminates the
performance degradation networks
experience with other firewalls.
In today’s security environment, it’s not
enough to rely on solely on outside
parties for threat information. That’s
why SonicWall formed its own in-house
Capture Labs threat research team
more than 15 years ago. This dedicated
team gathers, analyzes and vets data
from over one million sensors in its

*U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361; 7,991,723

Benefits:
Superior threat prevention
and performance
• Patented reassembly-free deep
packet inspection technology
• On-box and cloud-based threat
prevention
• TLS/SSL decryption and inspection
• Industry-validated security
effectiveness
• Multi-core hardware architecture
• Dedicated Capture Labs threat
research team

Network control and flexibility
• Powerful SonicOS operating system
• Application intelligence and control
• Network segmentation with VLANs
• High-speed wireless security

Easy deployment, setup and
ongoing management
• Tightly integrated solution
• Centralized management
• Scalability through multiple
hardware platforms
• Low total cost of ownership

Capture Threat Network. SonicWall also
participates in industry collaboration
efforts and engages with threat research
communities to gather and share
samples of attacks and vulnerabilities.
This shared threat intelligence is used
to develop real-time countermeasures
that are automatically deployed to our
customers’ firewalls.

Network control and flexibility
At the core of the NSA series is SonicOS,
SonicWall’s feature-rich operating
system. SonicOS provides organizations
with the network control and flexibility
they require through application
intelligence and control, real-time
visualization, an intrusion prevention
system (IPS) featuring sophisticated antievasion technology, high-speed virtual
private networking (VPN) and other
robust security features.
Using application intelligence and
control, network administrators can
identify and categorize productive
applications from those that are
unproductive or potentially dangerous,
and control that traffic through powerful
application-level policies on both a peruser and a per-group basis (along with
schedules and exception lists). Business-

critical applications can be prioritized
and allocated more bandwidth
while non-essential applications are
bandwidth-limited. Real-time monitoring
and visualization provides a graphical
representation of applications, users and
bandwidth usage for granular insight
into traffic across the network.
For organizations requiring advanced
flexibility in their network design,
SonicOS offers the tools to segment
the network through the use of virtual
LANs (VLANs). This enables network
administrators to create a virtual
LAN interface that allows for network
separation into one or more logical
groups. Administrators create rules that
determine the level of communication
with devices on other VLANs.
Built into every NSA series firewall is a
wireless access controller that enables
organizations to extend the network
perimeter securely through the use of
wireless technology. Together, SonicWall
firewalls and SonicWave 802.11ac Wave
2 wireless access points create a wireless
network security solution that combines
industry-leading next-generation firewall
technology with high-speed wireless for
enterprise-class network security and
performance across the wireless network.

Easy deployment, setup and
ongoing management
Like all SonicWall firewalls, the NSA
series tightly integrates key security,
connectivity and flexibility technologies
into a single, comprehensive solution.
This includes SonicWave wireless
access points and the SonicWall WAN
Acceleration Appliance (WXA) series,
both of which are automatically detected
and provisioned by the managing
NSA firewall. Consolidating multiple
capabilities eliminates the need to
purchase and install point products that
don’t always work well together. This
reduces the effort it takes to deploy the
solution into the network and configure
it, saving both time and money.
Ongoing management and monitoring
of network security are handled centrally
through the firewall or through the
SonicWall Global Management System
(GMS), providing network administrators
with a single pane of glass from which
to manage all aspects of the network.
Together, the simplified deployment
and setup along with the ease of
management enable organizations to
lower their total cost of ownership and
realize a high return on investment.

Secure, High-speed Wireless
Combine an NSA 2650 next-generation firewall with a SonicWall SonicWave 802.11ac Wave 2 wireless access point to create a highspeed wireless network security solution. SonicWall NSA 2650 firewalls and SonicWave access points both feature 2.5 GbE ports
that enable multi-gigabit wireless throughput offered in Wave 2 wireless technology. The NSA 2650 scans all wireless traffic coming
into and going out of the network using deep packet inspection technology and then removes harmful threats such as malware and
intrusions, even over encrypted connections. Additional security and control capabilities such as content filtering, application control
and intelligence and Capture Advanced Threat Protection can be run on the wireless network to provide added layers of protection.
4 x 2.5GbE
SFP

1 x 2.5GbE

4 x 2.5GbE

Bi-directional scanning

SonicWall NSA 2650

2

SonicWall
SonicWave 432i

Network Security Appliance 2600

Network Security Appliance NSA 2650

The SonicWall NSA 2600 is designed to address the
needs of growing small organizations, branch offices and
school campuses.

The NSA 2650 delivers high-speed threat prevention over
thousands of encrypted and even more unencrypted
connections to mid-sized organizations and distributed
enterprises.

Dual
USB ports

1GbE
management

8 x 1GbE
ports

Console

Dual
USB ports
Dual fans

Power

Optional
redundant
power

Firewall

NSA 2600

12 x 1GbE
ports

4 x 2.5GbE
ports

Console

1GbE
management
Dual fans

4 x 2.5GbE
SFP ports

Firewall

Expansion module

Power

16GB
storage

NSA 2650

Firewall throughput

1.9 Gbps

Firewall throughput

IPS throughput

700 Mbps

IPS throughput

1.4 Gbps

Anti-malware throughput

400 Mbps

Anti-malware throughput

600 Mbps

Full DPI throughput

300 Mbps

Full DPI throughput

600 Mbps

IMIX throughput

600 Mbps

IMIX throughput

700 Mbps

Maximum DPI connections
New connections/sec

Description

250,000
15,000/sec

SKU

Maximum DPI connections
New connections/sec

Description

3.0 Gbps

500,000
15,000/sec

SKU

NSA 2600 firewall only

01-SSC-3860

NSA 2650 firewall only

01-SSC-1936

NSA 2600 TotalSecure Advanced (1-year)

01-SSC-1712

NSA 2650 TotalSecure Advanced (1-year)

01-SSC-1988

3

Network Security Appliance 3600

Network Security Appliance 4600

The SonicWall NSA 3600 is ideal for branch office and smallto medium-sized corporate environments concerned about
throughput capacity and performance.

The SonicWall NSA 4600 secures growing medium-sized
organizations and branch office locations with enterprise-class
features and uncompromising performance.

Dual
2 x 10GbE
USB ports SFP+ ports

Console

1GbE
management

Dual fans

Firewall
Firewall throughput

12 x 1GbE
ports

Dual
2 x 10GbE
USB ports SFP+ ports

4 x 1GbE
SFP ports

Console

Power

1GbE
management

Dual fans

NSA 3600

Firewall

12 x 1GbE
ports

4 x 1GbE
SFP ports
Power

NSA 4600

3.4 Gbps

Firewall throughput

6.0 Gbps

IPS throughput

1.1 Gbps

IPS throughput

2.0 Gbps

Anti-malware throughput

600 Mbps

Anti-malware throughput

1.1 Gbps

Full DPI throughput

500 Mbps

Full DPI throughput

800 Mbps

IMIX throughput

900 Mbps

IMIX throughput

1.6 Gbps

Maximum DPI connections

1,000,000

New connections/sec

40,000/sec

Maximum DPI connections
New connections/sec

375,000
20,000/sec

Description

Description

SKU

SKU

Firewall only

01-SSC-3850

Firewall only

01-SSC-3840

TotalSecure Advanced (1-year)

01-SSC-1713

TotalSecure Advanced (1-year)

01-SSC-1714

4

Network Security Appliance 5600

Network Security Appliance 6600

The SonicWall NSA 5600 is ideal for distributed,
branch office and corporate environments needing
significant throughput.

The SonicWall NSA 6600 is ideal for large distributed and
corporate central site environments requiring high throughput
capacity and performance.

Dual
2 x 10GbE 12 x 1GbE
USB ports SPF+ ports ports

Console 1GbE
management
Dual fans

Firewall

4 x 1GbE
SPF ports

Console

4 x 10GbE
SFP+ ports

1GbE
management

Dual hot
swappable fans

Power

NSA 5600

Firewall

8 x 1GbE
ports

8 x 1GbE
SFP ports
Power

NSA 6600

Firewall throughput

9.0 Gbps

Firewall throughput

12.0 Gbps

IPS throughput

3.0 Gbps

IPS throughput

4.5 Gbps

Anti-malware throughput

1.7 Gbps

Anti-malware throughput

3.0 Gbps

Full DPI throughput

1.6 Gbps

Full DPI throughput

3.0 Gbps

IMIX throughput

2.4 Gbps

IMIX throughput

3.5 Gbps

Maximum DPI connections

1,000,000

Maximum DPI connections

1,000,000

New connections/sec

60,000/sec

New connections/sec

90,000/sec

Description

5

Dual
USB ports

SKU

Description

SKU

NSA 5600 firewall only

01-SSC-3830

NSA 6600 firewall only

01-SSC-3820

NSA 5600 TotalSecure Advanced (1-year)

01-SSC-1715

NSA 6600 TotalSecure Advanced (1-year)

01-SSC-1716

Reassembly-Free Deep Packet
Inspection engine

network streams through extensive and
repeated normalization and decryption
in order to neutralize advanced evasion
techniques that seek to confuse
detection engines and sneak malicious
code into the network.

The SonicWall Reassembly-Free Deep
Packet Inspection (RFDPI) is a singlepass, low latency inspection system that
performs stream-based, bi-directional
traffic analysis at high speed without
proxying or buffering to effectively
uncover intrusion attempts and malware
downloads while identifying application
traffic regardless of port and protocol.
This proprietary engine relies on
streaming traffic payload inspection to
detect threats at Layers 3-7, and takes

Once a packet undergoes the
necessary pre-processing, including
SSL decryption, it is analyzed
against a single, proprietary memory
representation of three signature
databases: intrusion attacks, malware
and applications. The connection state is
then advanced to represent the position

Packet assembly-based process

Proxy

Scanning

of the stream relative to these databases
until it encounters a state of attack, or
other “match” event, at which point a
pre-set action is taken.
In most cases, the connection is
terminated and proper logging and
notification events are created. However,
the engine can also be configured for
inspection only or, in case of application
detection, to provide Layer 7 bandwidth
management services for the remainder
of the application stream as soon as the
application is identified.

Reassembly-free Deep Packet Inspection (RFDPI)
CPU n

Packet
disassembly

SSL

Traffic in

SSL

CPU 4

Traffic in

Traffic out

Traffic out
CPU 3
CPU 2

Inspection time
Less

More

When proxy
becomes full or
content too large,
files bypass
scanning.

Inspection time

Inspection capacity
Min

Max

Less

Competitive proxy-based architecture

Flexible, customizable deployment
options – NSA series at-a-glance
Every SonicWall NSA firewall utilizes
a breakthrough, multi-core hardware
design and RFDPI for internal and
external network protection without
compromising network performance.
NSA series NGFWs combine high-speed
intrusion prevention, file and content
inspection, and powerful application
intelligence and control with an
extensive array of advanced networking
and flexible configuration features. The
NSA series offers an affordable platform
that is easy to deploy and manage in a
wide variety of large, branch office and
distributed network environments.

Inspection capacity
CPU 1

More

Max

SonicWall stream-based architecture

NSA series as central-site gateway
HA data link

Stateful high availability

HF link

Internet

Internet
Dual ISP failover

Internet
Multi-WAN redundancy

NSA series as in-line NGFW solution

Internet

Full L2-L7
signature-based
inspection
application
awareness
User zone

6

Min

Reassembly-free packet
scanning eliminates proxy
and content size limitations.

Administrative

Servers

Capture Labs
The dedicated, in-house SonicWall
Capture Labs threat research team
researches and develops countermeasures to deploy to customer firewalls
for up-to-date protection. The team
gathers data on potential threats from
several sources including our awardwinning network sandboxing service,
Capture Advanced Threat Protection, as
well as more than 1 million SonicWall
sensors located around the globe that
monitor traffic for emerging threats. It
is analyzed via machine learning using
SonicWall's Deep Learning Algorithms
to extract the DNA from the code to
see if it is related to any known forms of
malicious code.
SonicWall NGFW customers benefit from
continuously updated threat protection
around the clock. New updates take
effect immediately without reboots or
interruptions. The signatures resident on
the appliances are designed to protect
against wide classes of attacks, covering
tens of thousands of individual threats
with a single signature.

Advanced threat protection
SonicWall Capture Advanced Threat
Protection Service is a cloud-based
multi-engine sandbox that extends
firewall threat protection to detect and
prevent zero-day threats. Suspicious files
are sent to the cloud for analysis with
the option to hold them at the gateway
until a verdict is determined. The
multi-engine sandbox platform, which
includes virtualized sandboxing, full
system emulation and hypervisor level
analysis technology, executes suspicious
code and analyzes behavior. When a
file is identified as malicious, a hash is
immediately created within Capture and
later a signature is sent to firewalls to
prevent follow-on attacks.
The service analyzes a broad range
of operating systems and file types,
including executable programs, DLL,
PDFs, MS Office documents, archives,
JAR and APK.

7

In addition to the countermeasures
on the appliance, NSA appliances also
have access to SonicWall CloudAV,
which extends the onboard signature
intelligence with over 20 million
signatures. This CloudAV database is
accessed by the firewall via a proprietary,
light-weight protocol to augment the

inspection done on the appliance. With
Capture Advanced Threat Protection,
a cloud-based multi-engine sandbox,
organizations can examine suspicious
files and code in an isolated environment
to stop advanced threats such as zeroday attacks.

Protection

Collection

LABS
Countermeasure
Creation

Capture provides an at-a-glance threat
analysis dashboard and reports, which
detail the analysis results for files sent to

Classification

the service, including source, destination
and a summary plus details of malware
action once detonated.

Global management and reporting
For highly regulated organizations
wanting to achieve a fully coordinated
security governance, compliance and risk
management strategy, SonicWall Global
Management System (GMS®) provides
administrators a unified, secure and
extensible platform to manage SonicWall
firewalls, wireless access points and Dell
X-Series switches through a correlated
and auditable workstream process.
GMS enables enterprises to easily
consolidate the management of security

appliances, reduce administrative
and troubleshooting complexities,
and govern all operational aspects of
the security infrastructure, including
centralized policy management and
enforcement; real-time event monitoring;
user activities; application identifications;
flow analytics and forensics; compliance
and audit reporting; and more. GMS also
meets the firewall’s change management
requirements of enterprises through a
workflow automation feature. With GMS
workflow automation, all enterprises will

gain agility and confidence in deploying
the right firewall policies, at the right
time and in conformance to compliance
regulations. Available in software, cloud
and virtual appliance options, GMS
provides a coherent way to manage
network security by business processes
and service levels, dramatically
simplifying lifecycle management of your
overall security environments compared
to managing on a device-by-device
basis.

SonicWall GMS Secure Compliance Enforcement
Benefits

Single
Management
Console

• Centralized
management

Reporting

Converged
Infrastructure

SonicWall Firewall

• Error-free policy
management
• Strong access control
• Comprehensive
audit trails

SonicWall WAN
Acceleration

X-Series Switch
with PoE

• PCI, HIPAA, SOX
report templates
• Lower operating costs

Port Expansion Scalability

8

SonicWall
SonicWave AP

Features
RFDPI engine
Feature

Description

Reassembly-Free Deep Packet
Inspection (RFDPI)

This high-performance, proprietary and patented inspection engine performs stream-based, bi-directional traffic analysis,
without proxying or buffering, to uncover intrusion attempts and malware and to identify application traffic regardless of
port.

Bi-directional inspection

Scans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not used to distribute
malware and does not become a launch platform for attacks in case an infected machine is brought inside.

Stream-based inspection

Proxy-less and non-buffering inspection technology provides ultra-low latency performance for DPI of millions of
simultaneous network streams without introducing file and stream size limitations, and can be applied on common
protocols as well as raw TCP streams.

Highly parallel and scalable

The unique design of the RFDPI engine works with the multi-core architecture to provide high DPI throughput and
extremely high new session establishment rates to deal with traffic spikes in demanding networks.

Single-pass inspection

A single-pass DPI architecture simultaneously scans for malware, intrusions and application identification, drastically
reducing DPI latency and ensuring that all threat information is correlated in a single architecture.

Firewall and networking
Feature

Description

Threat API

All the firewall to receive and leverage any and all proprietary, original equipment manufacturer and third-party
intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised credentials, ransomware
and advanced persistent threats.

Stateful packet inspection

All network traffic is inspected, analyzed and brought into compliance with firewall access policies.

High availability/clustering

The NSA series supports Active/Passive (A/P) with state synchronization, Active/Active (A/A) DPI and Active/Active
clustering high availability modes. Active/Active DPI offloads the deep packet inspection load to cores on the passive
appliance to boost throughput.

DDoS/DoS attack protection

SYN flood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting
technologies. Additionally, it protects against DOS/DDoS through UDP/ICMP flood protection and connection rate limiting.

IPv6 support

Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With SonicOS, the hardware will support filtering and
wire mode implementations.

Flexible deployment options

The NSA Series can be deployed in traditional NAT, Layer 2 bridge, wire and network tap modes.

WAN load balancing

Load-balances multiple WAN interfaces using Round Robin, Spillover or Percentage methods. Policy-based routing
Creates routes based on protocol to direct traffic to a preferred WAN connection with the ability to fail back to a
secondary WAN in the event of an outage.

Advanced quality of service (QoS)

Guarantees critical communications with 802.1p, DSCP tagging, and remapping of VoIP traffic on the network.

H.323 gatekeeper and SIP proxy support

Blocks spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy.

Single and cascaded Dell X-Series switch
management

Manage security settings of additional ports, including Portshield, HA, POE and POE+, under a single pane of glass using
the firewall management dashboard for Dell’s X-Series network switch.

Biometric authentication

Supports mobile device authentication such as fingerprint recognition that cannot be easily duplicated or shared to
securely authenticate the user identity for network access.

Open authentication and social login

Enable guest users to use their credentials from social networking services such as Facebook, Twitter, or Google+ to
sign in and access the Internet and other guest services through a host's wireless, LAN or DMZ zones using pass-through
authentication.

Management and reporting
Feature

Description

Global Management System (GMS)

SonicWall GMS monitors, configures and reports on multiple SonicWall appliances through a single management console
with an intuitive interface, reducing management costs and complexity.

Powerful single device management

An intuitive web-based interface allows quick and convenient configuration, in addition to a comprehensive command-line
interface and support for SNMPv2/3.

IPFIX/NetFlow application flow reporting Exports application traffic analytics and usage data through IPFIX or NetFlow protocols for real-time and historical
monitoring and reporting with tools such as SonicWall Scrutinizer or other tools that support IPFIX and NetFlow
with extensions.

Virtual private networking (VPN)
Feature

Description

Auto-provision VPN

Simplifies and reduces complex distributed firewall deployment down to a trivial effort by automating the initial siteto-site VPN gateway provisioning between SonicWall firewalls while security and connectivity occurs instantly and
automatically.

IPSec VPN for site-to-site connectivity

High-performance IPSec VPN allows the NSA Series to act as a VPN concentrator for thousands of other large sites,
branch offices or home offices.

SSL VPN or IPSec client remote access

Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers,
intranet sites and applications from a variety of platforms.

9

Redundant VPN gateway

When using multiple WANs, a primary and secondary VPN can be configured to allow seamless, automatic failover and
failback of all VPN sessions.

Route-based VPN

The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel
failure, by seamlessly re-routing traffic between endpoints through alternate routes.

Content/context awareness
Feature

Description

User activity tracking

User identification and activity are made available through seamless AD/LDAP/Citrix1/Terminal Services1 SSO integration
combined with extensive information obtained through DPI.

GeoIP country traffic identification

Identifies and controls network traffic going to or coming from specific countries to either protect against attacks from
known or suspected origins of threat activity, or to investigate suspicious traffic originating from the network. Ability
to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP address.
Eliminates unwanted filtering of IP addresses due to misclassification.

Regular expression DPI filtering

Prevents data leakage by identifying and controlling content crossing the network through regular expression matching.
Provides the ability to create custom country and Botnet lists to override an incorrect country or Botnet tag associated
with an IP address.

Breach prevention subscription services
Capture advanced threat protection
Feature

Description

Multi-engine sandboxing

The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation, and hypervisor level
analysis technology, executes suspicious code and analyzes behavior, providing comprehensive visibility to malicious
activity.

Block until verdict

To prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the
gateway until a verdict is determined.

Broad file type and size analysis

Supports analysis of a broad range of file types, including executable programs (PE), DLL, PDFs, MS Office documents,
archives, JAR, and APK plus multiple operating systems including Windows, Android, Mac OS X and multi-browser
environments.

Rapid deployment of signatures

When a file is identified as malicious, a signature is immediately deployed to firewalls with SonicWALL Capture subscriptions
and Gateway Anti-Virus and IPS signature databases and the URL, IP and domain reputation databases within 48 hours.

Encrypted threat prevention
Feature

Description

SSL/TLS decryption and inspection

Decrypts and inspects SSL /TLS encrypted traffic on the fly, without proxying, for malware, intrusions and data leakage,
and applies application, URL and content control policies in order to protect against threats hidden in SSL encrypted
traffic Included with security subscriptions for all NSA series models.

SSH inspection

Deep packet inspection of SSH (DPI-SSH) decrypts and inspect data traversing over SSH tunnel to prevent attacks that
leverage SSH.

Intrusion prevention
Feature

Description

Countermeasure-based protection

Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet
payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.

Automatic signature updates

The SonicWall Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures
that covers more than 50 attack categories. The new updates take immediate effect without any reboot or service interruption
required.

Intra-zone IPS protection

Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing
threats from propagating across the zone boundaries.

Botnet command and control (CnC)
detection and blocking

Identifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are
identified as propagating malware or are known CnC points.

Protocol abuse/anomaly

Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.

Zero-day protection

Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques
that cover thousands of individual exploits.

Anti-evasion technology

Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected
by utilizing evasion techniques in Layers 2-7.

Threat prevention
Feature

Description

Gateway anti-malware

The RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and other malware
in files of unlimited length and size across all ports and TCP streams.

CloudAV malware protection

A continuously updated database of over 20 million threat signatures resides in the SonicWall cloud servers and is
referenced to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of
threats.

10

Around-the-clock security updates

New threat updates are automatically pushed to firewalls in the field with active security services, and take effect
immediately without reboots or interruptions.

Bi-directional raw TCP inspection

The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that they to
sneak by outdated security systems that focus on securing a few well-known ports.

Extensive protocol support

Identifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and
decodes payloads for malware inspection, even if they do not run on standard, well-known ports.

Application intelligence and control
Feature

Description

Application control

Control applications, or individual application features, that are identified by the RFDPI engine against a continuously
expanding database of over thousands of application signatures, to increase network security and enhance network
productivity.

Custom application identification

Control custom applications by creating signatures based on specific parameters or patterns unique to an application in
its network communications, in order to gain further control over the network.

Application bandwidth management

Granularly allocate and regulate available bandwidth for critical applications or application categories while inhibiting
nonessential application traffic.

Granular control

Control applications, or specific components of an application, based on schedules, user groups, exclusion lists and a
range of actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix integration.

Content filtering
Feature

Description

Inside/outside content filtering

Enforce acceptable use policies and block access to websites containing information or images that are objectionable or
unproductive with Content Filtering Service.

Enforced content filtering client

Extend policy enforcement to block internet content for Windows, Mac OS, Android and Chrome devices located outside
the firewall perimeter.

Granular controls

Block content using the predefined categories or any combination of categories. Filtering can be scheduled by time of
day, such as during school or business hours, and applied to individual users or groups.

Web caching

URL ratings are cached locally on the SonicWall firewall so that the response time for subsequent access to frequently
visited sites is only a fraction of a second.

Enforced anti-virus and anti-spyware
Feature

Description

Multi-layered protection

Utilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint protection to block,
viruses entering network through laptops, thumb drives and other unprotected systems.

Automated enforcement option

Ensure every computer accessing the network has the most recent version of anti-virus and anti-spyware signatures
installed and active, eliminating the costs commonly associated with desktop anti-virus and anti-spyware management.

Automated deployment and installation
option

Machine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across the network,
minimizing administrative overhead.

Always on, automatic virus protection

Frequent anti-virus and anti-spyware updates are delivered transparently to all desktops and file servers to improve end
user productivity and decrease security management.

Spyware protection

Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on desktops
and laptops before they transmit confidential data, providing greater desktop security and performance.

11

SonicOS feature summary
Firewall

• Application component blocking

• Link aggregation (static and dynamic)

• Stateful packet inspection

• Application bandwidth management

• Port redundancy

• Reassembly-Free Deep Packet
Inspection

• Custom application signature creation

• A/P high availability with state sync

• Data leakage prevention

• A/A clustering

• DDoS attack protection (UDP/ICMP/SYN
flood)

• Application reporting over NetFlow/
IPFIX

• Inbound/outbound load balancing

• IPv4/IPv6 support

• User activity tracking (SSO)

• Biometric authentication for remote
access

• Comprehensive application signature
database

• DNS proxy

Web content filtering1

• Threat API

SSL/SSH decryption and inspection1

• Keyword blocking

• Inclusion/exclusion of objects, groups or
hostnames

• Bandwidth manage CFS
rating categories

• SSL Control

• Unified policy model with app control

• Cloud-based multi-engine analysis
• Virtualized sandboxing

• Content Filtering Client

VPN
• Auto-provision VPN

• Hypervisor level analysis

• IPSec VPN for site-to-site connectivity

• Full system emulation

• SSL VPN and IPSec client remote access

• Broad file type examination

• Redundant VPN gateway

• Automated and manual submission

• Mobile Connect for iOS, Mac OS
X, Windows, Chrome, Android and
Kindle Fire

• Real-time threat intelligence updates
• Auto-block capability

Intrusion prevention

1

• Signature-based scanning
• Automatic signature updates
• Bidirectional inspection
• Granular IPS rule capability
• GeoIP enforcement
• Botnet filtering with dynamic list
• Regular expression matching

Anti-malware1
• Stream-based malware scanning
• Gateway anti-virus
• Gateway anti-spyware
• Bi-directional inspection
• No file size limitation
• Cloud malware database

Application identification1

• Route-based VPN (OSPF, RIP, BGP)

Networking

• 3G/4G WAN failover
• Asymmetric routing
• Common Access Card (CAC) support

Wireless
• MU-MIMO
• Floor plan view
• Topology view
• Band steering
• Beamforming
• AirTime fairness
• MiFi extender
• Guest cyclic quota

VoIP
• Granular QoS control
• Bandwidth management
• DPI for VoIP traffic
• H.323 gatekeeper and SIP proxy support

Management and monitoring
• Web GUI

• PortShield

• Command line interface (CLI)

• Jumbo frames

• SNMPv2/v3

• IPv6

• Centralized management and reporting

• Path MTU discovery

• Logging

• Enhanced logging

• Netflow/IPFix exporting

• VLAN trunking

• Cloud-based configuration backup

• RSTP (Rapid Spanning Tree protocol)

• BlueCoat Security Analytics Platform

• Port mirroring

• Application and bandwidth visualization

• Layer-2 QoS

• IPv4 and IPv6 Management

• Port security

• Dell X-Series switch management
including cascaded switches

• Dynamic routing (RIP/OSPF/BGP)
• SonicWall wireless controller
• Policy-based routing (ToS/metric and
ECMP)
• NAT

• Application control

• DHCP server

• Application traffic visualization

• Bandwidth management

Requires added subscription.

12

• Anti-proxy technology

• Deep packet inspection for TLS/SSL/SSH

Capture advanced threat protection1

1

• URL filtering

• L2 bridge, wire/virtual wire mode,
tap mode

NSA series system specifications
Firewall general
Operating system
Security processing cores

NSA 2600
4
8 x 1-GbE,
1 GbE Management,
1 Console

Expansion

1 Expansion Slot
(Rear)*, SD Card*

Default/Maximum connections (DPI SSL) 4
VPN
Site-to-site tunnels
IPSec VPN clients (max)
SSL VPN NetExtender Clients (max)
Encryption/Authentication
Key exchange
Route-based VPN
Networking
IP address assignment
NAT modes
VLAN interfaces
Routing protocols
QoS
Authentication

NSA 4600

NSA 5600

NSA 6600

4
4 x 2.5-GbE SFP,
4 x 2.5-GbE,
12 x 1-GbE,
1 GbE Management,
1 Console
1 Expansion Slot
(Rear)*,
16 GB storage
module

6
2 x 10-GbE SFP+,
4 x 1-GbE SFP,
12 x 1 GbE,
1 GbE Management,
1 Console

8
2 x 10-GbE SFP+,
4 x 1-GbE SFP,
12 x 1 GbE,
1 GbE Management,
1 Console

10
2 x 10-GbE SFP+,
4 x 1-GbE SFP,
12 x 1 GbE,
1 GbE Management,
1 Console

24
4 x 10-GbE SFP+,
8 x 1-GbE SFP,
8 x 1 GbE,
1 GbE Management,
1 Console

1 Expansion Slot (Rear)*, SD Card*

60,000
96

70,000
128

NSA 2650
3.0 Gbps
600 Mbps
1.4 Gbps
1.4 Gbps
600 Mbps
700 Mbps

CLI, SSH, GUI, GMS
40,000
50,000
48
64
Analyzer, Local Log, Syslog
NSA 3600
NSA 4600
3.4 Gbps
6.0 Gbps
500 Mbps
800 Mbps
1.1 Gbps
2.0 Gbps
1.1 Gbps
2.0 Gbps
600 Mbps
1.1 Gbps
900 Mbps
1.6 Gbps

NSA 5600
9.0 Gbps
1.6 Gbps
3.0 Gbps
3.0 Gbps
1.7 Gbps
2.4 Gbps

NSA 6600
12.0 Gbps
3.0 Gbps
4.5 Gbps
4.5 Gbps
3.0 Gbps
3.5 Gbps

200 Mbps

300 Mbps

300 Mbps

500 Mbps

800 Mbps

1.3 Gbps

1.1 Gbps
15,000/sec
500,000
250,000

1.5 Gbps
15,000/sec
1,000,000
500,000

1.5 Gbps
20,000/sec
750,000
375,000

3.0 Gbps
40,000/sec
1,000,000
500,000

4.5 Gbps
60,000/sec
1,500,000
1,000,000

5.0 Gbps
90,000/sec
1,500,000
1,000,000

1,000/1,000

12,000/13,500

2,000/2,750

3,000/4,500

4,000/8,500

6,000/10,500

NSA 2650
NSA 3600
NSA 4600
NSA 5600
1,000
1,000
3,000
4,000
50 (1,000)
50 (1,000)
500 (3,000)
2,000 (4,000)
2 (350)
2 (350)
2 (500)
2 (1000)
DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B Cryptography
Diffie Hellman Groups 1, 2, 5, 14v
RIP, OSPF
NSA 2650
NSA 3600
NSA 4600
NSA 5600
Static (DHCP PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP Relay
1:1, many:1, 1:many, flexible NAT (overlapping IPS), PAT, transparent mode
256
256
256
400
BGP, OSPF, RIPv1/v2, static routes, policy-based routing
Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p

NSA 6600
6,000
2,000 (6,000)
2 (1500)

30,000
32

40,000
48

NSA 2600
1.9 Gbps
300 Mbps
700 Mbps
700 Mbps
400 Mbps
600 Mbps

NSA 2600
250
10 (250)
2 (250)

NSA 2600

256

NSA 6600

500

LDAP (multiple domains), XAUTH/RADIUS, SSO, Novell, internal user database, Terminal Services, Citrix, Common Access Card (CAC)

VoIP
Standards
Certifications
High availability
Hardware
Power supply

Full H323-v1-5, SIP
TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
ICSA Firewall, ICSA Anti-Virus, FIPS 140-2, Common Criteria NDPP (Firewall and IPS), UC APL
Active/Passive with State Sync,
Active/Passive with State Sync
Active/Passive with State Sync
Active/Active DPI with State Sync,
Active/Active Clustering
Active/Active Clustering
NSA 2600
NSA 2650
NSA 3600
NSA 4600
NSA 5600
NSA 6600
Dual, redundant
Single, Fixed 200W
Single, Fixed 250W
120W (one included)

Fans
Input power
Maximum power consumption (W)
MTBF @25ºC in hours
MTBF @25ºC in years
Form factor
Dimension
Weight
WEEE weight
Shipping weight
Major regulatory
Environment (Operating/Storage)
Humidity

NSA 3600
SonicOS 6.5

Interfaces

Management
SSO users
Maximum access points supported
Logging
Firewall/VPN Performance
Firewall inspection throughput1
Full DPI throughput 2
Application inspection throughput 2
IPS throughput 2
Anti-malware inspection throughput 2
IMIX throughput
TLS/SSL Inspection and Decryption
(DPI SSL)2
VPN throughput 3
Connections per second
Maximum connections (SPI)
Maximum connections (DPI) 4

NSA 2650

Dual, Fixed

49.4
176,540
20.15

10.1 lb (4.6 kg)
11.0 lb (5.0 kg)
14.3 lb (6.5 kg)

100-240 VAC, 60-50 Hz
74.3
86.7
90.9
146,789
139,783
134,900
16.76
15.96
15.40
1U Rack Mountable
1.75 x 19.1 x 17 in (4.5 x 48.5 x 43 cm)
13.56 lb (6.15 kg)
13.56 lb (6.15 kg)
14.24 lb (6.46 kg)
14.24 lb (6.46 kg)
20.79 lb (9.43 kg)
20.79lb (9.43 kg)
FCC Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB,
Mexico CoC by UL, WEEE , REACH, ANATEL, BSMI, CU
32°-105° F (0°-40° C)/-40° to 158° F (-40° to 70° C)
74.3
146,789
16.76

Dual, redundant,
hot swappable
113.1
116,477
13.30

14.93 lb (6.77 kg)
19.78 lb (8.97 kg)
26.12 lb (11.85 kg)

10-90% non-condensing

Testing Methodologies: Maximum performance based on RFC 2544 (for firewall). Actual performance may vary depending on network conditions and activated services.
Full DPI/GatewayAV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools. Testing done with multiple flows through
multiple port pairs.
3
VPN throughput measured using UDP traffic at 1280 byte packet size adhering to RFC 2544. All specifications, features and availability are subject to change.
4
For every 125,000 DPI connections reduced, the number of available DPI SSL connections increases by 750.
*Future use. All specifications, features and availability are subject to change.
1
2

13

NSA series ordering information
NSA 2650
NSA 2650 TotalSecure Advanced Edition (1-year)

SKU
01-SSC-1988

Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 2650 (1-year)

01-SSC-1783

Capture Advanced Threat Protection for NSA 2650 (1-year)

01-SSC-1935

Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 2650 (1-year)

01-SSC-1976

Silver 24x7 Support for NSA 2650 (1-year)

01-SSC-1541

Content Filtering Service for NSA 2650 (1-year)

01-SSC-1970

Enforced Client Anti-Virus & Anti-Spyware

Based on user count

Comprehensive Anti-Spam Service for NSA 2650 (1-year)

NSA 3600

01-SSC-2001

SKU

NSA 3600 TotalSecure Advanced Edition (1-year)

01-SSC-1713

Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 3600 (1-year)

01-SSC-1480

Capture Advanced Threat Protection for NSA 3600 (1-year)

01-SSC-1485

Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 3600 (1-year)

01-SSC-4435

Silver 24x7 Support for NSA 3600 (1-year)

01-SSC-4302

Content Filtering Service for NSA 3600 (1-year)

01-SSC-4441

Enforced Client Anti-Virus & Anti-Spyware

Based on user count

Comprehensive Anti-Spam Service for NSA 3600 (1-year)

NSA 4600

01-SSC-4447

SKU

NSA 4600 TotalSecure Advanced Edition (1-year)

01-SSC-1714

Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 4600 (1-year)

01-SSC-1490

Capture Advanced Threat Protection for NSA 4600 (1-year)

01-SSC-1495

Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 4600 (1-year)

01-SSC-4411

Silver 24x7 Support for NSA 4600 (1-year)

01-SSC-4290

Content Filtering Service for NSA 4600 (1-year)

01-SSC-4417

Enforced Client Anti-Virus & Anti-Spyware

Based on user count

Comprehensive Anti-Spam Service for NSA 4600 (1-year)

NSA 5600

01-SSC-4423

SKU

NSA 5600 TotalSecure Advanced Edition (1-year)

01-SSC-1715

Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 5600 (1-year)

01-SSC-1550

Capture Advanced Threat Protection for NSA 5600 (1-year)

01-SSC-1555

Threat Prevention – Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 5600 (1-year)

01-SSC-4240

Gold 24x7 Support for NSA 5600 (1-year)

01-SSC-4284

Content Filtering Service for NSA 5600 (1-year)

01-SSC-4246

Enforced Client Anti-Virus & Anti-Spyware

Based on user count

Comprehensive Anti-Spam Service for NSA 5600 (1-year)

NSA 6600

01-SSC-4252

SKU

NSA 6600 TotalSecure Advanced Edition (1-year)

01-SSC-1716

Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 6600 (1-year)

01-SSC-1560

Capture Advanced Threat Protection for NSA 6600 (1-year)

01-SSC-1565

Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 6600 (1-year)

01-SSC-4216

Gold 24x7 Support for NSA 6600 (1-year)

01-SSC-4278

Content Filtering Service for NSA 6600 (1-year)

01-SSC-4222

Enforced Client Anti-Virus & Anti-Spyware

Based on user count

Comprehensive Anti-Spam Service for NSA 6600 (1-year)

01-SSC-4228

10GBASE-SR SFP+ Short Reach Module

01-SSC-9785

10GBASE-LR SFP+ Long Reach Module

01-SSC-9786

Modules and accessories*

SKU

10GBASE SFP+ 1M Twinax Cable

01-SSC-9787

10GBASE SFP+ 3M Twinax Cable

01-SSC-9788

1000BASE-SX SFP Short Haul Module

01-SSC-9789

1000BASE-LX SFP Long Haul Module

01-SSC-9790

1000BASE-T SFP Copper Module

Management and reporting

01-SSC-9791

SKU

SonicWall GMS 10 Node Software License

01-SSC-3363

SonicWall GMS E-Class 24x7 Software Support for 10 node (1-year)

01-SSC-6514

*Please consult with your local SonicWall reseller for a complete list of supported SFP and SFP+ modules

14

Regulatory model numbers:
NSA 2600–1RK29-0A9
NSA 2650-1RK38-0C8
NSA 3600–1RK26-0A2
NSA 4600–1RK26-0A3
NSA 5600–1RK26-0A4
NSA 6600–1RK27-0A5

About Us
SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium size businesses and enterprises
worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of
the more than 500,000 global businesses in over 150 countries, so you can do more business with less fear.

SonicWall, Inc.
5455 Great America Parkway | Santa Clara, CA 95054
Refer to our website for additional information.
www.sonicwall.com

© 2017 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a
trademark or registered trademark of SonicWall Inc. and/or its affiliates
in the U.S.A. and/or other countries. All other trademarks
and registered trademarks are property of their respective owners.
Datasheet-NetworkSecurityAppliance-US-VG-MKTG659



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : Yes
Language                        : en-US
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.6-c138 79.159824, 2016/09/14-01:09:01
Format                          : application/pdf
Creator                         : SonicWall
Create Date                     : 2017:09:22 08:54:24-07:00
Metadata Date                   : 2017:09:22 08:54:27-07:00
Modify Date                     : 2017:09:22 08:54:27-07:00
Creator Tool                    : Adobe InDesign CC 2017 (Macintosh)
Instance ID                     : uuid:66fa39b0-a057-f94f-bdb2-557d1de6535c
Original Document ID            : xmp.did:60b55e5d-002c-0144-9a6b-01d1b4a774bf
Document ID                     : xmp.id:cbd90f32-095d-4719-9287-347de9b125f8
Rendition Class                 : proof:pdf
Derived From Instance ID        : xmp.iid:284aabcf-35ef-4b5d-8e11-ca930af11bc2
Derived From Document ID        : xmp.did:d10f56b7-ea69-4a5a-956b-cfe108b8a884
Derived From Original Document ID: xmp.did:60b55e5d-002c-0144-9a6b-01d1b4a774bf
Derived From Rendition Class    : default
History Action                  : converted
History Parameters              : from application/x-indesign to application/pdf
History Software Agent          : Adobe InDesign CC 2017 (Macintosh)
History Changed                 : /
History When                    : 2017:09:22 08:54:24-07:00
Producer                        : Adobe PDF Library 15.0
Trapped                         : False
Page Count                      : 15
Author                          : SonicWall
EXIF Metadata provided by EXIF.tools

Navigation menu