SonicWall Network Security Appliance (NSA) series

SonicWall Network Security
Appliance (NSA) series
Industry-validated security effectiveness and performance for
mid-sized networks
The SonicWall Network Security
Appliance (NSA) series provides
midsized networks, branch offices and
distributed enterprises with advanced
threat prevention in a high-performance
security platform. Combining nextgeneration firewall technology with
our patented* Reassembly-Free Deep
Packet Inspection (RFDPI) engine on a
multi-core architecture, the NSA series
offers the security, performance and
control organizations require.
Superior threat prevention and
performance
NSA series next-generation firewalls
(NGFWs) integrate a series of advanced
security technologies to deliver a
superior level of threat prevention.
Our patented single-pass RFDPI
threat prevention engine examines
every byte of every packet, inspecting
both inbound and outbound traffic
simultaneously. The NSA series
leverages on-box capabilities including
intrusion prevention, anti-malware
and web/URL filtering in addition to
cloud-based services such as CloudAV
and SonicWall Capture multi-engine
sandboxing to block zero-day threats
at the gateway. Unlike other security
products that cannot inspect large files
for hidden threats, NSA firewalls scan
files of any size across all ports and
protocols. The security architecture in
SonicWall NGFWs has been validated
as one of the industry’s best for security
effectiveness by NSS Labs which
awarded SonicWall its “Recommended”
rating for the fourth consecutive year.
Going beyond intrusion prevention,
anti-malware and web filtering,
SonicWall NGFWs provide a further
level of protection by performing full
decryption and inspection of TLS/SSL
and SSH encrypted traffic as well as
non-proxyable applications, enabling
complete protection regardless of
transport or protocol. It looks deep
inside every packets (the header and
data part) searching for protocol
non-compliance, threats, zero-days,
intrusions, and even defined criteria to
detect and prevent hidden attacks that
leverage cryptography, block encrypted
malware downloads, cease the spread
of infections, and thwart command
and control (C&C) communications
and data exfiltration. Inclusion and
exclusion rules allow total control to
customize which traffic is subjected to
decryption and inspection based on
specific organizational compliance and/
or legal requirements.
When organizations activate deep
packet inspection functions such as
intrusion prevention, anti-virus, anti
spyware, TLS/SSL decryption/inspection
and others on their firewalls network
performance often slows down,
sometimes dramatically. NSA series
firewalls feature a multi-core hardware
architecture that utilizes specialized
security microprocessors. Combined
with our RFDPI engine, this unique
design eliminates the performance
degradation networks experience with
other firewalls.
*U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361; 7,991,723
Benefits:
Superior threat prevention
and performance
• Patented reassembly-free deep
packet inspection technology
• On-box and cloud-based threat
prevention
• SSL/TLS decryption and inspection
• Industry-validated security
effectiveness
• Multi-core hardware architecture
• Dedicated in-house threat
research team
Network control and flexibility
• Powerful SonicOS operating system
• Application intelligence and control
• Network segmentation with VLANs
• Wireless network security
Easy deployment, setup and
ongoing management
• Tightly integrated solution
• Centralized management
• Scalability through multiple
hardware platforms
• Low total cost of ownership
In today’s security environment, it’s not
enough to rely on solely on outside
parties for threat information. That’s
why SonicWall formed its own in-house
threat research team more than 15
years ago. This dedicated team gathers,
analyzes and vets data from over one
million sensors in its GRID network.
SonicWall also participates in industry
collaboration efforts and engages
with threat research communities to
gather and share samples of attacks
and vulnerabilities. This shared threat
intelligence is used to develop real-time
countermeasures that are automatically
deployed to our customers’ firewalls.
Network control and flexibility
At the core of the NSA series is SonicOS,
SonicWall’s feature-rich operating
system. SonicOS provides organizations
with the network control and flexibility
they require through application
intelligence and control, real-time
visualization, an intrusion prevention
system (IPS) featuring sophisticated antievasion technology, high-speed virtual
private networking (VPN) and other
robust security features.
Using application intelligence and
control, network administrators can
identify and categorize productive
applications from those that are
unproductive or potentially dangerous,
and control that traffic through powerful
application-level policies on both a peruser and a per-group basis (along with
schedules and exception lists). Businesscritical applications can be prioritized
and allocated more bandwidth
while non-essential applications are
bandwidth-limited. Real-time monitoring
and visualization provides a graphical
representation of applications, users and
bandwidth usage for granular insight
into traffic across the network.
For organizations that require advanced
flexibility in their network design,
SonicOS offers the tools to securely
segment the network through the use
of virtual LANs (VLANs) which enable
network administrators to create a virtual
LAN interface that allows for network
separation into one or more logical
groups. Administrators create rules that
determine the level of communication
with devices on other VLANs.
Built into every NSA series firewall is a
wireless access controller that enables
organizations to extend the network
perimeter securely through the use of
wireless technology. Together, SonicWall
firewalls and SonicPoint 802.11ac
wireless access points create a wireless
network security solution that combines
industry-leading next-generation firewall
technology with high-speed wireless for
IPS with so
anti-e phi
va s
s
S
an SL
d
Patented
single pass
RFDPI
engine
ption
cry tion
de spec
in
d
ate
tic n
io
on
N
2
ist
N
m
t
al e t w
w a o r k- s e d a n s s i
b
a
a
re
w it h c l o u d
ex
ti
t- g
en
v
en
re
erat
io n t h r e at p
enterprise-class network security and
performance across the wireless network.
Easy deployment, setup and
ongoing management
Like all SonicWall firewalls, the NSA
series tightly integrates key security,
connectivity and flexibility technologies
into a single, comprehensive solution.
This includes SonicPoint wireless
access points and the SonicWall WAN
Acceleration Appliance (WXA) series,
both of which are automatically detected
and provisioned by the managing
NSA firewall. Consolidating multiple
capabilities eliminates the need to
purchase and install point products that
don’t always work well together. This
reduces the effort it takes to deploy the
solution into the network and configure
it, saving both time and money.
Ongoing management and monitoring
of network security are handled centrally
through the firewall or through the
SonicWall Global Management System
(GMS), providing network administrators
with a single pane of glass from which
to manage all aspects of the network.
Together, the simplified deployment
and setup along with the ease of
management enable organizations to
lower their total cost of ownership and
realize a high return on investment.
Network Security Appliance 2600
Network Security Appliance 3600/4600
The SonicWall NSA 2600 is designed to address the
needs of growing small organizations, branch offices and
school campuses.
The SonicWall NSA 3600/4600 is ideal for branch office and
small- to medium-sized corporate environments concerned
about throughput capacity and performance.
Dual
USB ports
Console
8 x 1GbE
ports
Console
1GbE
management
Dual fans
Firewall
Dual
2 x 10GbE
USB ports SFP+ ports
Expansion
module
Power
Expansion bay
for future use
4 x 1GbE
SFP ports
Power
Dual fans
Firewall
NSA 2600
1GbE
management
12 x 1GbE
ports
NSA 3600
NSA 4600
3.4 Gbps
6.0 Gbps
2.0 Gbps
1.9 Gbps
Firewall throughput
IPS throughput
700 Mbps
IPS throughput
1.1 Gbps
Anti-malware throughput
400 Mbps
Anti-malware throughput
600 Mbps
1.1 Gbps
Full DPI throughput
300 Mbps
Full DPI throughput
500 Mbps
800 Mbps
IMIX throughput
600 Mbps
IMIX throughput
900 Mbps
1.6 Gbps
Firewall throughput
Maximum DPI connections
New connections/sec
Description
125,000
15,000/sec
SKU
Maximum DPI connections
New connections/sec
175,000
200,000
20,000/sec
40,000/sec
Description
SKU
NSA 2600 firewall only
01-SSC-3860
Firewall only
01-SSC-3850
01-SSC-3840
NSA 2600 TotalSecure (1-year)
01-SSC-3863
TotalSecure (1-year)
01-SSC-3853
01-SSC-3843
3
Network Security Appliance 5600
Network Security Appliance 6600
The SonicWall NSA 5600 is ideal for distributed,
branch office and corporate environments needing
significant throughput.
The SonicWall NSA 6600 is ideal for large distributed and
corporate central site environments requiring high throughput
capacity and performance.
Dual
2 x 10GbE 12 x 1GbE
USB ports SPF+ ports ports
Console 1GbE
management
Expansion bay
for future use Dual fans
Firewall
4 x 1GbE
SPF ports
Power
Console
Expansion bay
for future use
NSA 5600
4 x 10GbE
SFP+ ports
1GbE
management
Dual hot
swappable fans
Firewall
8 x 1GbE
ports
4 x 1GbE
SFP ports
Power
NSA 6600
Firewall throughput
9.0 Gbps
Firewall throughput
12.0 Gbps
IPS throughput
3.0 Gbps
IPS throughput
4.5 Gbps
Anti-malware throughput
1.7 Gbps
Anti-malware throughput
3.0 Gbps
Full DPI throughput
1.6 Gbps
Full DPI throughput
3.0 Gbps
IMIX throughput
2.4 Gbps
IMIX throughput
3.5 Gbps
Maximum DPI connections
375,000
Maximum DPI connections
New connections/sec
Description
4
Dual
USB ports
60,000/sec
SKU
New connections/sec
Description
500,000
90,000/sec
SKU
NSA 5600 firewall only
01-SSC-3830
NSA 6600 firewall only
01-SSC-3820
NSA 5600 TotalSecure (1-year)
01-SSC-3833
NSA 6600 TotalSecure (1-year)
01-SSC-3823
Reassembly-Free Deep Packet
Inspection engine
network streams through extensive and
repeated normalization and decryption
in order to neutralize advanced evasion
techniques that seek to confuse
detection engines and sneak malicious
code into the network.
The SonicWall Reassembly-Free Deep
Packet Inspection (RFDPI) is a singlepass, low latency inspection system that
performs stream-based, bi-directional
traffic analysis at high speed without
proxying or buffering to effectively
uncover intrusion attempts and malware
downloads while identifying application
traffic regardless of port and protocol.
This proprietary engine relies on
streaming traffic payload inspection to
detect threats at Layers 3-7, and takes
Once a packet undergoes the
necessary pre-processing, including
SSL decryption, it is analyzed
against a single, proprietary memory
representation of three signature
databases: intrusion attacks, malware
and applications. The connection state is
then advanced to represent the position
Packet assembly-based process
Proxy
Scanning
of the stream relative to these databases
until it encounters a state of attack, or
other “match” event, at which point a
pre-set action is taken.
In most cases, the connection is
terminated and proper logging and
notification events are created. However,
the engine can also be configured for
inspection only or, in case of application
detection, to provide Layer 7 bandwidth
management services for the remainder
of the application stream as soon as the
application is identified.
Reassembly-free Deep Packet Inspection (RFDPI)
Packet
disassembly
SSL
Traffic in
CPU n
n=1024
CPU 4
SSL
Traffic in
Traffic out
Traffic out
CPU 3
CPU 2
Inspection time
Less
More
When proxy
becomes full or
content too large,
files bypass
scanning.
Inspection time
Inspection capacity
Min
Max
Less
Competitive proxy-based architecture
Flexible, customizable deployment
options – NSA series at-a-glance
Every SonicWall NSA appliance utilizes
a breakthrough, multi-core hardware
design and RFDPI for internal and
external network protection without
compromising network performance.
The NSA series NGFWs combine
high-speed intrusion prevention, file
and content inspection, and powerful
application intelligence and control
with an extensive array of advanced
networking and flexible configuration
features. The NSA series offers an
affordable platform that is easy to
deploy and manage in a wide variety
of large, branch office and distributed
network environments.
5
Inspection capacity
CPU 1
More
Min
Reassembly-free packet
scanning eliminates proxy
and content size limitations.
Max
SonicWall stream-based architecture
NSA series as central-site gateway
HA data link
Stateful high availability
HF link
Internet
Internet
Dual ISP failover
Internet
Multi-WAN redundancy
NSA series as in-line NGFW solution
Internet
Full L2-L7
signature-based
inspection
application
awareness
User zone
Administrative
Servers
Security and protection
The dedicated, in-house SonicWall
Threat Research Team works on
researching and developing countermeasures to deploy to the firewalls in
the field for up-to-date protection. The
team leverages more than one million
sensors across the globe for malware
samples, and for telemetry feedback
on the latest threat information,
which in turn is fed into the intrusion
prevention, anti-malware and application
detection capabilities.
SonicWall NGFW customers benefit from
continuously updated threat protection
around the clock, with new updates
taking effect immediately without
reboots or interruptions. The signatures
resident on the appliances are designed
to protect against wide classes of
attacks, covering tens of thousands of
individual threats with a single signature.
which extends the onboard signature
intelligence with over 30 million
signatures. This CloudAV database is
accessed via a proprietary, light-weight
protocol by the firewall to augment the
inspection done on the appliance. With
Capture Advanced Threat Protection,
a cloud-based network sandbox,
organizations can examine suspicious
files and code in an isolated environment
to stop advanced threats such as zeroday attacks.
Protection
Collection
Creation
Classification
In addition to the countermeasures on
the appliance, NSA appliances also have
access to the SonicWall CloudAV Service,
Application intelligence and control
Application intelligence informs
administrators of application traffic
traversing their network, so they can
schedule application controls based on
business priority, throttle unproductive
applications and block potentially
dangerous applications. Real-time
visualization identifies traffic anomalies
as they happen, enabling immediate
countermeasures against potential
inbound or outbound attacks or
performance bottlenecks.
SonicWall Application Traffic Analytics
provide granular insight into application
traffic, bandwidth utilization and
security threats, as well as powerful
troubleshooting and forensics
capabilities. Additionally, secure Single
Sign-On (SSO) capabilities ease the user
experience, increase productivity and
reduce support calls.
6
The SonicWall Global Management
System (GMS®) simplifies management
of application intelligence and control
using an intuitive, web-based interface.
Global management and reporting
For highly regulated organizations
wanting to achieve a fully coordinated
security governance, compliance and
risk management strategy, the optional
SonicWall Global Management System
(GMS®) provides administrators a
unified, secure and extensible platform
to manage SonicWall firewalls, wireless
access points and switches through a
correlated and auditable workstream
process. GMS enables enterprises to
easily consolidate the management
of security appliances, reduce
administrative and troubleshooting
complexities, and govern all operational
aspects of the security infrastructure,
including centralized policy
management and enforcement; realtime event monitoring; user activities;
application identifications; flow analytics
and forensics; compliance and audit
reporting; and more. GMS also meets
the firewall’s change management
requirements of enterprises through a
workflow automation feature. With GMS
workflow automation, all enterprises will
gain agility and confidence in deploying
the right firewall policies, at the right
time and in conformance to compliance
regulations. GMS provides a coherent
way to manage network security by
business processes and service levels,
dramatically simplifying lifecycle
management of your overall security
environments as compared to managing
on a device-by-device basis.
SonicWall GMS Secure Compliance Enforcement
Benefits
Single
Management
Console
• Centralized
management
Reporting
Converged
Infrastructure
SonicWall Firewall
• Error-free policy
management
• Strong access control
• Comprehensive
audit trails
SonicWall WAN
Acceleration
X-Series Switch
with PoE
• PCI, HIPAA, SOX
report templates
• Lower operating costs
Port Expansion Scalability
7
SonicWall
SonicPoint
Features
RFDPI engine
Feature
Description
Reassembly-Free Deep Packet
Inspection (RFDPI)
This high-performance, proprietary and patented inspection engine performs stream-based, bi-directional traffic analysis,
without proxying or buffering, to uncover intrusion attempts and malware and to identify application traffic regardless of
port.
Bi-directional inspection
Scans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not used to distribute
malware and does not become a launch platform for attacks in case an infected machine is brought inside.
Stream-based inspection
Proxy-less and non-buffering inspection technology provides ultra-low latency performance for DPI of millions of
simultaneous network streams without introducing file and stream size limitations, and can be applied on common
protocols as well as raw TCP streams.
Highly parallel and scalable
The unique design of the RFDPI engine works with the multi-core architecture to provide high DPI throughput and
extremely high new session establishment rates to deal with traffic spikes in demanding networks.
Single-pass inspection
A single-pass DPI architecture simultaneously scans for malware, intrusions and application identification, drastically
reducing DPI latency and ensuring that all threat information is correlated in a single architecture.
Firewall and networking
Feature
Description
Threat API
All the firewall to receive and leverage any and all proprietary, original equipment manufacturer and third-party
intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised credentials, ransomware
and advanced persistent threats.
Stateful packet inspection
All network traffic is inspected, analyzed and brought into compliance with firewall access policies.
High availability/clustering
The NSA series supports Active/Passive (A/P) with state synchronization, Active/Active (A/A) DPI and Active/Active
clustering high availability modes. Active/Active DPI offloads the deep packet inspection load to cores on the passive
appliance to boost throughput.
DDoS/DoS attack protection
SYN flood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting
technologies. Additionally, it protects against DOS/DDoS through UDP/ICMP flood protection and connection rate limiting.
IPv6 support
Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With the latest SonicOS 6.2, the hardware will
support filtering and wire mode implementations.
Flexible deployment options
The NSA Series can be deployed in traditional NAT, Layer 2 bridge, wire and network tap modes.
WAN load balancing
Load-balances multiple WAN interfaces using Round Robin, Spillover or Percentage methods. Policy-based routing
Creates routes based on protocol to direct traffic to a preferred WAN connection with the ability to fail back to a
secondary WAN in the event of an outage.
Advanced quality of service (QoS)
Guarantees critical communications with 802.1p, DSCP tagging, and remapping of VoIP traffic on the network.
H.323 gatekeeper and SIP proxy support
Blocks spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy.
Integrated Dell X-Series network switch
management
Manage security settings of additional ports, including Portshield, HA, POE and POE+, under a single pane of glass using
the SuperMassive management dashboard for Dell’s X series network switch.
Biometric Authentication
Supports mobile device authentication such as fingerprint recognition that cannot be easily duplicated or shared to
securely authenticate the user identity for network access.
Open Authentication and Social Login
Enable guest users to use their credentials from social networking services such as Facebook, Twitter, or Google+ to
sign in and access the Internet and other guest services through a host's wireless, LAN or DMZ zones using pass-through
authentication.
Management and reporting
Feature
Description
Global Management System
SonicWall GMS monitors, configures and reports on multiple SonicWall appliances through a single management console
with an intuitive interface, reducing management costs and complexity.
Powerful single device management
An intuitive web-based interface allows quick and convenient configuration, in addition to a comprehensive command-line
interface and support for SNMPv2/3.
IPFIX/NetFlow application flow reporting Exports application traffic analytics and usage data through IPFIX or NetFlow protocols for real-time and historical
monitoring and reporting with tools such as SonicWall Scrutinizer or other tools that support IPFIX and NetFlow
with extensions.
Virtual private networking (VPN)
Feature
Description
Auto-provision VPN
Simplifies and reduces complex distributed firewall deployment down to a trivial effort by automating the initial siteto-site VPN gateway provisioning between SonicWall firewalls while security and connectivity occurs instantly and
automatically.
IPSec VPN for site-to-site connectivity
High-performance IPSec VPN allows the NSA Series to act as a VPN concentrator for thousands of other large sites,
branch offices or home offices.
SSL VPN or IPSec client remote access
Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers,
intranet sites and applications from a variety of platforms.
8
Redundant VPN gateway
When using multiple WANs, a primary and secondary VPN can be configured to allow seamless, automatic failover and
failback of all VPN sessions.
Route-based VPN
The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel
failure, by seamlessly re-routing traffic between endpoints through alternate routes.
Content/context awareness
Feature
Description
User activity tracking
User identification and activity are made available through seamless AD/LDAP/Citrix1/Terminal Services1 SSO integration
combined with extensive information obtained through DPI.
GeoIP country traffic identification
Identifies and controls network traffic going to or coming from specific countries to either protect against attacks from
known or suspected origins of threat activity, or to investigate suspicious traffic originating from the network. Ability
to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP address.
Eliminates unwanted filtering of IP addresses due to misclassification.
Regular expression DPI filtering
Prevents data leakage by identifying and controlling content crossing the network through regular expression matching.
Ability to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP
address.
Breach prevention subscription services
Capture advanced threat protection
Feature
Description
Multi-engine sandboxing
The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation, and hypervisor level
analysis technology, executes suspicious code and analyzes behavior, providing comprehensive visibility to malicious
activity.
Broad file type and size analysis
Supports analysis of a broad range of file types, including executable programs (PE), DLL, PDFs, MS Office documents,
archives, JAR, and APK plus multiple operating systems including Windows, Android, Mac OSX and multi-browser
environments.
Rapid deployment of signatures
When a file is identified as malicious, a signature is immediately deployed to firewalls with SonicWALL Capture subscriptions
and GRID Gateway Anti-Virus and IPS signature databases and the URL, IP and domain reputation databases within 48 hours.
Block until verdict
To prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the
gateway until a verdict is determined.
Encrypted Threat prevention
Feature
Description
SSL decryption and inspection
Decrypts and inspects SSL traffic on the fly, without proxying, for malware, intrusions and data leakage, and applies
application, URL and content control policies in order to protect against threats hidden in SSL encrypted traffic Included with
security subscriptions for all models except SOHO. Sold as a separate license on SOHO.
SSH inspection
Deep packet inspection of SSH (DPI-SSH) decrypts and inspect data traversing over SSH tunnel to prevent attacks that
leverage SSH.
Intrusion prevention
Feature
Description
Countermeasure-based protection
Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet payloads
for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.
Automatic signature updates
The SonicWall Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures that
covers more than 50 attack categories. The new updates take immediate effect without any reboot or service interruption required.
Intra-zone IPS protection
Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing threats
from propagating across the zone boundaries.
Botnet command and control (CnC)
detection and blocking
Identifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are
identified as propagating malware or are known CnC points.
Protocol abuse/anomaly
Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
Zero-day protection
Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques that
cover thousands of individual exploits.
Anti-evasion technology
Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected by
utilizing evasion techniques in Layers 2-7.
Threat prevention
Feature
Description
Gateway anti-malware
The RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and other malware in
files of unlimited length and size across all ports and TCP streams.
CloudAV malware protection
A continuously updated database of over 17 million threat signatures resides in the SonicWall cloud servers and is referenced
to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of threats.
9
Around-the-clock security updates
New threat updates are automatically pushed to firewalls in the field with active security services, and take effect immediately
without reboots or interruptions.
Bi-directional raw TCP inspection
The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that they to sneak
by outdated security systems that focus on securing a few well-known ports.
Extensive protocol support
Identifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and
decodes payloads for malware inspection, even if they do not run on standard, well-known ports.
Application intelligence and control
Feature
Description
Application control
Control applications, or individual application features, that are identified by the RFDPI engine against a continuously
expanding database of over thousands of application signatures, to increase network security and enhance network
productivity.
Custom application identification
Control custom applications by creating signatures based on specific parameters or patterns unique to an application in its
network communications, in order to gain further control over the network.
Application bandwidth management Granularly allocate and regulate available bandwidth for critical applications or application categories while inhibiting
nonessential application traffic.
Granular control
Control applications, or specific components of an application, based on schedules, user groups, exclusion lists and a range of
actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix integration.
Content filtering
Feature
Description
Inside/outside content filtering
Enforce acceptable use policies and block access to websites containing information or images that are objectionable or
unproductive with Content Filtering Service.
Enforced content filtering client
Extend policy enforcement to block internet content for Windows, Mac and Android devices located outside the firewall
perimeter.
Granular controls
Block content using the predefined categories or any combination of categories. Filtering can be scheduled by time of day,
such as during school or business hours, and applied to individual users or groups.
Web caching
URL ratings are cached locally on the SonicWall firewall so that the response time for subsequent access to frequently visited
sites is only a fraction of a second.
Enforced anti-virus and anti-spyware
Feature
Description
Multi-layered protection
Utilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint protection to block, viruses
entering network through laptops, thumb drives and other unprotected systems.
Automated enforcement option
Ensure every computer accessing the network has the most recent version of anti-virus and anti-spyware signatures installed
and active, eliminating the costs commonly associated with desktop anti-virus and anti-spyware management.
Automated deployment and
installation option
Machine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across the network,
minimizing administrative overhead.
Always on, automatic virus
protection
Frequent anti-virus and anti-spyware updates are delivered transparently to all desktops and file servers to improve end user
productivity and decrease security management.
Spyware protection
Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on desktops and
laptops before they transmit confidential data, providing greater desktop security and performance.
10
SonicOS feature summary
Firewall
• Application bandwidth management
• Port redundancy
• Stateful packet inspection
• Custom application signature creation
• A/P high availability with state sync
• Reassembly-Free Deep Packet
Inspection
• Data leakage prevention
• A/A clustering
• Application reporting over NetFlow/
IPFIX
• Inbound/outbound load balancing
• DDoS attack protection (UDP/ICMP/SYN
flood)
• IPv4/IPv6 support
• Biometric authentication for remote
access
• DNS proxy
SSL/SSH decryption and inspection2
• Deep packet inspection for TLS/SSL/SSH
• Inclusion/exclusion of objects, groups or
hostnames
• SSL Control
Capture advanced threat protection2
• Cloud-based multi-engine analysis
Web content filtering2
• Anti-proxy technology
• Keyword blocking
• Bandwidth manage CFS
rating categories
• Unified policy model with app control
• Content Filtering Client
VPN
• Auto-provision VPN
• Virtualized sandboxing
• IPSec VPN for site-to-site connectivity
• Hypervisor level analysis
• SSL VPN and IPSec client remote access
• Full system emulation
• Redundant VPN gateway
• Broad file type examination
• Mobile Connect for iOS, Mac OS
X, Windows, Chrome, Android and
Kindle Fire
• Automated and manual submission
• Real-time threat intelligence updates
• Auto-block capability
Intrusion prevention
2
• Signature-based scanning
• Automatic signature updates
• Bidirectional inspection engine
• Granular IPS rule capability
• GeoIP/Botnet filtering
• Regular expression matching
Anti-malware
2
• Stream-based malware scanning
• Gateway anti-virus
• Gateway anti-spyware
• Bi-directional inspection
• No file size limitation
• Cloud malware database
Application identification2
• Application control
• Application traffic visualization
• Application component blocking
2
• Comprehensive application signature
database
• URL filtering
• Threat API
1
• User activity tracking (SSO)
• Route-based VPN (OSPF, RIP)
Networking
• 3G/4G WAN failover
• Asymmetric routing
• Common Access Card (CAC) support
VoIP
• Granular QoS control
• Bandwidth management
• DPI for VoIP traffic
• H.323 gatekeeper and SIP proxy support
Management and monitoring
• Web GUI
• Command line interface (CLI)
• SNMPv2/v3
• Centralized management and reporting
• Logging
• Netflow/IPFix exporting
• Single Sign-On (SSO)
• Terminal service/Citrix support1
• BlueCoat Security Analytics Platform
• Application and bandwidth visualization
• PortShield
• IPv4 and IPv6 Management
• Jumbo frames (not on NSA 2600)
• Dell X-Series switch management
• IPv6
• Path MTU discovery
IPv6
• IPv6 filtering
• Enhanced logging
• 6rd (rapid deployment)
• VLAN trunking
• DHCP prefix delegation
• RSTP (Rapid Spanning Tree protocol)
• Wire mode
• Port mirroring (not on NSA 2600)
• BGP
• Layer-2 QoS
• Port security
• Dynamic routing
• SonicPoint wireless controller1
• Policy-based routing
• NAT
• DHCP server
• Bandwidth management
• Link aggregation
Supported on SonicOS 6.1 and 6.2. Not supported on SonicOS 6.2.1.
Requires added subscription.
11
• L2 bridge, wire mode, tap mode, NAT
mode
NSA series system specifications
Firewall general
Operating system
Security processing cores
NSA 2600
NSA 3600
NSA 4600
NSA 5600
NSA 6600
10
2 x 10-GbE SFP+, 4
x 1-GbE SFP, 12 x 1
GbE, 1 Gbe Console
4
6
SonicOS 6.2.2
8
8x1 GbE, 1GbE
Management, 1
Console
2 x 10-GbE SFP+, 4
x 1-GbE SFP, 12 x 1
GbE, 1 Gbe Console
2 x 10-GbE SFP+, 4
x 1-GbE SFP, 12 x 1
GbE, 1 Gbe Console
2.0 GB
2.0 GB
30,000
32
Firewall/VPN Performance
Firewall inspection throughput1
Full DPI throughput 2
Application inspection throughput 2
IPS throughput 2
Anti-malware inspection throughput 2
IMIX throughput 3
SSL Inspection and Decryption (DPI SSL)2
VPN throughput 3
Connections per second
Maximum connections (SPI)
Maximum connections (DPI)
SSL DPI Connections
Interfaces
Memory (RAM)
Expansion
Management
SSO users
Maximum SonicPoints supported
Logging
Hardware Failover
VPN
Site-to-site tunnels
IPSec VPN clients (max)
SSL VPN NetExtender Clients (max)
Encryption/Authentication
Key exchange
Route-based VPN
Networking
IP address assignment
NAT modes
VLAN interfaces
Routing protocols
QoS
Authentication
VoIP
Standards
Certifications
Hardware
Power supply
4.0 GB
40,000
48
2.0 GB
1 Expansion Slot (Rear)*, SD Card*
CLI, SSH, GUI, GMS
50,000
64
24
4 x 10-GbE SFP+ ,
8 x 1-GbE SFP, 8 x 1
GbE, 1 GbE, 1 Gbe
Console
4.0 GB
60,000
96
70,000
128
NSA 2600
NSA 3600
NSA 4600
NSA 5600
NSA 6600
1.9 Gbps
300 Mbps
700 Mbps
700 Mbps
400 Mbps
600 Mbps
200 Mbps
1.1 Gbps
15,000/sec
225,000
125,000
1,000
3.4 Gbps
500 Mbps
1.1 Gbps
1.1 Gbps
600 Mbps
900 Mbps
300 Mbps
1.5 Gbps
20,000/sec
325,000
175,000
2,000
6.0 Gbps
800 Mbps
2.0 Gbps
2.0 Gbps
1.1 Gbps
1.6 Gbps
500 Mbps
3.0 Gbps
40,000/sec
400,000
200,000
3,000
9.0 Gbps
1.6 Gbps
3.0 Gbps
3.0 Gbps
1.7 Gbps
2.4 Gbps
800 Mbps
4.5 Gbps
60,000/sec
562,500
375,000
4,000
12.0 Gbps
3.0 Gbps
4.5 Gbps
4.5 Gbps
3.0 Gbps
3.5 Gbps
1.3 Gbps
5.0 Gbps
90,000/sec
750,000
500,000
6,000
NSA 2600
250
10 (250)
2 (250)
NSA 2600
NSA 3600
Dimension
Weight
WEEE weight
Shipping weight
Major regulatory
Environment
Humidity
NSA 5600
NSA 3600
NSA 4600
NSA 5600
NSA 6600
6,000
2,000 (6,000)
2 (1500)
NSA 6600
Static (DHCP PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP Relay
1:1, many:1, 1:many, flexible NAT (overlapping IPS), PAT, transparent mode
256
256
256
400
500
BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast
Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p
XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix,
Common Access Card (CAC)
Full H323-v1-5, SIP
TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
ICSA Firewall, ICSA Anti-Virus, FIPS 140-2, Common Criteria NDPP (Firewall and IPS), UC APL
NSA 2600
NSA 3600
NSA 4600
200W
NSA 5600
NSA 6600
Single, Fixed 250W
Fans
Input power
Maximum power consumption (W)
MTBF @25ºC in hours
MTBF @25ºC in years
Form factor
NSA 4600
1,000
3,000
4,000
50 (1,000)
500 (3,000)
2,000 (4,000)
2 (350)
2 (500)
2 (1000)
DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B Cryptography
Diffie Hellman Groups 1, 2, 5, 14v
RIP, OSPF
Dual, Fixed
Dual, redundant,
hot swappable
100-240 VAC, 60-50 Hz
86.7
90.9
113.1
139,783
134,900
116,477
15.96
15.40
13.30
1U Rack Mountable
1.75 x 10.25 x 17 in
1.75 x 19.1 x 17 in
(4.5 x 26 x 43 cm)
(4.5 x 48.5 x 43 cm)
10.1 lb (4.6 kg)
13.56 lb (6.15 Kg)
14.93 lb (6.77 Kg)
11.0 lb (5.0 kg)
14.24 lb (6.46 Kg)
19.78 lb (8.97 Kg)
14.3 lb (6.5 kg)
20.79lb (9.43 Kg)
26.12 lb (11.85 Kg)
FCC Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB,
Mexico CoC by UL, WEEE , REACH, ANATEL, BSMI, CU
32-105 F, 0-40 deg C
49.4
176,540
20.15
74.3
146,789
16.76
10-90% non-condensing
Testing Methodologies: Maximum performance based on RFC 2544 (for firewall). Actual performance may vary depending on network conditions and activated services.
Full DPI/GatewayAV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools. Testing done with multiple flows through
multiple port pairs.
3
VPN throughput measured using UDP traffic at 1280 byte packet size adhering to RFC 2544. All specifications, features and availability are subject to change.
**Future use. All specifications, features and availability are subject to change.
1
2
12
NSA series ordering information
Product
NSA 2600 TotalSecure (1-year)
SKU
01-SSC-3863
NSA 3600 TotalSecure (1-year)
01-SSC-3853
NSA 4600 TotalSecure (1-year)
01-SSC-3843
NSA 5600 TotalSecure (1-year)
01-SSC-3833
NSA 6600 TotalSecure (1-year)
NSA 2600 security and support subscriptions
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 2600 (1-year)
01-SSC-3823
SKU
01-SSC-1470
Capture Advanced Threat Protection for NSA 2600 (1-year)
01-SSC-1475
Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 2600 (1-year)
01-SSC-4459
Silver 24x7 Support for NSA 2600 (1-year)
01-SSC-4314
Content Filtering Premium Business Edition for NSA 2600 (1-year)
01-SSC-4465
Enforced Client Anti-Virus & Anti-Spyware — Kaspersky
Based on user count
Comprehensive Anti-Spam Service for NSA 2600 (1-year)
01-SSC-4471
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 3600 (1-year)
01-SSC-1480
NSA 3600 security and support subscriptions
SKU
Capture Advanced Threat Protection for NSA 3600 (1-year)
01-SSC-1485
Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 3600 (1-year)
01-SSC-4435
Silver 24x7 Support for NSA 3600 (1-year)
01-SSC-4302
Content Filtering Premium Business Edition for NSA 3600 (1-year)
01-SSC-4441
Enforced Client Anti-Virus & Anti-Spyware — Kaspersky
Based on user count
Comprehensive Anti-Spam Service for NSA 3600 (1-year)
01-SSC-4447
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 4600 (1-year)
01-SSC-1490
NSA 4600 security and support subscriptions
SKU
Capture Advanced Threat Protection for NSA 4600 (1-year)
01-SSC-1495
Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 4600 (1-year)
01-SSC-4411
Silver 24x7 Support for NSA 4600 (1-year)
01-SSC-4290
Content Filtering Premium Business Edition for NSA 4600 (1-year)
01-SSC-4417
Enforced Client Anti-Virus & Anti-Spyware — Kaspersky
Based on user count
Comprehensive Anti-Spam Service for NSA 4600 (1-year)
01-SSC-4423
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 5600 (1-year)
01-SSC-1550
NSA 5600 security and support subscriptions
SKU
Capture Advanced Threat Protection for NSA 5600 (1-year)
01-SSC-1555
Threat Prevention – Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 5600 (1-year)
01-SSC-4240
Gold 24x7 Support for NSA 5600 (1-year)
01-SSC-4284
Content Filtering Premium Business Edition for NSA 5600 (1-year)
01-SSC-4246
Enforced Client Anti-Virus & Anti-Spyware — Kaspersky
Based on user count
Comprehensive Anti-Spam Service for NSA 5600 (1-year)
01-SSC-4252
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 6600 (1-year)
01-SSC-1560
NSA 6600 security and support subscriptions
SKU
Capture Advanced Threat Protection for NSA 6600 (1-year)
01-SSC-1565
Threat Prevention–Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 6600 (1-year)
01-SSC-4216
Gold 24x7 Support for NSA 6600 (1-year)
01-SSC-4278
Content Filtering Premium Business Edition for NSA 6600 (1-year)
01-SSC-4222
Enforced Client Anti-Virus & Anti-Spyware — Kaspersky
Based on user count
Comprehensive Anti-Spam Service for NSA 6600 (1-year)
01-SSC-4228
10GBASE-SR SFP+ Short Reach Module
01-SSC-9785
10GBASE-LR SFP+ Long Reach Module
01-SSC-9786
Modules and accessories*
SKU
10GBASE SFP+ 1M Twinax Cable
01-SSC-9787
10GBASE SFP+ 3M Twinax Cable
01-SSC-9788
1000BASE-SX SFP Short Haul Module
01-SSC-9789
1000BASE-LX SFP Long Haul Module
01-SSC-9790
1000BASE-T SFP Copper Module
Management and reporting
01-SSC-9791
SKU
SonicWall GMS 10 Node Software License
01-SSC-3363
SonicWall GMS E-Class 24x7 Software Support for 10 node (1-year)
01-SSC-6514
*Please consult with your local SonicWall reseller for a complete list of supported SFP and SFP+ modules
13
Regulatory model numbers:
NSA 2600–1RK29-0A9
NSA 3600–1RK26-0A2
NSA 4600–1RK26-0A3
NSA 5600–1RK26-0A4
NSA 6600–1RK27-0A5
About Us
Over a 25 year history, SonicWall has been the industry’s trusted security partner. From network security to access security to email
security, SonicWall has continuously evolved its product portfolio, enabling organizations to innovate, accelerate and grow. With
over a million security devices in almost 200 countries and territories worldwide, SonicWall enables its customers to confidently
say yes to the future.
SonicWall, Inc.
5455 Great America Parkway | Santa Clara, CA 95054
Refer to our website for additional information.
www.sonicwall.com
© 2017 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a
trademark or registered trademark of SonicWall Inc. and/or its affiliates
in the U.S.A. and/or other countries. All other trademarks
and registered trademarks are property of their respective owners.
Datasheet-NetworkSecurityAppliance-US-VG-27280