Dell NSA 3600 User Manual

Page 1
SonicWall Network Security Appliance (NSA) Series
Industry-validated security effectiveness and performance for mid-sized networks
The SonicWall Network Security
Appliance (NSA) series provides mid-
sized networks, branch ofces and
distributed enterprises with advanced threat prevention in a high-performance security platform. Combining next-
generation rewall technology with
our patented* Reassembly-Free Deep Packet Inspection (RFDPI) engine on a multi-core architecture, the NSA series offers the security, performance and control organizations require.
Superior threat prevention and performance
NSA series next-generation rewalls
(NGFWs) integrate a series of advanced security technologies to deliver a superior level of threat prevention. Our patented single-pass RFDPI threat prevention engine examines every byte of every packet, inspecting
both inbound and outbound trafc
simultaneously. The NSA series leverages on-box capabilities including intrusion prevention, anti-malware
and web/URL ltering in addition to
cloud-based services such as CloudAV and SonicWall Capture multi-engine sandboxing to block zero-day threats at the gateway. Unlike other security
products that cannot inspect large les for hidden threats, NSA rewalls scan les of any size across all ports and
protocols. The security architecture in SonicWall NGFWs has been validated as one of the industry’s best for security effectiveness by NSS Labs which awarded SonicWall its “Recommended” rating for the fourth consecutive year.
Going beyond intrusion prevention,
anti-malware and web ltering,
SonicWall NGFWs provide a further level of protection by decrypting and inspecting SSL/TLS encrypted web
trafc for hidden threats in real time.
With the continued growth of encrypted
web trafc, organizations are effectively
blind to an estimated one-third of their
network trafc. This makes SSL/TLS
decryption and inspection a critical component of any security solution.
When organizations activate deep packet inspection functions such as intrusion prevention, anti-virus, anti­spyware, SSL decryption/inspection
and others on their rewalls network
performance often slows down, sometimes dramatically. NSA series
rewalls feature a multi-core hardware
architecture that utilizes specialized security microprocessors. Combined with our RFDPI engine, this unique design eliminates the performance degradation networks experience
with other rewalls.
In today’s security environment it’s not enough to rely on solely on outside parties for threat information. That’s why SonicWall formed its own in-house threat research team more than 15 years ago.
This dedicated team gathers, analyzes
and vets data from over one million sensors in its Global Response Intelligent Defense (GRID) network. SonicWall also participates in industry collaboration efforts and engages with threat research communities to gather and share samples of attacks and vulnerabilities.
Benets:
Superior threat prevention and performance
• Patented reassembly-free deep packet inspection technology
• On-box and cloud-based threat prevention
• SSL/TLS decryption and inspection
• Industry-validated security effectiveness
• Multi-core hardware architecture
• Dedicated in-house threat research team
Network control and exibility
• Powerful SonicOS operating system
• Application intelligence and control
• Network segmentation with VLANs
• Wireless network security
Easy deployment, setup and ongoing management
• Tightly integrated solution
• Centralized management
• Scalability through multiple hardware platforms
• Low total cost of ownership
*U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361; 7,991,723
Page 2
This shared threat intelligence is used
to develop real-time countermeasures that are automatically deployed to our
customers’ rewalls.
Network control and exibility
At the core of the NSA series is SonicOS, SonicWall’s feature-rich operating system. SonicOS provides organizations
with the network control and exibility
they require through application intelligence and control, real-time visualization, an intrusion prevention system (IPS) featuring sophisticated anti­evasion technology, high-speed virtual private networking (VPN) and other robust security features.
Using application intelligence and control, network administrators can identify and categorize productive applications from those that are unproductive or potentially dangerous,
and control that trafc through powerful
application-level policies on both a per­user and a per-group basis (along with schedules and exception lists). Business­critical applications can be prioritized and allocated more bandwidth while non-essential applications are bandwidth-limited. Real-time monitoring
and visualization provides a graphical representation of applications, users and bandwidth usage for granular insight
into trafc across the network.
For organizations that require advanced
exibility in their network design,
SonicOS offers the tools to securely segment the network through the use of virtual LANs (VLANs) which enable network administrators to create a virtual LAN interface that allows for network separation into one or more logical groups. Administrators create rules that determine the level of communication with devices on other VLANs.
Built into every NSA series rewall is a
wireless access controller that enables organizations to extend the network perimeter securely through the use of wireless technology. Together, SonicWall
rewalls and SonicPoint 802.11ac
wireless access points create a wireless network security solution that combines
industry-leading next-generation rewall
technology with high-speed wireless for enterprise-class network security and performance across the wireless network.
Easy deployment, setup and
ongoing management
Like all SonicWall rewalls, the NSA
series tightly integrates key security,
connectivity and exibility technologies
into a single, comprehensive solution.
This includes SonicPoint wireless
access points and the SonicWall WAN Acceleration Appliance (WXA) series, both of which are automatically detected and provisioned by the managing
NSA rewall. Consolidating multiple
capabilities eliminates the need to purchase and install point products that don’t always work well together. This reduces the effort it takes to deploy the
solution into the network and congure
it, saving both time and money.
Ongoing management and monitoring of network security are handled centrally
through the rewall or through the
SonicWall Global Management System (GMS), providing network administrators with a single pane of glass from which to manage all aspects of the network.
Together, the simplied deployment
and setup along with the ease of management enable organizations to lower their total cost of ownership and realize a high return on investment.
d
e
t
a
c
i
t
s
n
i
o
i
h
s
p
a
o
v
s
e
-
i
h
t
t
i
n
a
w
S
P
I
N
m
a
l
N
e
x
t
-
g
e
2
Patented
single pass
e
t
w
w
o
r
a
r
e
w
n
e
r
a
t
i
RFDPI
engine
k
-
b
a
i
t
c
h
o
n
h
t
S
S
L
a
n
d
d
e
i
n
c
s
r
p
y
p
e
c
t
i
t
o
i
o
n
n
-
i
t
t
s
n
i
a
d
e
s
o
l
e
r
s
s
a
d
u
e
r
p
t
a
n
o
i
t
n
e
v
Page 3
Network Security Appliance 2600
The SonicWall NSA 2600 is designed to address the
needs of growing small organizations, branch ofces and
school campuses.
Network Security Appliance 3600/4600
The SonicWall NSA 3600/4600 is ideal for branch ofce and
small- to medium-sized corporate environments concerned about throughput capacity and performance.
Dual USB ports
Console
8 x 1GbE ports
1GbE
Expansion module
management
Dual fans Power
Firewall NSA 2600
Firewall throughput 1.9 Gbp s
IPS throughput 700 Mbps
Anti-malware throughput 400 Mbps
Full DPI throughput 300 Mbps
IMIX throughput 600 Mbps
Maximum DPI connections 125,000
New connections/sec 15,000/sec
Description SKU
NSA 2600 rewall only 01-SSC-3860
NSA 2600 TotalSecure (1-year) 01-SSC-3863
Dual USB ports
Console
2 x 10GbE SFP+ por t s
1GbE management
12 x 1GbE ports
4 x 1GbE SFP ports
Expansion bay for future use
Firewall NSA 3600 NSA 4600
Firewall throughput 3.4 Gbps 6.0 Gbps
IPS throughput 1.1 Gb ps 2.0 Gbps
Anti-malware throughput 600 Mbps 1.1 Gb ps
Full DPI throughput 500 Mbps 800 Mbps
IMIX throughput 900 Mbps 1.6 Gbps
Maximum DPI connections 175,000 200,000
New connections/sec 20,000/sec 40,000/sec
Description SKU
Firewall only 01-SSC-3850 01-SSC-3840
TotalSecure (1-year) 01-SSC-3853 01-SSC-3843
Dual fans Power
3
Page 4
Network Security Appliance 5600
The SonicWall NSA 5600 is ideal for distributed,
branch ofce and corporate environments needing signicant throughput.
Network Security Appliance 6600
The SonicWall NSA 6600 is ideal for large distributed and
corporate central site environments requiring high throughput capacity and performance.
Dual USB ports
Console
2 x 10GbE SPF+ ports
1GbE management
12 x 1GbE ports
4 x 1GbE
SPF ports
Expansion bay for future use Power
Firewall throughput 9.0 Gbps
IPS throughput 3.0 Gbps
Anti-malware throughput 1.7 Gbps
Full DPI throughput 1.6 Gb ps
IMIX throughput 2.4 Gbps
Maximum DPI connections 375,000
New connections/sec 60,000/sec
Description SKU
NSA 5600 rewall only 01-SSC-3830
NSA 5600 TotalSecure (1-year) 01-SSC-3833
Dual fans
Firewall NSA 5600
Dual USB ports
Console
4 x 10GbE SFP+ por t s
1GbE management
Expansion bay for future use
Firewall throughput 12.0 Gbps
IPS throughput 4.5 Gbps
Anti-malware throughput 3.0 Gbps
Full DPI throughput 3.0 Gbps
IMIX throughput 3.5 Gbps
Maximum DPI connections 500,000
New connections/sec 90,000/sec
Description SKU
NSA 6600 rewall only 01-SSC-3820
NSA 6600 TotalSecure (1-year) 01-SSC-3823
Dual hot swappable fans Power
Firewall NSA 6600
8 x 1GbE ports
4 x 1GbE SFP ports
4
Page 5
Reassembly-Free Deep Packet
Traffic out
Traffic out
Proxy
Scanning
Packet
disassembly
Packet assembly-based process
SonicWall architectureCompetitive architecture
When proxy
becomes full or
content too large,
files bypass
scanning.
Traffic in
Traffic in
Packet reassembly-free process
Reassembly-free packet
scanning eliminates proxy
and content size limitations.
Inspection time
Less More
Inspection capacity
Min Max
Inspection time
Less More
Inspection capacity
Min Max
Inspection engine
The SonicWall Reassembly-Free Deep
Packet Inspection (RFDPI) engine provides superior threat protection and application control without compromising performance. It relies on
streaming trafc payload inspection to
detect threats at Layers 3-7, and takes network streams through extensive and repeated normalization and decryption in order to neutralize advanced evasion
techniques that seek to confuse detection engines and sneak malicious code into the network.
Once a packet undergoes the necessary pre-processing, including SSL decryption, it is analyzed against a single, proprietary memory representation of three signature databases: intrusion attacks, malware and applications. The connection state is then advanced to represent the position of the stream relative to these databases
until it encounters a state of attack, or other “match” event, at which point a pre-set action is taken.
In most cases, the connection is terminated and proper logging and
notication events are created. However, the engine can also be congured for
inspection only or, in case of application detection, to provide Layer 7 bandwidth management services for the remainder of the application stream as soon as the
application is identied.
Flexible, customizable deployment options – NSA series at-a-glance
Every SonicWall NSA appliance utilizes a breakthrough, multi-core hardware design and RFDPI for internal and external network protection without compromising network performance.
The NSA series NGFWs combine
high-speed intrusion prevention, le
and content inspection, and powerful application intelligence and control with an extensive array of advanced
networking and exible conguration
features. The NSA series offers an affordable platform that is easy to deploy and manage in a wide variety
of large, branch ofce and distributed
network environments.
5
NSA series as central-site gateway
Internet
Internet Internet
Dual ISP failover Multi-WAN redundancy
NSA series as in-line NGFW solution
Full L2-L7
signature-based
inspection
application
Internet
awareness
User zone Administrative Servers
HA data link
HF link
Stateful high availability
Page 6
Security and protection
The dedicated, in-house SonicWall Threat Research Team works on
researching and developing counter-
measures to deploy to the rewalls in the eld for up-to-date protection. The
team leverages more than one million sensors across the globe for malware samples, and for telemetry feedback on the latest threat information, which in turn is fed into the intrusion prevention, anti-malware and application detection capabilities.
which extends the onboard signature
intelligence with over 30 million
signatures. This CloudAV database is accessed via a proprietary, light-weight
protocol by the rewall to augment
the inspection done on the appliance.
With Geo-IP and botnet ltering
capabilities, SonicWall NGFWs are able
to block trafc from dangerous domains
or entire geographies in order to reduce
the risk prole of the network.
SonicWall NGFW customers benet from
continuously updated threat protection around the clock, with new updates taking effect immediately without reboots or interruptions. The signatures resident on the appliances are designed to protect against wide classes of attacks, covering tens of thousands of individual threats with a single signature.
In addition to the countermeasures on the appliance, NSA appliances also have access to the SonicWall CloudAV Service,
Application intelligence and control
Application intelligence informs
administrators of application trafc
traversing their network, so they can schedule application controls based on business priority, throttle unproductive applications and block potentially dangerous applications. Real-time
visualization identies trafc anomalies
as they happen, enabling immediate countermeasures against potential inbound or outbound attacks or performance bottlenecks.
Protection
Creation
The SonicWall Global Management
System (GMS®) simplies management
Collection
Classification
of application intelligence and control using an intuitive, web-based interface.
SonicWall Application Trafc Analytics
provide granular insight into application
trafc, bandwidth utilization and
security threats, as well as powerful troubleshooting and forensics capabilities. Additionally, secure Single Sign-On (SSO) capabilities ease the user experience, increase productivity and reduce support calls.
6
Page 7
Features
RFDPI engine
Feature Description
Reassembly-Free Deep Packet Inspection (RFDPI)
Bi-directional inspection Scans for threats in both inbound and outbound traf c simultaneously to ensure that the network is not used to distribute
Stream-based inspection Proxy-less and non-buffering inspection technology provides ultra-low latency per formance for DPI of millions of simultaneous
Highly parallel and scalable The unique design of the RFDPI engine works with the multi-core architecture to provide high DPI throughput and extremely
Single-pass inspection A single-pass DPI architecture simultaneously scans for malware, intrusions and application identication, drastically reducing
Feature Description
Multi-engine sandboxing The multi- engine sandbox platform, which includes virtualized sandboxing, full system emulation and hypervisor level analysis
Broad le type and size analysis Analyzes a broad range of le t ypes including executable programs (PE), DLL, PDFs, MS Ofce documents, archives, JAR, and
Rapid deployment of signatures When a le is identied as malicious, a signature is immediately deployed to rewalls with an ac tive SonicWall Capture subscription
Block until verdict To prevent potentially malicious les from entering the network, les sent to the cloud for analysis can be held at the gateway
Feature Description
Countermeasure-based protection Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet payloads
Automatic signature updates The SonicWall Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures
Intra-zone IPS protection Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing threats
Botnet command and control (CnC) detection and blocking
Protocol abuse/anomaly detection and prevention
Zero-day protection Protects the network against zero-day attacks with constant updates against the lates t exploit methods and techniques that
Anti-evasion technology Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetec ted by
This high-performance, proprietary and patented inspection engine per for ms stream-based, bi-directional trafc analysis, without prox ying or buffering, to uncover intrusion attempt s and malware and to identif y application trafc regardless of por t.
malware and does not become a launch platform for attacks in case an infected machine is brought inside.
network streams without introducing le and stream size limitations, and can be applied on common protocols as well as raw
TCP streams.
high new session establishment rates to deal with trafc spikes in demanding networks.
DPI latency and ensuring that all threat information is correlated in a single architecture.
Capture advanced threat protection
technology, executes suspicious code and analyzes behavior, providing comprehensive visibility into malicious activity.
APK plus multiple operating systems (Windows, Android, Mac OS X) and multi-browser environments.
as well as GRID Gateway Anti-vir us and IPS signature databases plus URL, IP and domain reputation databases within 48 hours.
until a verdict is determined.
Intrusion prevention
for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.
that covers more than 50 attack categories. The new updates take effect immediately, without any reboot or service
interruption required.
from propagating across the zone boundaries.
Identies and blocks command and control trafc originating from bots on the local network to IPs and domains that are identied as propagating malware or are known CnC points.
Identies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
cover thousands of individual exploits.
utilizing evasion techniques in Layers 2-7.
7
Page 8
Features
Threat prevention
Feature Description
Network-based malware protection
CloudAV malware protection
Cloud-based sandboxing
Around-the-clock security updates
SSL decryption and inspection
Bi-directional raw TCP inspection
Extensive protocol support
Enforced Anti-Virus and Anti-Spyware Client software
*Requires the SonicWall Anti-Virus and Anti-Spyware Client sof tware
Feature Description
Application control Controls applications, or individual application features, which are identied by the RFDPI engine against a continuously
Custom application identication Controls custom applications by creating signatures based on specic parameters or pat terns unique to an application in its
Application bandwidth management Granularly allocates and regulates available bandwidth for critical applications or application categories while inhibiting non-
On-box/off-box trafc visualization Identies bandwidth utilization and analyzes net work behavior with real-time, on-box application trafc visualization and of f-
Granular control Controls applications, or specic components of an application, based on schedules, user groups, exclusion lists and a range
The SonicWall RFDPI engine scans all inbound, outbound and intra-zone traf c for viruses, Trojans, key loggers and other malware in les of unlimited length and size across all ports and TCP streams.
A continuously updated database of over 30 million threat signatures resides in the SonicWall cloud servers and is referenced
to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of threats.
SonicWall Capture Advance Threat Protection Service uses cloud-based, multi-engine sandboxing, including full system
emulation, vir tualization and hyper visor level techniques, to analyze suspicious les, detec t malicious behavior and block
unknown and zero-day attacks at the gateway.
The SonicWall Threat Research Team analyzes new threats and releases countermeasures 24 hours a day, 7 days a week. New threat updates are automatically pushed to rewalls in the eld with ac tive security services, and take effect immediately
without reboots or interruptions.
Decr ypts and inspec ts SSL trafc on the y, without proxying, for malware, intrusions and data leakage, and applies application, URL and content control policies in order to protect against threats hidden in SSL encrypted traf c.
The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally, preventing at tacks that try to sneak by outdated security systems that focus on securing a few well-known ports.
Identies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and
decodes payloads for malware inspection, even if they do not run on standard, well-known por ts.
Automatically detect non-compliant endpoint machines and install the Anti-Virus and Anti-Spyware software* machine-by­machine across the network regardless of whether devices are inside the corporate network or outside connected via VPN. Windows only.
Application intelligence and control
expanding database of over 3600 application signatures, to increase network securit y and enhance network produc tivity.
network communications, in order to gain fur ther control over the network.
essential application trafc.
box application traf c reporting via NetFlow/IPFix.
of actions with full SSO user identication through LDAP/AD/Terminal Services/Citrix integration.
Content ltering
Feature Description
Inside/outside content ltering Content Filtering Service enforces acceptable use policies and blocks access to websites containing information or images
Granular controls Blocks content using the predened categories or any combination of categories. Filtering can be scheduled by time of day,
Dynamic rating architecture All requested web sites are cross-referenced against a dynamically updated database in the cloud categorizing millions of
Web caching URL ratings are cached locally on the SonicWall rewall so that the response time for subsequent access to frequently visited
that are objec tionable or unproductive. Content Filtering Client extends policy enforcement to block internet content for devices located outside the rewall perimeter.
such as during school or business hours, and applied to individual users or groups.
URLs, IP addresses and domains in real time.
sites is only a fraction of a second.
8
Page 9
Features
Enforced anti-virus and anti-spyware
Feature Description
Multi-layered protection A rewall’s gateway anti-virus solution provides the rst layer of defense at the perimeter; however, viruses can still enter
Automated enforcement Ensures every computer accessing the network has the most recent version of anti-virus and anti-spyware signatures
Automated deployment and installation Machine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across the network,
Always on, automatic virus protection Frequent anti-virus and anti-spyware updates are delivered transparently to all desk tops and le servers to improve end-
Spyware protection Powerful spyware protec tion scans and blocks the installation of a comprehensive array of spyware programs on desktops
Feature Description
Stateful packet inspection All network traf c is inspected, analyzed and brought into compliance with rewall access policies.
DDoS/DoS attack protection SYN ood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting
Flexible deployment options The NSA series can be deployed in traditional NAT, Layer 2 bridge, wire and network tap modes.
IPv6 support Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With the latest SonicOS 6.2, the hardware will
High availability/clustering The NSA series supports Active/Passive (A/P) with state synchronization, Active/Active (A/A) DPI and Active/Active
WAN load balancing Load-balances multiple WAN interfaces using Round Robin, Spillover or Percentage methods.
Policy-based routing Creates routes based on protocol to direct trafc to a preferred WAN connection with the ability to fail back to a
Advanced quality of service (QoS) Guarantees critical communications with 802.1p, DSCP tagging, and remapping of VoIP trafc on the network.
H.323 gatekeeper and SIP proxy support Blocks spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy.
Feature Description
Global Management System SonicWall GMS monitors, congures and reports on multiple SonicWall appliances through a single management console
Powerful single device management An intuitive web-based inter face allows quick and convenient conguration, in addition to a comprehensive command-line
Application ow reporting Export s application trafc analytics and usage data for real-time and historical monitoring and reporting with tools such as
Feature Description
IPSec VPN for site-to-site connectivity High-performance IPSec VPN allows the NSA series to act as a VPN concentrator for thousands of other large sites, branch
SSL VPN or IPSec client remote access Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, les, computers,
Redundant VPN gateway When using multiple WANs, a primary and secondary VPN can be congured to allow seamless, automatic failover and
Route-based VPN The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel
Feature Description
User activity tracking User identication and activit y are made available through seamless AD/LDAP/Citrix1/Terminal Services1 SSO integration
GeoIP countr y trafc identication Identies and controls network trafc going to or coming from specic countries to either protect against attacks from
Regular expression DPI ltering Prevents data leakage by identifying and controlling content crossing the network through regular expression matching.
the net work through laptops, thumb drives and other unprotected systems. Utilizes a layered approach to anti-virus and anti-spyware protec tion to extend to both client and server.
installed and active, eliminating the costs commonly associated with desktop anti-virus and anti-spyware management.
minimizing administrative overhead.
user productivity and reduce security management.
and laptops before they can transmit condential data, providing greater desktop security and performance.
Firewall and networking
technologies. Additionally, it protects against DOS/DDoS through UDP/ICMP ood protec tion and connection rate limiting.
support ltering and wire mode implementations.
clustering high availability modes. Active/Active DPI ofoads the deep packet inspection load to cores on the passive
appliance to boost throughput.
secondary WAN in the event of an outage.
Management and reporting
with an intuitive interface, reducing management costs and complexity.
inter face and suppor t for SNMPv2/3.
SonicWall GMS or Analyzer.
Virtual private networking (VPN)
ofces or home ofces.
intranet sites and applications from a variety of platforms.
failback of all VPN sessions.
failure, by seamlessly re-routing trafc between endpoints through alternate routes.
Content/context awareness
combined with extensive information obtained through DPI.
known or suspected origins of threat activity, or to investigate suspicious trafc originating from the network.
9
Page 10
SonicOS feature summary
Firewall
• Reassembly-Free Deep Packet Inspection
• Deep packet inspection for SSL
• Stateful packet inspection
• Stealth mode
• Common Access Card (CAC) support
• DOS attack protection
UDP/ICMP/SYN ood protection
• SSL decryption and inspection
• IPv6 security
Intrusion prevention
• Signature-based scanning
• Automatic signature updates
• Bidirectional inspection engine
• Granular IPS rule capability
GeoIP and reputation-based ltering
• Regular expression matching
Anti-malware
• Stream-based malware scanning
• Gateway anti-virus
• Gateway anti-spyware
• Bi-directional inspection
No le size limitation
• Cloud malware database
Application control
• Application control
• Application component blocking
• Application bandwidth management
• Custom application signature creation
• Data leakage prevention
• Application reporting over NetFlow/IPFIX
• User activity tracking (SSO)
• Comprehensive application signature database
Web content ltering
URL ltering
• Anti-proxy technology
• Keyword blocking
• Bandwidth manage CFS rating categories
Unied policy model with app control
56 content ltering categories
• Content Filtering Client
VPN
• IPSec VPN for site-to-site connectivity
• SSL VPN and IPSec client remote access
• Redundant VPN gateway
• Mobile Connect for iOS, Mac OS X, Windows, Chrome, Android and Kindle Fire
• Route-based VPN (OSPF, RIP)
Networking
Jumbo frames
• Layer-2 network discover y
• IPv6
• Path MTU discovery
• Enhanced logging
• VLAN trunking
• RSTP (Rapid Spanning Tree Protocol)
• Port mirroring
• Layer-2 QoS
• Port security
• Dynamic routing
• SonicPoint wireless controller
• Policy-based routing
• Advanced NAT
DHCP server
• Bandwidth management
• Link aggregation
• Port redundancy
• A/P high availability with state sync
• A/A clustering
• Inbound/outbound load balancing
• L2 bridge, wire mode, tap mode, NAT mode
VoIP
• Granular QoS control
• Bandwidth management
DPI for VoIP trafc
H.323 gatekeeper and SIP proxy support
Management and monitoring
• Web GUI
• Command line interface (CLI)
• SNMPv2/v3
• Centralized management and reporting
• Logging
Netow/IPFix exporting
App trafc visualization
• Centralized policy management
• Single Sign-On (SSO)
• Terminal service/Citrix support
• BlueCoat Security Analytics Platform
• Application and bandwidth visualization
IPv4 and IPv6 Management
IPv6
IPv6 ltering
• 6rd (rapid deployment)
DHCP prex delegation
• Wire mode
• BGP
Capt u r e ATP
• Cloud-based multi-engine analysis
• Vir tualized sandboxing
Hypervisor level analysis
• Full system emulation
Broad le type examination
• Automated and manual submission
• Real-time threat intelligence updates
• Auto-block capability
10
Page 11
NSA series system specications
Operating system SonicOS 6.2.2 Security processing cores 4 x 800 MHz 6 x 80 0 MHz 8 x 1.1 GHz 10 x 1.3 GHz 24 x 1.0 GHz 10 GbE interfaces 2 x 10-GbE SFP+ 4 x 10-GbE SFP+
1 GbE interfaces 8 x 1 GbE
Management interfaces 1 GbE, 1 Console Memory (RAM) 2.0 GB 4.0 GB Expansion 1 Expansion Slot (Rear)*, SD Card* Firewall inspection throughput Full DPI throughput Application inspection throughput IPS throughput Anti-malware inspection throughput IMIX throughput SSL Inspection and Decr yption (DPI SSL) VPN throughput
2
2
3
3
1
2
2
2
Connections per second 15,000/sec 20,000/sec 40,000/sec 60,000/sec 90,000/sec Maximum connections (SPI) 225,000 325,000 400,000 562,500 750,000 Maximum connections (DPI) 125,000 175,000 200,000 375,000 500,000 SonicPoints supported (Maximum) 32 48 64 96 128 Single Sign-on (SSO) Users 30,000 40,000 50,000 60,000 70,000
VPN NSA 2600 NSA 3600 NSA 4600 NSA 5600 NSA 6600
Site-to-site tunnels 250 1,000 3,000 4,000 6,000 IPSec VPN clients (Maximum) 10 (250) 50 (1,000) 500 (3,000) 2,000 (4,000) 2,000 (6,000) SSL VPN licenses (Maximum) 2 (250) 2 (350) 2 (500) 2 (1000) 2 (1500) Encryption/Authentication DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B Cryptography Key exchange Dife Hellman Groups 1, 2, 5, 14 Route-based VPN R I P, OS P F
Networking NSA 2600 NSA 3600 NSA 4600 NSA 5600 NSA 6600
IP address assignment Static (DHCP PPPoE, L 2TP and PPTP client), Internal DHCP server, DHCP Relay NAT mo des 1:1, many:1, 1:many, exible NAT (overlapping IPS), PAT, transparent mode VLAN interfaces 256 256 256 400 500 Routing protocols BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast QoS Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p
Authentication
VoIP Full H323-v1-5, SIP Standards TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
Certications ICSA Firewall, ICSA Anti-Virus, FIPS 140-2, Common Criteria NDPP (Firewall and IPS), UC APL
Hardware NSA 2600 NSA 3600 NSA 4600 NSA 5600 NSA 6600
Power supply 200W Single, Fixed 250W
Fans Dual, Fixed
Input power 100-240 VAC, 60-50 Hz Maximum power consumption (W) 49.4 74. 3 86.7 90.9 113 .1 Form factor 1U Rack Mountable
Dimensions
Weight 10.1 lb (4.6 kg) 13.56 lb (6.15 Kg) 14.93 lb (6.77 Kg) WEEE weight 11.0 lb (5.0 kg) 14.24 lb (6.46 Kg) 19.78 lb (8.97 Kg) Shipping weight 14.3 lb (6.5 kg) 20.79lb (9.43 Kg) 26.12 lb (11.85 Kg)
Major regulatory
Environment 32-105 F, 0-40 deg C Humidity 10-90% non-condensing MTBF (Years) 20.2 16.8 16.0 15.4 13. 3
1
Testing Methodologies: Maximum performance based on RFC 2544 (for rewall). Actual per formance may vary depending on network conditions and ac tivated ser vices.
2
Full DPI/GatewayAV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools. Testing done
with multiple ows through multiple port pairs.
3
VPN throughput measured using UDP trafc at 1280 byte packet size adhering to RFC 2544. All specications, features and availability are subject to change.
*Future use.
NSA 2600 NSA 3600 NSA 4600 NSA 5600 NSA 6600
4 x 1-GbE SFP,
12 x 1 GbE
1.9 Gbp s 3.4 Gbps 6.0 Gbps 9.0 Gbps 12.0 Gbps
300 Mbps 500 Mbps 800 Mbps 1.6 Gbps 3.0 Gbps 700 Mbps 1.1 G bps 2.0 Gbps 3.0 Gbps 4.5 Gbps 700 Mbps 1.1 G bps 2.0 Gbps 3.0 Gbps 4.5 Gbps 400 Mbps 600 Mbps 1.1 G b ps 1.7 Gbps 3.0 Gbps 600 Mbps 900 Mbps 1.6 G bps 2.4 Gbps 3.5 Gbps
200 Mbps 300 Mbps 500 Mbps 800 Mbps 1.3 Gbps
1.1 Gb ps 1.5 G bps 3.0 Gbps 4.5 Gbps 5.0 Gbps
XAUTH/RADIUS, Ac tive Directory, SSO, LDAP, Novell, internal user database, Terminal Ser vices, Citrix,
Common Access Card (CAC)
1.75 x 10.25 x 17 in (4.5 x 26 x 43 cm)
1.75 x 19.1 x 17 in
(4.5 x 48.5 x 43 cm)
FCC Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB,
Mexico CoC by UL, WEEE , REACH, ANATEL, BSMI, CU
8 x 1-GbE SFP,
8 x 1 GbE
(1 LAN Bypass pair)
Dual, redundant,
hot swappable
11
Page 12
NSA series ordering information
Product SKU
NSA 2600 TotalSecure (1-year) 01-SSC-3863 NSA 2600 TotalSecure Advanced Edition (1-year) 01- SSC -1712 NSA 3600 TotalSecure (1-year) 01-SSC-3853 NSA 3600 TotalSecure Advanced Edition (1-year) 01- SSC -1713 NSA 4600 TotalSecure (1-year) 01-SSC-3843 NSA 4600 TotalSecure Advanced Edition (1-year) 01- SSC -1714 NSA 5600 TotalSecure (1-year) 01-SSC-3833 NSA 5600 TotalSecure Advanced Edition (1-year) 01- SSC -1715 NSA 6600 TotalSecure (1-year) 01-SSC-3823 NSA 6600 TotalSecure Advanced Edition (1-year) 01- SSC -1716
NSA 2600 security and support subscriptions SKU
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 260 0 (1-year) 0 1-SS C-1470 Capture Advanced Threat Protection for NSA 2600 (1-year) 01-SS C-1475 Threat Prevention– Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spy ware, Cloud Anti-Virus for NSA 2600 (1-year) 01-SSC- 4459 Silver 24x7 Suppor t for NSA 2600 (1-year) 01-SS C-4314 Content Filtering Premium Business Edition for NSA 2600 (1-year) 01-SSC- 4465
Enforced Client Anti-Virus & Anti-Spy ware — Kaspersk y Based on user count
Comprehensive Anti-Spam Service for NSA 2600 (1-year) 01-SSC-4471
NSA 3600 security and support subscriptions SKU
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 3600 (1-year) 01-SSC-14 8 0 Capture Advanced Threat Protection for NSA 3600 (1-year) 01-S SC-14 85 Threat Prevention– Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spy ware, Cloud Anti-Virus for NSA 3600 (1-year) 01-SSC-4435 Silver 24x7 Suppor t for NSA 3600 (1-year) 01-SSC- 4302 Content Filtering Premium Business Edition for NSA 360 0 (1-year) 01-SSC-4441
Enforced Client Anti-Virus & Anti-Spy ware — Kaspersk y Based on user count
Comprehensive Anti-Spam Service for NSA 3600 (1-year) 01-SSC-4447
NSA 4600 security and support subscriptions SKU
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 4600 (1-year) 01-SS C-1490 Capture Advanced Threat Protection for NSA 4600 (1-year) 01-SS C-1495 Threat Prevention– Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spy ware, Cloud Anti-Virus for NSA 4600 (1-year) 01- S S C - 4411 Silver 24x7 Suppor t for NSA 4600 (1-year) 01-SSC-4290 Content Filtering Premium Business Edition for NSA 4600 (1-year) 01-S SC- 4417
Enforced Client Anti-Virus & Anti-Spy ware — Kaspersk y Based on user count
Comprehensive Anti-Spam Service for NSA 4600 (1-year) 01-SSC- 4423
NSA 5600 security and support subscriptions SKU
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 5600 (1-year) 01-SSC-1550 Capture Advanced Threat Protection for NSA 5600 (1-year) 01-SSC-1555 Threat Prevention – Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spyware, Cloud Anti-Virus for NSA 5600 (1-year) 01-SSC-424 0 Gold 24x7 Suppor t for NSA 5600 (1-year) 01-SSC-4284 Content Filtering Premium Business Edition for NSA 560 0 (1-year) 01-SSC-4246
Enforced Client Anti-Virus & Anti-Spy ware — Kaspersk y Based on user count
Comprehensive Anti-Spam Service for NSA 5600 (1-year) 01-SSC-4252
NSA 6600 security and support subscriptions SKU
Advanced Gateway Security Suite – Capture ATP, Threat Prevention, Content Filtering and 24x7 Support for NSA 6600 (1-year) 01-SS C-156 0
Capture Advanced Threat Protection for NSA 6600 (1-year)
Threat Prevention– Intrusion Prevention, Gateway Anti-Virus, Gateway Anti-Spy ware, Cloud Anti-Virus for NSA 6600 (1-year) 01-SSC- 4216 Gold 24x7 Suppor t for NSA 6600 (1-year) 01-SSC-4278 Content Filtering Premium Business Edition for NSA 660 0 (1-year) 01-SSC-4222
Enforced Client Anti-Virus & Anti-Spy ware — Kaspersk y Based on user count
Comprehensive Anti-Spam Service for NSA 6600 (1-year) 01-SSC-4228
01-SS C-156 5
12
Page 13
NSA series ordering information
Modules and accessories* SKU
10GBASE-SR SFP+ Shor t Reach Module 01-SSC-9785 10GBASE-LR SFP+ Long Reach Module 01-SSC-9786 10GBASE SFP+ 1M Twinax Cable 01-SSC-9787 10GBASE SFP+ 3M Twinax Cable 01-SSC-9788 1000BASE-SX SFP Shor t Haul Module 01-SSC-9789 1000BASE-LX SFP Long Haul Module 01-SSC-9790 1000BASE-T SFP Copper Module 01-SSC-9791
Management and reporting SKU
SonicWall GMS 10 Node Software License 01-SSC-3363 SonicWall GMS E-Class 24x7 Software Support for 10 node (1-year) 01-SSC - 6 514
*Please consult with your local SonicWall reseller for a complete list of supported SFP and SFP+ modules
Regulatory model numbers:
NSA 2600–1RK29-0A9
NSA 3600 –1RK26-0A2
NSA 4600–1RK26-0A3
NSA 5600 –1RK26-0A4
NSA 660 0 –1RK 27-0A5
About Us
Over a 25 year history, SonicWall has been the industry’s trusted security partner. From network security to access security to email security, SonicWall has continuously evolved its product portfolio, enabling organizations to innovate, accelerate and grow. With
over a million security devices in almost 200 countries and territories worldwide, SonicWall enables its customers to condently
say yes to the future.
SonicWall, Inc.
5455 Great America Parkway | Santa Clara, CA 95054 Refer to our website for additional information. www.sonicwall.com
© 2017 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a
trademark or registered trademark of SonicWall Inc. and/or its afliates
in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners.
Datasheet-NetworkSecurityAppliance-US-KJ-26377
Loading...