You are on page 1of 11

SonicWall Network Security

virtual (NSv) firewall series


Next-gen security for public, private or hybrid cloud environments

The design, implementation and services and operations. NSv next-


deployment of modern network generation virtual firewalls integrate
architectures, such as virtualization and two advanced security technologies to
cloud, continue to be a game-changing deliver cutting-edge threat prevention
strategy for many organizations. that keeps your network one step ahead.
Virtualizing the data center, migrating SonicWall’s patent-pending Real-Time
to the cloud, or a combination of both, Deep Memory Inspection (RTDMI™) Benefits
demonstrates significant operational technology enhances our award-winning Public and private cloud security
and economic advantages. However, multi-engine Capture Advanced Threat
• Next-gen firewall with automated
vulnerabilities within virtual environments Protection (ATP) sandboxing service.
real-time breach detection and
are well-documented. New vulnerabilities The RTDMI engine proactively detects prevention capabilities
are discovered regularly that yield serious and blocks mass market, zero-day threats
security implications and challenges. and unknown malware by inspecting • Patent-pending Real-Time
To ensure applications and services directly in memory. Because of the Deep Memory Inspection
are delivered safely, efficiently and in a real-time architecture, SonicWall RTDMI (RTDMI) technology
scalable manner, while still combating technology is precise, minimizes false • Patented Reassembly-
threats harmful to all parts of the virtual positives, and identifies and mitigates Free Deep Packet Inspection
framework including virtual machines sophisticated attacks where the (RFDPI) technology
(VMs), application workloads and data malware’s weaponry is exposed for less
must be among the top priorities. than 100 nanoseconds. In combination, • Complete end-to-end visibility
and control
SonicWall’s patented* single-pass
The SonicWall Network Security virtual Reassembly-Free Deep Packet Inspection • Application intelligence and control
(NSv) firewall series helps security teams (RFDPI®) engine examines every byte of
reduce these types of security risks and every packet, inspecting both inbound • Segmentation security and
vulnerabilities, which can cause serious and outbound traffic on the firewall. security zoning
disruption to your business-critical • Support across private cloud (ESXi,
Hyper-V) and public cloud (AWS,
Azure) platforms

• BYOL and PAYG licensing

Virtual machine protection


• Zero-day threat protection with
Capture ATP

• Data confidentiality

• Secure communication with data


leakage prevention

• Traffic validation, inspection


and monitoring

• System safety and integrity


IaaS SaaS
• Virtual network resilience
and availability
*U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361; 7,991,723
Flexible Deployment Use Cases
Streaming Data
Classified Malware With infrastructure support for high
PDF RANSOMWARE
Locky
availability implementation, NSv fulfills
Email
RANSOMWARE BLOCK
scalability and availability requirements of
Data File
Software Defined Data Centers. It ensures
WannaCry
1 0 1 0 0 1 0 0 1 0 10 Artifact 1
TROJAN
0 1 0 1 0 0 1 0 1 1 01
Artifact 2 MACHINE Spartan system resiliency, service reliability, and
LEARNING
0 1 0 0 1 0 1 0 0 1 00
1 0 1 0 0 1 0 1 0 0 10
1 1 0 1 0 1 0 1 0 0 10 Artifact 3
UNKNOWN
regulatory conformance. Optimized for
Deep Learning
0 1 0 1 0 0 1 0 0 0 10
1 0 1 1 0 0 1 0 0 1 01 Artifact 4 Algorithms CLOUD CAPTURE broad range of public, private and hybrid
SANDBOX
deployment use cases, NSv can adapt to
Endpoint
A Hypervisor
service-level changes and ensure VMs
A B C D B Emulation
and their application workloads and data
C Virtualization
D RTDMI
assets are available, as well as secure. It
can do it all at multi-Gbps speed with
Bad BLOCK Good
until
VERDICT
SENT low latency.

Organizations gain all the security


advantages of a physical firewall, with
the operational and economic benefits
The NSv series delivers the automated Segmentation Security of virtualization. This includes system
real-time breach detection and prevention
For optimal effectiveness against scalability, operation agility, provisioning
organizations need by utilizing innovative
Advanced Persistent Threats (APTs), speed, simple management and
deep learning technologies in the
network security segmentation must cost reduction.
SonicWall Capture Cloud Platform.
apply an integrated set of dynamic,
This platform delivers cloud-based threat The NSv series is available in multiple virtual
enforceable barriers to advanced threats.
prevention and network management flavors carefully packaged for a broad
With segment-based security capabilities,
plus reporting and analytics for range of virtualized and cloud deployment
NSv can group similar interfaces and
organizations of any size. This platform use cases. Delivering multi-gigabit threat
apply the same policies to them, instead
consolidates threat intelligence gathered prevention and encrypted traffic inspection
of having to write the same policy for each
from multiple sources including our performance, the NSv series adapts to
interface. By applying security policies to
Capture ATP, as well as more than capacity-level increases and ensures VN
the inside of the VN, segmentation can be
1 million SonicWall sensors located and VPC safety. The series also ensures
configured to organize network resources
around the globe. By leveraging the application workloads and data assets are
into different segments, and allow or
SonicWall Capture Cloud Platform in available as well as secure.
restrict traffic between those segments.
addition to capabilities including intrusion
This way, access to critical internal
prevention, anti-malware and web/URL Govern Centrally
resources can be strictly controlled.
filtering, the NSv series blocks even the
stealthiest threats at the gateway. NSv deployments can be centrally
NSv automatically enforces segmentation managed either on premises with
restrictions based upon dynamic criteria, SonicWall Global Management System
NSv is easily deployed and provisioned in
such as user identity credentials, geo- (GMS²), or with Capture Security Center²,
a virtual environment, typically between
IP location and the security stature of SonicWall’s open, scalable cloud security
virtual networks (VNs) or virtual private
mobile endpoints. For extended security, management, monitoring, reporting and
clouds (VPCs). This allows it to capture
NSv is also capable of integrating analytics platform delivered as a cost-
communications and data exchanges
multi-gigabit network switching into its effective as-a-service offering.
between virtual machines for automated
security segment policy and enforcement.
breach prevention, while establishing
It directs segment policy to traffic at Capture Security Center gives the
stringent access control measures for
switching points throughout the network, ultimate in visibility, agility and capacity
data confidentiality and VM safety and
and globally manages segment security to govern the entire SonicWall virtual and
integrity. Security threats (such as cross-
enforcement from a single pane of glass. physical firewall ecosystem with greater
virtual-machine or side-channel attacks,
common network-based intrusions, and clarity, precision, and speed – all from a
Since segments are only as effective as single pane of glass.
application and protocol vulnerabilities) the security that can be enforced between
are neutralized successfully through them, NSv applies intrusion prevention
SonicWall’s comprehensive suite of
Unified Policy with SonicOSX 7.0
system (IPS) to scan incoming and
security inspection services1. All VM outgoing traffic on the VLAN segment SonicWall SonicOSX 7.0 and upwards
traffic is subjected to multiple threat to enhance security for internal network features Unified Policy that offers
analysis engines, including intrusion traffic. For each segment, it enforces a integrated management of various
prevention, gateway anti-virus and full range of security services on multiple security policies across SonicWall on-
anti-spyware, cloud anti-virus, botnet interfaces based on enforceable policy. prem and virtual firewalls, starting with
filtering, application control and Capture the NSv series.
ATP multi-engine sandboxing with
RTDMI technology.

2
GOVERN CENTRALLY COMPLIANCE RISK MANAGEMENT
• Establish an easy path to comprehensive • Make regulatory bodies and auditors • Move fast and drive collaboration,
security management, analytic reporting happy with automatic PCI, HIPAA and communication and knowledge across
and compliance to unify your network SOX security reports the shared security framework
security defense program
• Customize any combination of security • Make informed security policy decisions
• Automate and correlate workflows auditable data to help you move towards based on time-critical and consolidated
to form a fully coordinated security specific compliance regulations threat information for higher level of
governance, compliance and risk security efficiency
management strategy

GMS provides a holistic approach to security governance, compliance and risk management

It comes with a new web interface that Features into multiple security zones, with
supports a radically different approach – intrusion prevention service keeping
the emphasis is on user-first design. SonicOS Platform threats from propagating across the zone
The SonicOS architecture is at the core boundaries. Creating and applying access
It leads to an intuitive set up of contextual of every SonicWall physical and virtual rules and NAT policies to traffic passing
security policies through actionable alerts, firewall including the NSv and NSa Series, through the various interfaces, it can
and with point-and-click simplicity. SuperMassive Series and TZ Series. allow or deny internal or external network
Refer to the SonicWall SonicOS Platform access based on various criteria.
Visually, it is also more attractive than the datasheet for the complete list of features
classic interface. In a single-pane view of and capabilities. Application intelligence and control1
a firewall, the interface presents the user NSv provides granular control over
with information on the effectiveness of Automated breach prevention1 network traffic at the user, email
various security rules. NSv delivers complete advanced threat address, schedule, and IP-subnet
protection, including high-performance levels, with application-specific policies.
It enables the user to modify the intrusion and malware prevention, and It controls custom applications by
predefined rules for gateway antivirus, cloud-based sandboxing with SonicWall’s creating signatures based on specific
antispyware, content filtering, intrusion RTDMI technology. parameters or patterns unique to an
prevention, geo-IP filtering, and deep- application. Internal or external network
packet inspection of encrypted traffic in a Around-the-clock security1 access is allowed or denied based on
seamless fashion. NSv ensures lateral movement various criteria.
protection, plus inbound and outbound
With the Unified Policy, SonicWall traffic protection. New threat updates Data leakage prevention
delivers a more streamlined experience are automatically pushed to firewalls NSv provides the ability to scan streams
that reduces configuration errors and with active security services, and take of data for keywords. This restricts the
deployment time for a better overall effect immediately without reboots or transfer of certain file names, file types,
security posture. interruptions. email attachments, attachment types,
email with certain subjects, and email or
Flexible Licensing Zero-day protection1 attachments with certain keywords or
NSv supports Bring Your Own License NSv protects against zero-day attacks byte patterns.
(BYOL) and Pay As You Go (PAYG) with constant updates against the latest
licensing. The BYOL license for NSv can exploit methods and techniques that Application layer bandwidth
be purchased directly from SonicWall, cover thousands of individual exploits. management
a partner or reseller. Whereas, PAYG NSv can select among various bandwidth
license is purchased directly from the Threat API management settings to reduce network
AWS Marketplace. This type of license is NSv receives and leverages any and bandwidth usage by an application using
a usage-based license wherein payment all proprietary, original equipment packet monitor. This provides further
is made as per usage on an hourly or manufacturer and third-party intelligence control over the network.
annual basis. feeds to combat advanced threats,
such as zero-day, malicious insider, Secure communication
compromised credentials, ransomware NSv ensures the data exchange
and advanced persistent threats. between groups of virtual machines
is done securely, including isolation,
Zone protection confidentiality, integrity, and information
NSv strengthens internal security by flow control within these networks via the
enabling segmentation of the network use of segmentation.

¹ Requires SonicWall Advanced Gateway Security Services (AGSS) subscription.


² SonicWall Global Management System and Capture Security Center require separate licensing or subscription.

3
Access control Traffic validation, inspection and perpetual licensing are available as Bring
NSv validates that only VMs that satisfy a monitoring mechanisms Your Own License (BYOL) model.
given set of conditions are able to access NSv detects irregularities and malicious SonicWall non-perpetual or subscription
data belonging to another through the behaviors to stop attacks targeting licensing model provides flexibility and
use of VLANs. VM workloads. simplicity, as a single SKU bundles
firewall software and security services.
User authentication Deployment options This is available across both private
NSv creates policies to control or NSv can be deployed on a wide variety of cloud (ESXi and Hyper-V) and public
restrict VM and workload access by virtualized and cloud platforms for various cloud (AWS, Azure) offerings. Service
unauthorized users. private/public cloud security use cases. expiration notifications are sent before
service expires.
Data confidentiality Flexible Licensing Models
NSv blocks information theft and SonicWall offers perpetual and non- Non-perpetual licensing model is available
illegitimate access to protected data perpetual licensing models. Perpetual in three flavors – IPS/App Control
and services. licensing is a traditional operating model Subscription, TotalSecure Subscription
where the firewall and security service and TotalSecure Advanced Subscription,
Virtual network resilience and licenses must be purchased separately. over a one year period. Based on the
availability Hence, these licenses expire separately. offering tiers, NSv software is bundled
NSv prevents disruption or degradation of Non-perpetual licensing is a unique in a combination of Intrusion Prevention
application services and communications. offering wherein the firewall and security System (IPS), application control,
service licenses are bundled together and support, Capture Security Center (CSC),
System safety and integrity expire at the same time. For public cloud Comprehensive Gateway Security Suite
NSv stops unauthorized takeover of VM deployments, both perpetual and non- (CGSS) or Advanced Gateway Security
systems and services.
Suite (AGSS).

4
NSv Series system specifications
FIREWALL GENERAL NSv 10 NSv 25 NSv 50 NSv 100
Operating system SonicOS1
VMware ESXi v5.5 / v6.0 / v6.5 / v6.7, Microsoft Hyper-V Win 2012 / 2016,
Supported Hypervisors KVM Ubuntu 16.04 / CentOS 7, Nutanix AHV (AOS 5.15 LTS/Prism Central 5.16.1.2)9
Supported Public Cloud Platforms (Instance Type) AWS (c5.large), Azure (Std D2 v2)
Licensing BYOL, PAYG2
Max Supported vCPUs 2 2 2 2
Interface Count (ESXi/Hyper-V/KVM) 8/8/8 8/8/8 8/8/8 8/8/8
Max Mgmt/DataPlane Cores 1/1 1/1 1/1 1/1
Min Memory3 4 GB 4 GB 4 GB 4 GB
Max Memory4 6 GB 6 GB 6 GB 6 GB
Supported IP/Nodes 10 25 50 100
Minimum Storage 60 GB
SSO users 25 50 100 100
Logging Analyzer, Local Log, Syslog
High availability Active/Passive
FIREWALL/VPN PERFORMANCE6 NSv 10 NSv 25 NSv 50 NSv 100
Firewall Inspection Throughput 2 Gbps 2.5 Gbps 3 Gbps 3.5 Gbps
Full DPI Throughput (GAV/GAS/IPS) 450 Mbps 550 Mbps 650 Mbps 750 Mbps
Application Inspection Throughput 1 Gbps 1.25 Gbps 1.5 Gbps 1.75 Gbps
IPS Throughput 1 Gbps 1.25 Gbps 1.5 Gbps 1.75 Gbps
Anti-Malware Inspection Throughput 450 Mbps 550 Mbps 650 Mbps 750 Mbps
IMIX Throughput 750 Mbps 850 Mbps 950 Mbps 1100 Mbps
TLS/SSL DPI Throughput 650 Mbps 750 Mbps 850 Mbps 950 Mbps
VPN Throughput 500 Mbps 550 Mbps 600 Mbps 650 Mbps
Connections per second 1,800 5,000 8,000 10,000
Maximum connections (SPI) 2,500 6,250 12,500 25,000
Maximum connections (DPI) 2,500 6,250 12,500 25,000
TLS/SSL DPI Connections 500 1,000 2,000 4,000
VPN NSv 10 NSv 25 NSv 50 NSv 100
Site-to-Site VPN Tunnels 10 10 25 50
IPSec VPN clients 10(10) 10(10) 10(25) 10(25)
SSL VPN Clients Included7 2 2 2 2
SSL VPN Clients Maximum7 50 50 50 50
Encryption/authentication DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC)
Key exchange Diffie Hellman Groups 1, 2, 5, 14v
Route-based VPN RIP, OSPF, BGP
NETWORKING NSv 10 NSv 25 NSv 50 NSv 100
IP address assignment Static, DHCP, internal DHCP server10, DHCP relay10
NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT
Max VLAN 25 25 50 50
Routing protocols BGP, OSPF, RIPv1/v2, static routes, policy-based routing
QoS Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p
Authentication XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix
VoIP SIP
Standards TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, L2TP, PPTP, RADIUS
Max SD-WAN groups 12 12 18 32
Max SD-WAN members per product 24 24 36 64

5
NSv Series system specifications con't
FIREWALL GENERAL NSv 200 NSv 300 NSv 400 NSv 800 NSv 1600
Operating system SonicOS1
VMware ESXi v5.5 / v6.0 / v6.5 / v6.7, Microsoft Hyper-V, KVM Ubuntu 16.04 / CentOS 7,
Supported Hypervisors
Nutanix AHV (AOS 5.15 LTS/Prism Central 5.16.1.2)9

Supported Public Cloud Platforms AWS (c5.large), AWS (c5.xlarge), AWS (c5.2xlarge), AWS (c5.4xlarge),
N/A
(Instance Type) Azure (Std D2 v2) Azure (Std D3 v2) Azure (Std D4 v2) Azure (Std D5 v2)

Licensing BYOL, PAYG2


Max Supported vCPUs 2 3 4 8 16
Interface Count (ESXi/Hyper-V/KVM/AWS/Azure) 8/8/8/2/2 8/8/8/-/- 8/8/8/4/4 8/8/8/8/8 8/8/8/8/8
Max Mgmt/DataPlane Cores 1/1 1/2 1/3 1/7 1/15
Min Memory3 6 GB 6 GB 8 GB 10 GB 12 GB
Max Memory4 6 GB 8 GB 10 GB 14 GB 18 GB
Supported IP/Nodes Unlimited Unlimited Unlimited Unlimited Unlimited
Minimum Storage 60 GB
SSO users 500 5,000 10,000 15,000 20,000
Logging Analyzer, Local Log, Syslog
High availability Active/Passive5
FIREWALL/VPN PERFORMANCE6 NSv 200 NSv 300 NSv 400 NSv 800 NSv 1600
Firewall Inspection Throughput 4.1 Gbps 5.9 Gbps 7.8 Gbps 13.9 Gbps 17.2 GBPS
Full DPI Throughput (GAV/GAS/IPS) 900 Mbps 1.6 Gbps 2.2 Gbps 4.0 Gbps 6.4 Gbps
Application Inspection Throughput 2.3 Gbps 3.4 Gbps 4.1 Gbps 5.5 Gbps 6.4 Gbps
IPS Throughput 2.3 Gbps 3.4 Gbps 4.1 Gbps 5.5 Gbps 6.7 GBPS
Anti-Malware Inspection Throughput 900 Mbps 1.6 Gbps 2.2 Gbps 4.0 Gbps 6.6 Gbps
IMIX Throughput 1.5 Gbps 2.3 Gbps 2.8 Gbps 4.2 Gbps 5.3 Gbps
TLS/SSL DPI Throughput 1.1 Gbps 1.2 Gbps 1.8 Gbps 3.4 Gbps 5.1 GBPS
VPN Throughput 750 Mbps 1.4 Gbps 1.9 Gbps 4.2 Gbps 8.4 Gbps
Connections per second 13,760 24,360 37,270 75,640 125,000
Maximum connections (SPI) 225,000 1M 1.5M 3M 4M
Maximum connections (DPI) 125,000 500,000 1.5M 2M 2.5M
TLS/SSL DPI Connections 8,000 12,000 20,000 30,000 50,000
VPN NSv 200 NSv 300 NSv 400 NSv 800 NSv 1600
Site-to-Site VPN Tunnels 75 100 6000 10,000 25,000
IPSec VPN clients (Maximum) 50(1000) 50(1000) 2000(4000) 2000(6000) 2000(10,000)
SSL VPN Clients Included7 2 2 2 2 2
SSL VPN Clients Maximum7 100 150 200 300 400
Encryption/authentication DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC)
Key exchange Diffie Hellman Groups 1, 2, 5, 14v
Route-based VPN RIP, OSPF, BGP
NETWORKING NSv 200 NSv 300 NSv 400 NSv 800 NSv 1600
IP address assignment Static, DHCP, internal DHCP server10, DHCP relay10
NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT
Max VLAN8 128 128 128 128 128
Routing protocols BGP, OSPF, RIPv1/v2, static routes, policy-based routing
QoS Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p
Authentication XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix
VoIP SIP
Standards TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, L2TP, PPTP, RADIUS
Max SD-WAN groups 38 38 70 102 102
Max SD-WAN members per product 76 76 140 204 204

1
Currently supporting SonicOS 6.5.x.
2PAYG is currently available only on AWS.
3
Memory with Jumbo frame disabled.
4
Memory with Jumbo frame enabled. Additional memory is required for Jumbo frames. Jumbo frames are not supported on Azure and AWS.
5
High availability available on VMware ESXi platform, Azure and Microsoft Hyper-V, while HA is not supported on AWS. Available on Azure from SonicOS 6.5.4.4-44v-21-987 firmware and onwards.
6
Published performance numbers are up to the specification and the actual performance may vary depending on underlying hardware, network conditions; firewall configuration and activated services. Performance and capacities may also
vary based on underlying virtualization infrastructure, and we recommend additional testing within your environment to ensure your performance and capacity requirements are met. Performance metrics were observed using Intel Xeon W
Processor (W-2195 2.3GHz, 4.3GHz Turbo, 24.75M Cache) running SonicOSv 6.5.0.2 with VMware vSphere 6.5.
7
Increased SSL VPN number will be available only from SonicOS 6.5.4.4-44v-21-723 firmware and onwards.
8
VLAN interfaces are not supported on Azure and AWS.
Testing Methodologies: Maximum performance based on RFC 2544 (for firewall). Full DPI/Gateway AV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools.
Testing done with multiple flows through multiple port pairs. VPN throughput measured using UDP traffic at 1418 byte packet size adhering to RFC 2544. All specifications and features are subject to change.
9
Certified on SonicOS 6.5.4.4-44v-21-757 firmware
10
Supported on Private Cloud and not on Public Cloud Platforms
Features
RFDPI ENGINE
Feature Description
Reassembly-Free Deep Packet This high-performance, proprietary and patented inspection engine performs stream-based, bi-directional
Inspection (RFDPI) traffic analysis, without proxying or buffering, to uncover intrusion attempts and malware and to identify
application traffic regardless of port.
Bi-directional inspection Scans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not
used to distribute malware and does not become a launch platform for attacks in case an infected machine is
brought inside.
Stream-based inspection Proxy-less and non-buffering inspection technology provides ultra-low latency performance for DPI of
millions of simultaneous network streams without introducing file and stream size limitations, and can be
applied on common protocols as well as raw TCP streams.
Highly parallel and scalable The unique design of the RFDPI engine works with the multi-core architecture to provide high DPI throughput
and extremely high new session establishment rates to deal with traffic spikes in demanding networks.
Single-pass inspection A single-pass DPI architecture simultaneously scans for malware, intrusions and application identification,
drastically reducing DPI latency and ensuring that all threat information is correlated in a single architecture.
FIREWALL AND NETWORKING
Feature Description
REST APIs Allows the firewall to receive and leverage any and all proprietary, original equipment manufacturer and
third-party intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised
credentials, ransomware and advanced persistent threats.
Stateful packet inspection All network traffic is inspected, analyzed and brought into compliance with firewall access policies.
High availability1 The NSv series supports Active/Passive (A/P) with state synchronization.
DDoS/DoS attack protection SYN flood protection provides a defense against DoS attacks using both Layer 3 SYN proxy and Layer 2 SYN
blacklisting technologies. Additionally, it protects against DoS/DDoS through UDP/ICMP flood protection and
connection rate limiting.
IPv6 support Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With SonicOS, the hardware will
support filtering and wire mode implementations.
Flexible deployment options The NSv series can be deployed in traditional NAT, Layer 2 bridge, wire and network tap modes.
WAN load balancing Load-balances multiple WAN interfaces using Round Robin, Spillover or Percentage methods.
Advanced quality of service (QoS) Guarantees critical communications with 802.1p, DSCP tagging, and remapping of VoIP traffic on the network.
SIP proxy support Blocks spam calls by requiring that all incoming calls are authorized and authenticated by SIP proxy.
Biometric authentication Supports mobile device authentication such as fingerprint recognition that cannot be easily duplicated or
shared to securely authenticate the user identity for network access.
Open authentication and social login Enable guest users to use their credentials from social networking services such as Facebook, Twitter, or
Google+ to sign in and access the Internet and other guest services through a host's wireless, LAN or DMZ
zones using pass-through authentication.
MANAGEMENT AND REPORTING
Feature Description
Cloud-based and on-premises Configuration and management of SonicWall appliances is available via the cloud through the SonicWall
management Capture Security Center and on-premises using SonicWall Global Management System (GMS).
Powerful single device management An intuitive web-based interface allows quick and convenient configuration, in addition to a comprehensive
command-line interface and support for SNMPv2/3.
IPFIX/NetFlow application flow Exports application traffic analytics and usage data through IPFIX or NetFlow protocols for real-time and
reporting historical monitoring and reporting with tools such as SonicWall Scrutinizer or other tools that support IPFIX
and NetFlow with extensions.
VIRTUAL PRIVATE NETWORKING (VPN)
Feature Description
Auto-provision VPN Simplifies and reduces complex distributed firewall deployment down to a trivial effort by automating the
initial site-to-site VPN gateway provisioning between SonicWall firewalls while security and connectivity
occurs instantly and automatically.
IPSec VPN for site-to-site High-performance IPSec VPN allows the NSv series to act as a VPN concentrator for thousands of other large
connectivity sites, branch offices or home offices.
SSL VPN or IPSec client Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files,
remote access computers, intranet sites and applications from a variety of platforms.
1High availability is currently not supported on AWS

7
Redundant VPN gateway When using multiple WANs, a primary and secondary VPN can be configured to allow seamless, automatic
failover and failback of all VPN sessions.
Route-based VPN The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary
VPN tunnel failure, by seamlessly re-routing traffic between endpoints through alternate routes.
CONTENT/CONTEXT AWARENESS
Feature Description
User activity tracking User identification and activity are made available through seamless AD/LDAP/Citrix1/Terminal Services1
SSO integration
combined with extensive information obtained through DPI.
GeoIP country traffic identification Identifies and controls network traffic going to or coming from specific countries to either protect against
attacks from known or suspected origins of threat activity, or to investigate suspicious traffic originating from
the network. Ability to create custom country and Botnet lists to override an incorrect country or Botnet tag
associated with an IP address. Eliminates unwanted filtering of IP addresses due to misclassification.
Regular expression DPI filtering Prevents data leakage by identifying and controlling content crossing the network through regular expression
matching. Provides the ability to create custom country and Botnet lists to override an incorrect country or
Botnet tag associated with an IP address.

Breach prevention subscription services

CAPTURE ADVANCED THREAT PROTECTION


Feature Description
Multi-engine sandboxing The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation,
and hypervisor level analysis technology, executes suspicious code and analyzes behavior, providing
comprehensive visibility to malicious activity.
Real-Time Deep Memory Inspection This patent-pending cloud-based technology detects and blocks malware that does not exhibit any malicious
(RTDMI) behavior and hides its weaponry via encryption. By forcing malware to reveal its weaponry into memory, the
RTDMI engine proactively detects and blocks mass-market, zero-day threats and unknown malware.
Block until verdict To prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held
at the gateway until a verdict is determined.
Broad file type and size analysis Supports analysis of a broad range of file types, either individually or as a group, including executable
programs (PE), DLL, PDFs, MS Office documents, archives, JAR, and APK plus multiple operating systems
including Windows, Android, Mac OS X and multi-browser environments.
Rapid deployment of signatures When a file is identified as malicious, a signature is immediately deployed to firewalls with SonicWall Capture
ATP subscriptions and Gateway Anti-Virus and IPS signature databases and the URL, IP and domain
reputation databases within 48 hours.
Capture Client Capture Client is a unified client platform that delivers multiple endpoint protection capabilities, including
advanced malware protection and support for visibility into encrypted traffic. It leverages layered protection
technologies, comprehensive reporting and endpoint protection enforcement.
ENCRYPTED THREAT PREVENTION
Feature Description
TLS/SSL decryption and inspection Decrypts and inspects TLS/SSL encrypted traffic on the fly, without proxying, for malware, intrusions and
data leakage, and applies application, URL and content control policies in order to protect against threats
hidden in encrypted traffic. Included with security subscriptions for all NSv series models.

SSH inspection Deep packet inspection of SSH (DPI-SSH) decrypts and inspect data traversing over SSH tunnel to prevent attacks
that leverage SSH.
INTRUSION PREVENTION
Feature Description
Countermeasure-based protection Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan
packet payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.
Automatic signature updates The SonicWall Threat Research Team continuously researches and deploys updates to an extensive list of IPS
countermeasures that covers more than 50 attack categories. The new updates take immediate effect without any
reboot or service interruption required.
Intra-zone IPS protection Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention,
preventing threats from propagating across the zone boundaries.
Botnet command and control (CnC) Identifies and blocks command and control traffic originating from bots on the local network to IPs and
detection and blocking domains that are identified as propagating malware or are known CnC points.
Protocol abuse/anomaly Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.

8
Zero-day protection Protects the network against zero-day attacks with constant updates against the latest exploit methods and
techniques that cover thousands of individual exploits.
Anti-evasion technology Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network
undetected by utilizing evasion techniques in Layers 2-7.
THREAT PREVENTION
Feature Description
Gateway anti-malware The RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and
other malware in files of unlimited length and size across all ports and TCP streams.

Capture Cloud malware protection A continuously updated database of tens of millions of threat signatures resides in the SonicWall cloud servers
and is referenced to augment the capabilities of the onboard signature database, providing RFDPI with
extensive coverage of threats.

Around-the-clock security updates New threat updates are automatically pushed to firewalls in the field with active security services, and take
effect immediately without reboots or interruptions.

Bi-directional raw TCP inspection The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks
that they to sneak by outdated security systems that focus on securing a few well-known ports.

Extensive protocol support Identifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw
TCP, and decodes payloads for malware inspection, even if they do not run on standard, well-known ports.

APPLICATION INTELLIGENCE AND CONTROL


Feature Description
Application control Control applications, or individual application features, that are identified by the RFDPI engine against a
continuously expanding database of over thousands of application signatures, to increase network security
and enhance network productivity.
Custom application identification Control custom applications by creating signatures based on specific parameters or patterns unique to an
application in its network communications, in order to gain further control over the network.
Application bandwidth management Granularly allocate and regulate available bandwidth for critical applications or application categories while
inhibiting nonessential application traffic.
Granular control Control applications, or specific components of an application, based on schedules, user groups, exclusion lists
and a range of actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix integration.
CONTENT FILTERING
Feature Description
Inside/outside content filtering Enforce acceptable use policies and block access to HTTP/HTTPS websites containing information or
images that are objectionable or unproductive with Content Filtering Service and Content Filtering Client.
Enforced Content Filtering Client Extend policy enforcement to block internet content for Windows, Mac OS, Android and Chrome devices
located outside the firewall perimeter.
Granular controls Block content using the predefined categories or any combination of categories. Filtering can be scheduled
by time of day, such as during school or business hours, and applied to individual users or groups.
Web caching URL ratings are cached locally on the SonicWall firewall so that the response time for subsequent access to
frequently visited sites is only a fraction of a second.
ENFORCED ANTIVIRUS AND ANTI-SPYWARE
Feature Description
Multi-layered protection Utilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint
protection to block, viruses entering network through laptops, thumb drives and other unprotected
systems.
Automated enforcement option Ensure every computer accessing the network has the appropriate antivirus software and/or DPI-
SSL certificate installed and active, eliminating the costs commonly associated with desktop antivirus
management.
Automated deployment and Machine-by-machine deployment and installation of antivirus and anti-spyware clients is automatic across
installation option the network, minimizing administrative overhead.
Next-generation antivirus Capture Client uses a static artificial intelligence (AI) engine to determine threats before they can execute
and roll back to a previous uninfected state.
Spyware protection Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs
on desktops and laptops before they transmit confidential data, providing greater desktop security and
performance.

9
SonicOS feature summary

Global control over • Update H.323 libraries based on OSS • Support for local CRL
Noklava v10.5.0 ASN.1 compiler
• Centralized control of IPv6 visibility • Enhanced DPI-SSL certificate verification
• Task thread priority updates
• Globally disabling IPv6 traffic processing • Support for ECDSA-related ciphers
• SSLVPN and bookmark on Data Plane
• Disabling default VPN policies, • OpenSSL LTS release support for
configuration screens, and auto- Security services federal certification
generated rules
• Capture ATP block until verdict Logging, monitoring and reporting
Login and user security granular control
• Ability to verify that DPI was performed
• User lockout based on login attempts by • Capture ATP friendly filename display on a specific packet
IP address range for non-HTTP protocols
• Filename and URI logging for app control
• User lockout from CLI • CFS blocking of individual YouTube videos
• Logon records displayed for administrator
• Force password change on the first login • Support HTTPS content filtering and
DPI-SSL together • Configuration auditing
• Two-factor authentication (TOTP)
support • Next gen anti-virus (SentinelOne) and • Logging of NAT mapping for
DPI-SSL enforcement TCP connections
• Guest user policy zero-touch portal
support • Wan DDOS protection • FTP support for log automation
performance enhancement
• Guest service IPv6 support • Capture Security Center (CSC) reporting
Policies / objects & analytics support for NSv
• TACACS+ accounting support
• Access rule enhancements • Capture ATP logging of email
• Quota control for all users sender/recipient
• App based routing
• Dynamic botnet HTTP authentication • Capture threat assessment client
• Dynamic address objects enhancements (SWARM v3)
Networking and system
• CFS policy exclusion • Function to reset the SFR (SWARM)
• SD-WAN support
statistical data
• Policy based HTTPS content
• DNS security / DNS sinkhole support
filter objects • Option to select output language for
• FQDN over TCP DNS SonicFlow report
• URI list groups support in content
• FQDN address objects for NAT filter objects API
• DHCPv6 relay • CFS custom header insertion for • SonicOS API phase 1
HTTP requests
• IPv6 addressing mode for H.323 VoIP • SonicOS API authentication support
application layer gateway • UUID for rules and objects
• SonicOS API phase 2
• Multiple control plane (CP) core support • UUID for CFS policies
• LHM RESTful API
• HTTP/HTTPS redirection with data plane • Source MAC override for NAT policies
SonicOS web management UI
offload
DPI-SSL / DPI-SSH • SonicOS global search
• IP helper offload to data plane • DPI-SSL dynamic cloud based white list
• Usability improvements for content pages
• Firmware backup on local storage • DPI-SSH blocking of SSH
port forwarding • Per user client side UI
• High availability encryption preferences storage
• DPI-SSH blocking of X11 forwarding
• High availability firmware • Pin friendly name to SonicOS web
upload support • SSL decryption port preservation in management screens
packet mirror / packet capture
• Policy based routing optimization of static • Refactored SonicOS web interface layout
and dynamic routes • DPI-SSL granular control per zone
• Performance/throughput improvements • Access rules based DPI-SSL control
• Watchdog feature to monitor • DPI-SSL client block or allow expired
firewall health CA certificates
• Enhanced scalability for advanced routing • TLS certificate status request extension
over VPN numbered tunnel interfaces

10
NSv Series ordering information
PRODUCT ESXI SKU HYPER-V SKU AZURE SKU AWS SKU KVM SKU
SonicWall NSv 10 Virtual Appliance
01-SSC-5875 02-SSC-1387 02-SSC-3426 02-SSC-3452 02-SSC-3494
TotalSecure Advanced Edition (1-year)
SonicWall NSv 25 Virtual Appliance
01-SSC-5923 02-SSC-1395 02-SSC-3454 02-SSC-3464 02-SSC-3497
TotalSecure Advanced Edition (1-year)
SonicWall NSv 50 Virtual Appliance
01-SSC-5926 02-SSC-1399 02-SSC-3470 02-SSC-3474 02-SSC-3504
TotalSecure Advanced Edition (1-year)
SonicWall NSv 100 Virtual Appliance
01-SSC-5929 02-SSC-1405 02-SSC-3480 02-SSC-3489 02-SSC-3513
TotalSecure Advanced Edition (1-year)
SonicWall NSv 200 Virtual Appliance
01-SSC-5950 02-SSC-1412 02-SSC-0868 02-SSC-0906 02-SSC-3519
TotalSecure Advanced Edition (1-year)
SonicWall NSv 300 Virtual Appliance
01-SSC-5964 02-SSC-1420 — — 02-SSC-3526
TotalSecure Advanced Edition (1-year)
SonicWall NSv 400 Virtual Appliance
01-SSC-6084 02-SSC-1427 02-SSC-0888 02-SSC-0912 02-SSC-3531
TotalSecure Advanced Edition (1-year)
SonicWall NSv 800 Virtual Appliance
01-SSC-6101 02-SSC-1429 02-SSC-0889 02-SSC-0914 02-SSC-3533
TotalSecure Advanced Edition (1-year)
SonicWall NSv 1600 Virtual Appliance
01-SSC-6109 02-SSC-1436 02-SSC-0895 02-SSC-0921 02-SSC-3540
TotalSecure Advanced Edition (1-year)
PRODUCT ESXI SKU HYPER-V SKU AZURE SKU AWS SKU KVM SKU
SonicWall NSv 10 Virtual Appliance
01-SSC-5873 02-SSC-1386 02-SSC-3427 02-SSC-3453 02-SSC-3491
TotalSecure Advanced Edition (3-year)
SonicWall NSv 25 Virtual Appliance
01-SSC-5890 02-SSC-1397 02-SSC-3457 02-SSC-3465 02-SSC-3498
TotalSecure Advanced Edition (3-year)
SonicWall NSv 50 Virtual Appliance
01-SSC-5924 02-SSC-1398 02-SSC-3471 02-SSC-3472 02-SSC-3505
TotalSecure Advanced Edition (3-year)
SonicWall NSv 100 Virtual Appliance
01-SSC-5928 02-SSC-1404 02-SSC-3478 02-SSC-3486 02-SSC-3514
TotalSecure Advanced Edition (3-year)
SonicWall NSv 200 Virtual Appliance
01-SSC-5951 02-SSC-1411 02-SSC-0866 02-SSC-0903 02-SSC-3515
TotalSecure Advanced Edition (3-year)
SonicWall NSv 300 Virtual Appliance
01-SSC-5965 02-SSC-1419 — — 02-SSC-3523
TotalSecure Advanced Edition (3-year)
SonicWall NSv 400 Virtual Appliance
01-SSC-6089 02-SSC-1426 02-SSC-0887 02-SSC-0911 02-SSC-3527
TotalSecure Advanced Edition (3-year)
SonicWall NSv 800 Virtual Appliance
01-SSC-6102 02-SSC-1428 02-SSC-0891 02-SSC-0913 02-SSC-3538
TotalSecure Advanced Edition (3-year)
SonicWall NSv 1600 Virtual Appliance
01-SSC-6108 02-SSC-1435 02-SSC-0897 02-SSC-0920 02-SSC-3542
TotalSecure Advanced Edition (3-year)

*Please consult with your local SonicWall reseller for a complete list of SKUs

About SonicWall
SonicWall delivers Boundless Cybersecurity for the hyper-distributed era and a work reality where everyone is remote, mobile
and unsecure. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the
cybersecurity business gap for enterprises, governments and SMBs worldwide. For more information, visit www.sonicwall.com.

© 2021 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a


11 SonicWall, Inc. trademark or registered trademark of SonicWall Inc. and/or its affiliates
1033 McCarthy Boulevard | Milpitas, CA 95035 in the U.S.A. and/or other countries. All other trademarks and registered
Refer to our website for additional information. trademarks are property of their respective owners.
www.sonicwall.com Datasheet-NSvVirtualFirewalls-US-VG-3873

You might also like