Mid Range Firewalls

User Manual: Mid-range-Firewalls of /wp-content/uploads/2017/11

Open the PDF directly: View PDF PDF.
Page Count: 15

The SonicWall Network Security
Appliance (NSA) series provides
mid-sized networks, branch ofces and
distributed enterprises with advanced
threat prevention in a high-performance
security platform. Combining next-
generation rewall technology with
our patented* Reassembly-Free Deep
Packet Inspection (RFDPI) engine on a
multi-core architecture, the NSA series
offers the security, performance and
control organizations require.
Superior threat prevention and
performance
NSA series next-generation rewalls
(NGFWs) integrate advanced security
technologies to deliver superior threat
prevention. Our patented single-
pass RFDPI threat prevention engine
examines every byte of every packet,
inspecting both inbound and outbound
trafc simultaneously. The NSA series
leverages on-box capabilities including
intrusion prevention, anti-malware and
web/URL ltering in addition to cloud-
based SonicWall Capture multi-engine
sandboxing service to block zero-day
threats at the gateway. Unlike other
security products that cannot inspect
large les for hidden threats, NSA
rewalls scan les of any size across
all ports and protocols. The security
architecture in SonicWall NGFWs has
been validated as one of the industry’s
best for security effectiveness by NSS
Labs for ve consecutive years.
Further, SonicWall NGFWs provide
complete protection by performing
full decryption and inspection of
TLS/SSL and SSH encrypted connections
as well as non-proxyable applications
regardless of transport or protocol.
The rewall looks deep inside every
packet (the header and data) searching
for protocol non-compliance, threats,
zero-days, intrusions, and even dened
criteria to detect and prevent hidden
attacks that leverage cryptography,
block encrypted malware downloads,
cease the spread of infections, and
thwart command and control (C&C)
communications and data exltration.
Inclusion and exclusion rules allow total
control to customize which trafc is
subjected to decryption and inspection
based on specic organizational
compliance and/or legal requirements.
When organizations activate deep
packet inspection functions such as
intrusion prevention, anti-virus, anti-
spyware, TLS/SSL decryption/inspection
and others on their rewalls, network
performance often slows down,
sometimes dramatically. NSA series
rewalls, however, feature a multi-core
hardware architecture that utilizes
specialized security microprocessors.
Combined with our RFDPI engine,
this unique design eliminates the
performance degradation networks
experience with other rewalls.
In todays security environment, its not
enough to rely on solely on outside
parties for threat information. That’s
why SonicWall formed its own in-house
Capture Labs threat research team
more than 15 years ago. This dedicated
team gathers, analyzes and vets data
from over one million sensors in its
SonicWall Network Security
Appliance (NSA) series
Industry-validated security effectiveness and performance for
mid-sized networks
Benets:
Superior threat prevention
and performance
Patented reassembly-free deep
packet inspection technology
On-box and cloud-based threat
prevention
TLS/SSL decryption and inspection
Industry-validated security
effectiveness
Multi-core hardware architecture
Dedicated Capture Labs threat
research team
Network control and exibility
Powerful SonicOS operating system
Application intelligence and control
Network segmentation with VLANs
High-speed wireless security
Easy deployment, setup and
ongoing management
Tightly integrated solution
Centralized management
Scalability through multiple
hardware platforms
Low total cost of ownership
*U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361; 7,991,723
2
Capture Threat Network. SonicWall also
participates in industry collaboration
efforts and engages with threat research
communities to gather and share
samples of attacks and vulnerabilities.
This shared threat intelligence is used
to develop real-time countermeasures
that are automatically deployed to our
customers’ rewalls.
Network control and exibility
At the core of the NSA series is SonicOS,
SonicWall’s feature-rich operating
system. SonicOS provides organizations
with the network control and exibility
they require through application
intelligence and control, real-time
visualization, an intrusion prevention
system (IPS) featuring sophisticated anti-
evasion technology, high-speed virtual
private networking (VPN) and other
robust security features.
Using application intelligence and
control, network administrators can
identify and categorize productive
applications from those that are
unproductive or potentially dangerous,
and control that trafc through powerful
application-level policies on both a per-
user and a per-group basis (along with
schedules and exception lists). Business-
critical applications can be prioritized
and allocated more bandwidth
while non-essential applications are
bandwidth-limited. Real-time monitoring
and visualization provides a graphical
representation of applications, users and
bandwidth usage for granular insight
into trafc across the network.
For organizations requiring advanced
exibility in their network design,
SonicOS offers the tools to segment
the network through the use of virtual
LANs (VLANs). This enables network
administrators to create a virtual
LAN interface that allows for network
separation into one or more logical
groups. Administrators create rules that
determine the level of communication
with devices on other VLANs.
Built into every NSA series rewall is a
wireless access controller that enables
organizations to extend the network
perimeter securely through the use of
wireless technology. Together, SonicWall
rewalls and SonicWave 802.11ac Wave
2 wireless access points create a wireless
network security solution that combines
industry-leading next-generation rewall
technology with high-speed wireless for
enterprise-class network security and
performance across the wireless network.
Easy deployment, setup and
ongoing management
Like all SonicWall rewalls, the NSA
series tightly integrates key security,
connectivity and exibility technologies
into a single, comprehensive solution.
This includes SonicWave wireless
access points and the SonicWall WAN
Acceleration Appliance (WXA) series,
both of which are automatically detected
and provisioned by the managing
NSA rewall. Consolidating multiple
capabilities eliminates the need to
purchase and install point products that
don’t always work well together. This
reduces the effort it takes to deploy the
solution into the network and congure
it, saving both time and money.
Ongoing management and monitoring
of network security are handled centrally
through the rewall or through the
SonicWall Global Management System
(GMS), providing network administrators
with a single pane of glass from which
to manage all aspects of the network.
Together, the simplied deployment
and setup along with the ease of
management enable organizations to
lower their total cost of ownership and
realize a high return on investment.
SonicWall
SonicWave 432i
SonicWall NSA 2650
Bi-direconal scanning
4 x 2.5GbE
SFP 4 x 2.5GbE 1 x 2.5GbE
Secure, High-speed Wireless
Combine an NSA 2650 next-generation rewall with a SonicWall SonicWave 802.11ac Wave 2 wireless access point to create a high-
speed wireless network security solution. SonicWall NSA 2650 rewalls and SonicWave access points both feature 2.5 GbE ports
that enable multi-gigabit wireless throughput offered in Wave 2 wireless technology. The NSA 2650 scans all wireless trafc coming
into and going out of the network using deep packet inspection technology and then removes harmful threats such as malware and
intrusions, even over encrypted connections. Additional security and control capabilities such as content ltering, application control
and intelligence and Capture Advanced Threat Protection can be run on the wireless network to provide added layers of protection.
3
Network Security Appliance 2600
The SonicWall NSA 2600 is designed to address the
needs of growing small organizations, branch ofces and
school campuses.
Network Security Appliance NSA 2650
The NSA 2650 delivers high-speed threat prevention over
thousands of encrypted and even more unencrypted
connections to mid-sized organizations and distributed
enterprises.
Dual fans Dual fans
Power
8 x 1GbE
ports
4 x 2.5GbE
SFP ports
12 x 1GbE
ports
Expansion module
1GbE
management
1GbE
management
Console
Optional
redundant
power
Power
16GB
storage
Console
Dual
USB ports
Dual
USB ports
4 x 2.5GbE
ports
Firewall NSA 2600
Firewall throughput 1.9 Gbps
IPS throughput 700 Mbps
Anti-malware throughput 400 Mbps
Full DPI throughput 300 Mbps
IMIX throughput 600 Mbps
Maximum DPI connections 250,000
New connections/sec 15,000/sec
Description SKU
NSA 2600 rewall only 01-SSC-3860
NSA 2600 TotalSecure Advanced (1-year) 01-SSC-1712
Firewall NSA 2650
Firewall throughput 3.0 Gbps
IPS throughput 1.4 Gbps
Anti-malware throughput 600 Mbps
Full DPI throughput 600 Mbps
IMIX throughput 700 Mbps
Maximum DPI connections 500,000
New connections/sec 15,000/sec
Description SKU
NSA 2650 rewall only 01-SSC-1936
NSA 2650 TotalSecure Advanced (1-year) 01-SSC-1988
4
Dual fans Dual fans
Power Power
Firewall NSA 3600
Firewall throughput 3.4 Gbps
IPS throughput 1.1 Gbps
Anti-malware throughput 600 Mbps
Full DPI throughput 500 Mbps
IMIX throughput 900 Mbps
Maximum DPI connections 375,000
New connections/sec 20,000/sec
Description SKU
Firewall only 01-SSC-3850
TotalSecure Advanced (1-year) 01-SSC-1713
2 x 10GbE
SFP+ ports
2 x 10GbE
SFP+ ports
12 x 1GbE
ports
12 x 1GbE
ports
1GbE
management
1GbE
management
4 x 1GbE
SFP ports
4 x 1GbE
SFP ports
Console Console
Dual
USB ports
Dual
USB ports
Network Security Appliance 3600
The SonicWall NSA 3600 is ideal for branch ofce and small-
to medium-sized corporate environments concerned about
throughput capacity and performance.
Network Security Appliance 4600
The SonicWall NSA 4600 secures growing medium-sized
organizations and branch ofce locations with enterprise-class
features and uncompromising performance.
Firewall NSA 4600
Firewall throughput 6.0 Gbps
IPS throughput 2.0 Gbps
Anti-malware throughput 1.1 Gbps
Full DPI throughput 800 Mbps
IMIX throughput 1.6 Gbps
Maximum DPI connections 1,000,000
New connections/sec 40,000/sec
Description SKU
Firewall only 01-SSC-3840
TotalSecure Advanced (1-year) 01-SSC-1714
5
Network Security Appliance 5600
The SonicWall NSA 5600 is ideal for distributed,
branch ofce and corporate environments needing
signicant throughput.
Network Security Appliance 6600
The SonicWall NSA 6600 is ideal for large distributed and
corporate central site environments requiring high throughput
capacity and performance.
Dual hot
swappable fans PowerDual fans Power
2 x 10GbE
SPF+ ports
12 x 1GbE
ports
1GbE
management
4 x 1GbE
SPF ports
Console
Dual
USB ports
Firewall NSA 5600
Firewall throughput 9.0 Gbps
IPS throughput 3.0 Gbps
Anti-malware throughput 1.7 Gbps
Full DPI throughput 1.6 Gbps
IMIX throughput 2.4 Gbps
Maximum DPI connections 1,000,000
New connections/sec 60,000/sec
Description SKU
NSA 5600 rewall only 01-SSC-3830
NSA 5600 TotalSecure Advanced (1-year) 01-SSC-1715
Firewall NSA 6600
Firewall throughput 12.0 Gbps
IPS throughput 4.5 Gbps
Anti-malware throughput 3.0 Gbps
Full DPI throughput 3.0 Gbps
IMIX throughput 3.5 Gbps
Maximum DPI connections 1,000,000
New connections/sec 90,000/sec
Description SKU
NSA 6600 rewall only 01-SSC-3820
NSA 6600 TotalSecure Advanced (1-year) 01-SSC-1716
4 x 10GbE
SFP+ ports
8 x 1GbE
ports
1GbE
management
8 x 1GbE
SFP ports
Console
Dual
USB ports
6
Reassembly-Free Deep Packet
Inspection engine
The SonicWall Reassembly-Free Deep
Packet Inspection (RFDPI) is a single-
pass, low latency inspection system that
performs stream-based, bi-directional
trafc analysis at high speed without
proxying or buffering to effectively
uncover intrusion attempts and malware
downloads while identifying application
trafc regardless of port and protocol.
This proprietary engine relies on
streaming trafc payload inspection to
detect threats at Layers 3-7, and takes
network streams through extensive and
repeated normalization and decryption
in order to neutralize advanced evasion
techniques that seek to confuse
detection engines and sneak malicious
code into the network.
Once a packet undergoes the
necessary pre-processing, including
SSL decryption, it is analyzed
against a single, proprietary memory
representation of three signature
databases: intrusion attacks, malware
and applications. The connection state is
then advanced to represent the position
of the stream relative to these databases
until it encounters a state of attack, or
other “match” event, at which point a
pre-set action is taken.
In most cases, the connection is
terminated and proper logging and
notication events are created. However,
the engine can also be congured for
inspection only or, in case of application
detection, to provide Layer 7 bandwidth
management services for the remainder
of the application stream as soon as the
application is identied.
Flexible, customizable deployment
options – NSA series at-a-glance
Every SonicWall NSA rewall utilizes
a breakthrough, multi-core hardware
design and RFDPI for internal and
external network protection without
compromising network performance.
NSA series NGFWs combine high-speed
intrusion prevention, le and content
inspection, and powerful application
intelligence and control with an
extensive array of advanced networking
and exible conguration features. The
NSA series offers an affordable platform
that is easy to deploy and manage in a
wide variety of large, branch ofce and
distributed network environments.
Dual ISP failover Multi-WAN redundancy
Stateful high availability
HF link
HA data link
User zone Administrative Servers
NSA series as central-site gateway
NSA series as in-line NGFW solution
Full L2-L7
signature-based
inspection
application
awareness
Internet
Internet Internet
Internet
Traffic out
Traffic out
Proxy
Scanning Packet
disassembly
Packet assembly-based process
SonicWall stream-based architectureCompetitive proxy-based architecture
When proxy
becomes full or
content too large,
files bypass
scanning.
Traffic in Traffic in
SSL
Reassembly-free Deep Packet Inspection (RFDPI)
Reassembly-free packet
scanning eliminates proxy
and content size limitations.
Inspection time
Less More
Inspection capacity
Min Max
Inspection time
Less More
Inspection capacity
Min Max
CPU 1
CPU 2
CPU 3
CPU 4
CPU n
SSL
7
Capture Labs
The dedicated, in-house SonicWall
Capture Labs threat research team
researches and develops counter-
measures to deploy to customer rewalls
for up-to-date protection. The team
gathers data on potential threats from
several sources including our award-
winning network sandboxing service,
Capture Advanced Threat Protection, as
well as more than 1 million SonicWall
sensors located around the globe that
monitor trafc for emerging threats. It
is analyzed via machine learning using
SonicWall's Deep Learning Algorithms
to extract the DNA from the code to
see if it is related to any known forms of
malicious code.
SonicWall NGFW customers benet from
continuously updated threat protection
around the clock. New updates take
effect immediately without reboots or
interruptions. The signatures resident on
the appliances are designed to protect
against wide classes of attacks, covering
tens of thousands of individual threats
with a single signature.
In addition to the countermeasures
on the appliance, NSA appliances also
have access to SonicWall CloudAV,
which extends the onboard signature
intelligence with over 20 million
signatures. This CloudAV database is
accessed by the rewall via a proprietary,
light-weight protocol to augment the
inspection done on the appliance. With
Capture Advanced Threat Protection,
a cloud-based multi-engine sandbox,
organizations can examine suspicious
les and code in an isolated environment
to stop advanced threats such as zero-
day attacks.
Advanced threat protection
SonicWall Capture Advanced Threat
Protection Service is a cloud-based
multi-engine sandbox that extends
rewall threat protection to detect and
prevent zero-day threats. Suspicious les
are sent to the cloud for analysis with
the option to hold them at the gateway
until a verdict is determined. The
multi-engine sandbox platform, which
includes virtualized sandboxing, full
system emulation and hypervisor level
analysis technology, executes suspicious
code and analyzes behavior. When a
le is identied as malicious, a hash is
immediately created within Capture and
later a signature is sent to rewalls to
prevent follow-on attacks.
The service analyzes a broad range
of operating systems and le types,
including executable programs, DLL,
PDFs, MS Ofce documents, archives,
JAR and APK.
Capture provides an at-a-glance threat
analysis dashboard and reports, which
detail the analysis results for les sent to
the service, including source, destination
and a summary plus details of malware
action once detonated.
Protecon Collecon
Classificaon
Countermeasure
Creaon
LABS
8
Global management and reporting
For highly regulated organizations
wanting to achieve a fully coordinated
security governance, compliance and risk
management strategy, SonicWall Global
Management System (GMS®) provides
administrators a unied, secure and
extensible platform to manage SonicWall
rewalls, wireless access points and Dell
X-Series switches through a correlated
and auditable workstream process.
GMS enables enterprises to easily
consolidate the management of security
appliances, reduce administrative
and troubleshooting complexities,
and govern all operational aspects of
the security infrastructure, including
centralized policy management and
enforcement; real-time event monitoring;
user activities; application identications;
ow analytics and forensics; compliance
and audit reporting; and more. GMS also
meets the rewall’s change management
requirements of enterprises through a
workow automation feature. With GMS
workow automation, all enterprises will
gain agility and condence in deploying
the right rewall policies, at the right
time and in conformance to compliance
regulations. Available in software, cloud
and virtual appliance options, GMS
provides a coherent way to manage
network security by business processes
and service levels, dramatically
simplifying lifecycle management of your
overall security environments compared
to managing on a device-by-device
basis.
Single
Management
Console
Reporting
Converged
Infrastructure
• Centralized
management
• Error-free policy
management
• Strong access control
• Comprehensive
audit trails
• PCI, HIPAA, SOX
report templates
• Lower operating costs
Port Expansion Scalability
SonicWall Firewall
SonicWall WAN
Acceleration
X-Series Switch
with PoE
SonicWall
SonicWave AP
SonicWall GMS Secure Compliance Enforcement
Benefits
9
Features
RFDPI engine
Feature Description
Reassembly-Free Deep Packet
Inspection (RFDPI)
This high-performance, proprietary and patented inspection engine performs stream-based, bi-directional trafc analysis,
without proxying or buffering, to uncover intrusion attempts and malware and to identify application trafc regardless of
port.
Bi-directional inspection Scans for threats in both inbound and outbound trafc simultaneously to ensure that the network is not used to distribute
malware and does not become a launch platform for attacks in case an infected machine is brought inside.
Stream-based inspection Proxy-less and non-buffering inspection technology provides ultra-low latency performance for DPI of millions of
simultaneous network streams without introducing le and stream size limitations, and can be applied on common
protocols as well as raw TCP streams.
Highly parallel and scalable The unique design of the RFDPI engine works with the multi-core architecture to provide high DPI throughput and
extremely high new session establishment rates to deal with trafc spikes in demanding networks.
Single-pass inspection A single-pass DPI architecture simultaneously scans for malware, intrusions and application identication, drastically
reducing DPI latency and ensuring that all threat information is correlated in a single architecture.
Firewall and networking
Feature Description
Threat API All the rewall to receive and leverage any and all proprietary, original equipment manufacturer and third-party
intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised credentials, ransomware
and advanced persistent threats.
Stateful packet inspection All network trafc is inspected, analyzed and brought into compliance with rewall access policies.
High availability/clustering The NSA series supports Active/Passive (A/P) with state synchronization, Active/Active (A/A) DPI and Active/Active
clustering high availability modes. Active/Active DPI ofoads the deep packet inspection load to cores on the passive
appliance to boost throughput.
DDoS/DoS attack protection SYN ood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting
technologies. Additionally, it protects against DOS/DDoS through UDP/ICMP ood protection and connection rate limiting.
IPv6 support Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With SonicOS, the hardware will support ltering and
wire mode implementations.
Flexible deployment options The NSA Series can be deployed in traditional NAT, Layer 2 bridge, wire and network tap modes.
WAN load balancing Load-balances multiple WAN interfaces using Round Robin, Spillover or Percentage methods. Policy-based routing
Creates routes based on protocol to direct trafc to a preferred WAN connection with the ability to fail back to a
secondary WAN in the event of an outage.
Advanced quality of service (QoS) Guarantees critical communications with 802.1p, DSCP tagging, and remapping of VoIP trafc on the network.
H.323 gatekeeper and SIP proxy support Blocks spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy.
Single and cascaded Dell X-Series switch
management
Manage security settings of additional ports, including Portshield, HA, POE and POE+, under a single pane of glass using
the rewall management dashboard for Dell’s X-Series network switch.
Biometric authentication Supports mobile device authentication such as ngerprint recognition that cannot be easily duplicated or shared to
securely authenticate the user identity for network access.
Open authentication and social login Enable guest users to use their credentials from social networking services such as Facebook, Twitter, or Google+ to
sign in and access the Internet and other guest services through a host's wireless, LAN or DMZ zones using pass-through
authentication.
Management and reporting
Feature Description
Global Management System (GMS) SonicWall GMS monitors, congures and reports on multiple SonicWall appliances through a single management console
with an intuitive interface, reducing management costs and complexity.
Powerful single device management An intuitive web-based interface allows quick and convenient conguration, in addition to a comprehensive command-line
interface and support for SNMPv2/3.
IPFIX/NetFlow application ow reporting Exports application trafc analytics and usage data through IPFIX or NetFlow protocols for real-time and historical
monitoring and reporting with tools such as SonicWall Scrutinizer or other tools that support IPFIX and NetFlow
with extensions.
Virtual private networking (VPN)
Feature Description
Auto-provision VPN Simplies and reduces complex distributed rewall deployment down to a trivial effort by automating the initial site-
to-site VPN gateway provisioning between SonicWall rewalls while security and connectivity occurs instantly and
automatically.
IPSec VPN for site-to-site connectivity High-performance IPSec VPN allows the NSA Series to act as a VPN concentrator for thousands of other large sites,
branch ofces or home ofces.
SSL VPN or IPSec client remote access Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, les, computers,
intranet sites and applications from a variety of platforms.
10
Redundant VPN gateway When using multiple WANs, a primary and secondary VPN can be congured to allow seamless, automatic failover and
failback of all VPN sessions.
Route-based VPN The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel
failure, by seamlessly re-routing trafc between endpoints through alternate routes.
Content/context awareness
Feature Description
User activity tracking User identication and activity are made available through seamless AD/LDAP/Citrix1/Terminal Services1 SSO integration
combined with extensive information obtained through DPI.
GeoIP country trafc identication Identies and controls network trafc going to or coming from specic countries to either protect against attacks from
known or suspected origins of threat activity, or to investigate suspicious trafc originating from the network. Ability
to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP address.
Eliminates unwanted ltering of IP addresses due to misclassication.
Regular expression DPI ltering Prevents data leakage by identifying and controlling content crossing the network through regular expression matching.
Provides the ability to create custom country and Botnet lists to override an incorrect country or Botnet tag associated
with an IP address.
Breach prevention subscription services
Capture advanced threat protection
Feature Description
Multi-engine sandboxing The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation, and hypervisor level
analysis technology, executes suspicious code and analyzes behavior, providing comprehensive visibility to malicious
activity.
Block until verdict To prevent potentially malicious les from entering the network, les sent to the cloud for analysis can be held at the
gateway until a verdict is determined.
Broad le type and size analysis Supports analysis of a broad range of le types, including executable programs (PE), DLL, PDFs, MS Ofce documents,
archives, JAR, and APK plus multiple operating systems including Windows, Android, Mac OS X and multi-browser
environments.
Rapid deployment of signatures When a le is identied as malicious, a signature is immediately deployed to rewalls with SonicWALL Capture subscriptions
and Gateway Anti-Virus and IPS signature databases and the URL, IP and domain reputation databases within 48 hours.
Encrypted threat prevention
Feature Description
SSL/TLS decryption and inspection
Decrypts and inspects SSL /TLS encrypted trafc on the y, without proxying, for malware, intrusions and data leakage,
and applies application, URL and content control policies in order to protect against threats hidden in SSL encrypted
trafc Included with security subscriptions for all NSA series models.
SSH inspection Deep packet inspection of SSH (DPI-SSH) decrypts and inspect data traversing over SSH tunnel to prevent attacks that
leverage SSH.
Intrusion prevention
Feature Description
Countermeasure-based protection Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet
payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.
Automatic signature updates The SonicWall Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures
that covers more than 50 attack categories. The new updates take immediate effect without any reboot or service interruption
required.
Intra-zone IPS protection Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing
threats from propagating across the zone boundaries.
Botnet command and control (CnC)
detection and blocking
Identies and blocks command and control trafc originating from bots on the local network to IPs and domains that are
identied as propagating malware or are known CnC points.
Protocol abuse/anomaly Identies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
Zero-day protection Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques
that cover thousands of individual exploits.
Anti-evasion technology Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected
by utilizing evasion techniques in Layers 2-7.
Threat prevention
Feature Description
Gateway anti-malware The RFDPI engine scans all inbound, outbound and intra-zone trafc for viruses, Trojans, key loggers and other malware
in les of unlimited length and size across all ports and TCP streams.
CloudAV malware protection
A continuously updated database of over 20 million threat signatures resides in the SonicWall cloud servers and is
referenced to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of
threats.
11
Around-the-clock security updates New threat updates are automatically pushed to rewalls in the eld with active security services, and take effect
immediately without reboots or interruptions.
Bi-directional raw TCP inspection The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that they to
sneak by outdated security systems that focus on securing a few well-known ports.
Extensive protocol support Identies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and
decodes payloads for malware inspection, even if they do not run on standard, well-known ports.
Application intelligence and control
Feature Description
Application control Control applications, or individual application features, that are identied by the RFDPI engine against a continuously
expanding database of over thousands of application signatures, to increase network security and enhance network
productivity.
Custom application identication Control custom applications by creating signatures based on specic parameters or patterns unique to an application in
its network communications, in order to gain further control over the network.
Application bandwidth management Granularly allocate and regulate available bandwidth for critical applications or application categories while inhibiting
nonessential application trafc.
Granular control Control applications, or specic components of an application, based on schedules, user groups, exclusion lists and a
range of actions with full SSO user identication through LDAP/AD/Terminal Services/Citrix integration.
Content ltering
Feature Description
Inside/outside content ltering Enforce acceptable use policies and block access to websites containing information or images that are objectionable or
unproductive with Content Filtering Service.
Enforced content ltering client Extend policy enforcement to block internet content for Windows, Mac OS, Android and Chrome devices located outside
the rewall perimeter.
Granular controls Block content using the predened categories or any combination of categories. Filtering can be scheduled by time of
day, such as during school or business hours, and applied to individual users or groups.
Web caching URL ratings are cached locally on the SonicWall rewall so that the response time for subsequent access to frequently
visited sites is only a fraction of a second.
Enforced anti-virus and anti-spyware
Feature Description
Multi-layered protection Utilize the rewall capabilities as the rst layer of defense at the perimeter, coupled with endpoint protection to block,
viruses entering network through laptops, thumb drives and other unprotected systems.
Automated enforcement option Ensure every computer accessing the network has the most recent version of anti-virus and anti-spyware signatures
installed and active, eliminating the costs commonly associated with desktop anti-virus and anti-spyware management.
Automated deployment and installation
option
Machine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across the network,
minimizing administrative overhead.
Always on, automatic virus protection Frequent anti-virus and anti-spyware updates are delivered transparently to all desktops and le servers to improve end
user productivity and decrease security management.
Spyware protection Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on desktops
and laptops before they transmit condential data, providing greater desktop security and performance.
12
Firewall
Stateful packet inspection
Reassembly-Free Deep Packet
Inspection
DDoS attack protection (UDP/ICMP/SYN
ood)
IPv4/IPv6 support
Biometric authentication for remote
access
DNS proxy
Threat API
SSL/SSH decryption and inspection1
Deep packet inspection for TLS/SSL/SSH
Inclusion/exclusion of objects, groups or
hostnames
SSL Control
Capture advanced threat protection1
Cloud-based multi-engine analysis
Virtualized sandboxing
Hypervisor level analysis
Full system emulation
Broad le type examination
Automated and manual submission
Real-time threat intelligence updates
Auto-block capability
Intrusion prevention1
Signature-based scanning
Automatic signature updates
Bidirectional inspection
Granular IPS rule capability
GeoIP enforcement
Botnet ltering with dynamic list
Regular expression matching
Anti-malware1
Stream-based malware scanning
Gateway anti-virus
Gateway anti-spyware
Bi-directional inspection
No le size limitation
Cloud malware database
Application identication1
Application control
Application trafc visualization
Application component blocking
Application bandwidth management
Custom application signature creation
Data leakage prevention
Application reporting over NetFlow/
IPFIX
User activity tracking (SSO)
Comprehensive application signature
database
Web content ltering1
URL ltering
Anti-proxy technology
Keyword blocking
Bandwidth manage CFS
rating categories
Unied policy model with app control
Content Filtering Client
VPN
Auto-provision VPN
IPSec VPN for site-to-site connectivity
SSL VPN and IPSec client remote access
Redundant VPN gateway
Mobile Connect for iOS, Mac OS
X, Windows, Chrome, Android and
Kindle Fire
Route-based VPN (OSPF, RIP, BGP)
Networking
PortShield
Jumbo frames
IPv6
Path MTU discovery
Enhanced logging
VLAN trunking
RSTP (Rapid Spanning Tree protocol)
Port mirroring
Layer-2 QoS
Port security
Dynamic routing (RIP/OSPF/BGP)
SonicWall wireless controller
Policy-based routing (ToS/metric and
ECMP)
NAT
DHCP server
Bandwidth management
Link aggregation (static and dynamic)
Port redundancy
A/P high availability with state sync
A/A clustering
Inbound/outbound load balancing
L2 bridge, wire/virtual wire mode,
tap mode
3G/4G WAN failover
Asymmetric routing
Common Access Card (CAC) support
Wireless
MU-MIMO
Floor plan view
Topology view
Band steering
Beamforming
AirTime fairness
MiFi extender
Guest cyclic quota
VoIP
Granular QoS control
Bandwidth management
DPI for VoIP trafc
H.323 gatekeeper and SIP proxy support
Management and monitoring
Web GUI
Command line interface (CLI)
SNMPv2/v3
Centralized management and reporting
Logging
Netow/IPFix exporting
Cloud-based conguration backup
BlueCoat Security Analytics Platform
Application and bandwidth visualization
IPv4 and IPv6 Management
Dell X-Series switch management
including cascaded switches
SonicOS feature summary
1Requires added subscription.
13
NSA series system specications
Firewall general NSA 2600 NSA 2650 NSA 3600 NSA 4600 NSA 5600 NSA 6600
Operating system SonicOS 6.5
Security processing cores 446810 24
Interfaces
8 x 1-GbE,
1 GbE Management,
1 Console
4 x 2.5-GbE SFP,
4 x 2.5-GbE,
12 x 1-GbE,
1 GbE Management,
1 Console
2 x 10-GbE SFP+,
4 x 1-GbE SFP,
12 x 1 GbE,
1 GbE Management,
1 Console
2 x 10-GbE SFP+,
4 x 1-GbE SFP,
12 x 1 GbE,
1 GbE Management,
1 Console
2 x 10-GbE SFP+,
4 x 1-GbE SFP,
12 x 1 GbE,
1 GbE Management,
1 Console
4 x 10-GbE SFP+,
8 x 1-GbE SFP,
8 x 1 GbE,
1 GbE Management,
1 Console
Expansion 1 Expansion Slot
(Rear)*, SD Card*
1 Expansion Slot
(Rear)*,
16 GB storage
module
1 Expansion Slot (Rear)*, SD Card*
Management CLI, SSH, GUI, GMS
SSO users 30,000 40,000 40,000 50,000 60,000 70,000
Maximum access points supported 32 48 48 64 96 128
Logging Analyzer, Local Log, Syslog
Firewall/VPN Performance NSA 2600 NSA 2650 NSA 3600 NSA 4600 NSA 5600 NSA 6600
Firewall inspection throughput11.9 Gbps 3.0 Gbps 3.4 Gbps 6.0 Gbps 9.0 Gbps 12.0 Gbps
Full DPI throughput2300 Mbps 600 Mbps 500 Mbps 800 Mbps 1.6 Gbps 3.0 Gbps
Application inspection throughput2700 Mbps 1.4 Gbps 1.1 Gbps 2.0 Gbps 3.0 Gbps 4.5 Gbps
IPS throughput2700 Mbps 1.4 Gbps 1.1 Gbps 2.0 Gbps 3.0 Gbps 4.5 Gbps
Anti-malware inspection throughput2400 Mbps 600 Mbps 600 Mbps 1.1 Gbps 1.7 Gbps 3.0 Gbps
IMIX throughput 600 Mbps 700 Mbps 900 Mbps 1.6 Gbps 2.4 Gbps 3.5 Gbps
TLS/SSL Inspection and Decryption
(DPI SSL)2 200 Mbps 300 Mbps 300 Mbps 500 Mbps 800 Mbps 1.3 Gbps
VPN throughput31.1 Gbps 1.5 Gbps 1.5 Gbps 3.0 Gbps 4.5 Gbps 5.0 Gbps
Connections per second 15,000/sec 15,000/sec 20,000/sec 40,000/sec 60,000/sec 90,000/sec
Maximum connections (SPI) 500,000 1,000,000 750,000 1,000,000 1,500,000 1,500,000
Maximum connections (DPI)4250,000 500,000 375,000 500,000 1,000,000 1,000,000
Default/Maximum connections (DPI SSL)41,000/1,000 12,000/13,500 2,000/2,750 3,000/4,500 4,000/8,500 6,000/10,500
VPN NSA 2600 NSA 2650 NSA 3600 NSA 4600 NSA 5600 NSA 6600
Site-to-site tunnels 250 1,000 1,000 3,000 4,000 6,000
IPSec VPN clients (max) 10 (250) 50 (1,000) 50 (1,000) 500 (3,000) 2,000 (4,000) 2,000 (6,000)
SSL VPN NetExtender Clients (max) 2 (250) 2 (350) 2 (350) 2 (500) 2 (1000) 2 (1500)
Encryption/Authentication DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B Cryptography
Key exchange Dife Hellman Groups 1, 2, 5, 14v
Route-based VPN R I P, O S PF
Networking NSA 2600 NSA 2650 NSA 3600 NSA 4600 NSA 5600 NSA 6600
IP address assignment Static (DHCP PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP Relay
NAT modes 1:1, many:1, 1:many, exible NAT (overlapping IPS), PAT, transparent mode
VLAN interfaces 256 256 256 256 400 500
Routing protocols BGP, OSPF, RIPv1/v2, static routes, policy-based routing
QoS Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p
Authentication LDAP (multiple domains), XAUTH/RADIUS, SSO, Novell, internal user database, Terminal Services, Citrix, Common Access Card (CAC)
VoIP Full H323-v1-5, SIP
Standards TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
Certications ICSA Firewall, ICSA Anti-Virus, FIPS 140-2, Common Criteria NDPP (Firewall and IPS), UC APL
High availability Active/Passive with State Sync Active/Passive with State Sync
Active/Active Clustering
Active/Passive with State Sync,
Active/Active DPI with State Sync,
Active/Active Clustering
Hardware NSA 2600 NSA 2650 NSA 3600 NSA 4600 NSA 5600 NSA 6600
Power supply Single, Fixed 200W Dual, redundant
120W (one included) Single, Fixed 250W
Fans Dual, Fixed Dual, redundant,
hot swappable
Input power 100-240 VAC, 60-50 Hz
Maximum power consumption (W) 49.4 74.3 74.3 86.7 90.9 113.1
MTBF @25ºC in hours 176,540 146,789 146,789 139,783 134,900 116,477
MTBF @25ºC in years 20.15 16.76 16.76 15.96 15.40 13.30
Form factor 1U Rack Mountable
Dimension 1.75 x 19.1 x 17 in (4.5 x 48.5 x 43 cm)
Weight 10.1 lb (4.6 kg) 13.56 lb (6.15 kg) 13.56 lb (6.15 kg) 14.93 lb (6.77 kg)
WEEE weight 11.0 lb (5.0 kg) 14.24 lb (6.46 kg) 14.24 lb (6.46 kg) 19.78 lb (8.97 kg)
Shipping weight 14.3 lb (6.5 kg) 20.79 lb (9.43 kg) 20.79lb (9.43 kg) 26.12 lb (11.85 kg)
Major regulatory FCC Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB,
Mexico CoC by UL, WEEE , REACH, ANATEL, BSMI, CU
Environment (Operating/Storage) 32°-105° F (-40° C)/-40° to 158° F (-40° to 70° C)
Humidity 10-90% non-condensing
1 Testing Methodologies: Maximum performance based on RFC 2544 (for rewall). Actual performance may vary depending on network conditions and activated services.
2 Full DPI/GatewayAV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools. Testing done with multiple ows through
multiple port pairs.
3 VPN throughput measured using UDP trafc at 1280 byte packet size adhering to RFC 2544. All specications, features and availability are subject to change.
4 For every 125,000 DPI connections reduced, the number of available DPI SSL connections increases by 750.
*Future use. All specications, features and availability are subject to change.
14
NSA series ordering information
NSA 2650 SKU
NSA 2650 TotalSecure Advanced Edition (1-year) 01-SSC-1988
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 2650 (1-year) 01-SSC-1783
Capture Advanced Threat Protection for NSA 2650 (1-year) 01-SSC-1935
Threat PreventionIntrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 2650 (1-year) 01-SSC-1976
Silver 24x7 Support for NSA 2650 (1-year) 01-SSC-1541
Content Filtering Service for NSA 2650 (1-year) 01-SSC-1970
Enforced Client Anti-Virus & Anti-Spyware Based on user count
Comprehensive Anti-Spam Service for NSA 2650 (1-year) 01-SSC-2001
NSA 3600 SKU
NSA 3600 TotalSecure Advanced Edition (1-year) 01-SSC-1713
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 3600 (1-year) 01-SSC-1480
Capture Advanced Threat Protection for NSA 3600 (1-year) 01-SSC-1485
Threat PreventionIntrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 3600 (1-year) 01-SSC-4435
Silver 24x7 Support for NSA 3600 (1-year) 01-SSC-4302
Content Filtering Service for NSA 3600 (1-year) 01-SSC-4441
Enforced Client Anti-Virus & Anti-Spyware Based on user count
Comprehensive Anti-Spam Service for NSA 3600 (1-year) 01-SSC-4447
NSA 4600 SKU
NSA 4600 TotalSecure Advanced Edition (1-year) 01-SSC-1714
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 4600 (1-year) 01-SSC-1490
Capture Advanced Threat Protection for NSA 4600 (1-year) 01-SSC-1495
Threat PreventionIntrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 4600 (1-year) 01-SSC- 4411
Silver 24x7 Support for NSA 4600 (1-year) 01-SSC-4290
Content Filtering Service for NSA 4600 (1-year) 01-SSC-4417
Enforced Client Anti-Virus & Anti-Spyware Based on user count
Comprehensive Anti-Spam Service for NSA 4600 (1-year) 01-SSC-4423
NSA 5600 SKU
NSA 5600 TotalSecure Advanced Edition (1-year) 01-SSC-1715
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 5600 (1-year) 01-SSC-1550
Capture Advanced Threat Protection for NSA 5600 (1-year) 01-SSC-1555
Threat Prevention – Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 5600 (1-year) 01-SSC-4240
Gold 24x7 Support for NSA 5600 (1-year) 01-SSC-4284
Content Filtering Service for NSA 5600 (1-year) 01-SSC-4246
Enforced Client Anti-Virus & Anti-Spyware Based on user count
Comprehensive Anti-Spam Service for NSA 5600 (1-year) 01-SSC-4252
NSA 6600 SKU
NSA 6600 TotalSecure Advanced Edition (1-year) 01-SSC-1716
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 6600 (1-year) 01-SSC-1560
Capture Advanced Threat Protection for NSA 6600 (1-year) 01-SSC-1565
Threat PreventionIntrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 6600 (1-year) 01-SSC-4216
Gold 24x7 Support for NSA 6600 (1-year) 01-SSC-4278
Content Filtering Service for NSA 6600 (1-year) 01-SSC-4222
Enforced Client Anti-Virus & Anti-Spyware Based on user count
Comprehensive Anti-Spam Service for NSA 6600 (1-year) 01-SSC-4228
Modules and accessories* SKU
10GBASE-SR SFP+ Short Reach Module 01-SSC-9785
10GBASE-LR SFP+ Long Reach Module 01-SSC-9786
10GBASE SFP+ 1M Twinax Cable 01-SSC-9787
10GBASE SFP+ 3M Twinax Cable 01-SSC-9788
1000BASE-SX SFP Short Haul Module 01-SSC-9789
1000BASE-LX SFP Long Haul Module 01-SSC-9790
1000BASE-T SFP Copper Module 01-SSC-9791
Management and reporting SKU
SonicWall GMS 10 Node Software License 01-SSC-3363
SonicWall GMS E-Class 24x7 Software Support for 10 node (1-year) 01-SSC-6514
*Please consult with your local SonicWall reseller for a complete list of supported SFP and SFP+ modules
© 2017 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a
trademark or registered trademark of SonicWall Inc. and/or its afliates
in the U.S.A. and/or other countries. All other trademarks
and registered trademarks are property of their respective owners.
SonicWall, Inc.
5455 Great America Parkway | Santa Clara, CA 95054
Refer to our website for additional information.
www.sonicwall.com
Datasheet-NetworkSecurityAppliance-US-VG-MKTG659
Regulatory model numbers:
NSA 2600–1RK29-0A9
NSA 2650-1RK38-0C8
NSA 3600–1RK26-0A2
NSA 46001RK26-0A3
NSA 5600–1RK26-0A4
NSA 66001RK27-0A5
About Us
SonicWall has been ghting the cyber-criminal industry for over 25 years, defending small, medium size businesses and enterprises
worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specic needs of
the more than 500,000 global businesses in over 150 countries, so you can do more business with less fear.

Navigation menu