RFDPI engine | |
---|---|
Feature | Description |
Reassembly-Free Deep Packet Inspection | This high-performance, proprietary and patented inspection engine performs stream based bi-directional traffic analysis, without proxying or buffering, to uncover intrusion attempts, malware and identify application traffic regardless of port. |
Bi-directional inspection | Scans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not used to distribute malware, and does not become a launch platform for attacks in case an infected machine is brought inside. |
Single-pass inspection | A single-pass DPI architecture simultaneously scans for malware, intrusions and application identification, drastically reducing DPI latency and ensuring that all threat information is correlated in a single architecture. |
Stream-based inspection | Proxy-less and non-buffering inspection technology provides ultra-low latency performance for deep packet inspection of simultaneous network streams without introducing file and stream size limitations, and can be applied on common protocols as well as raw TCP streams. |
Deep Packet Inspection of Secure Socket Shell (DPI-SSH) | Detects and prevents advanced encrypted attacks that leverage SSH, blocks encrypted malware downloads, ceases the spread of infections, and thwarts command and control communications and data exfiltration. |
Capture Advanced Threat Protection | |
Feature | Description |
Multi-engine sandboxing | The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation, and hypervisor level analysis technology, executes suspicious code and analyzes behavior, providing comprehensive visibility to malicious activity |
Broad file type analysis | Supports analysis of a broad range of file types, including executable programs (PE), DLL, PDFs, MS Office documents, archives, JAR, and APK plus multiple operating systems including Windows, Android, Mac OSX and multi-browser environments. |
Rapid deployment of signatures | When a file is identified as malicious, a signature is immediately deployed to firewalls with SonicWall Capture subscriptions and GRID Gateway Anti-Virus and IPS signature databases and the URL, IP and domain reputation databases within 48 hours. |
Block until verdict | To prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the gateway until a verdict is determined. |
Encrypted Threat Protection | |
Feature | Description |
TLS/SSL decryption and inspection | Decrypts and inspects SSL traffic on the fly, without proxying, for malware, intrusions and data leakage, and applies application, URL and content control policies in order to protect against threats hidden in TLS/SSL encrypted traffic. Included with security subscriptions for all models except SOHO. Sold as a separate license on SOHO. |
SSH inspection | Deep packet inspection of SSH (DPI-SSH) decrypts and inspects data traversing over SSH tunnels to prevent attacks that leverage SSH. |
Intrusion Prevention | |
Feature | Description |
Countermeasure-based protection | Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities. |
Automatic signature updates | The SonicWALL Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures that covers more than 50 attack categories. The new updates take immediate effect without any reboot or service interruption required. |
Intra-zone IPS protection | Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing threats from propagating across the zone boundaries. |
Botnet command and control (CnC) detection and blocking | Identifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are identified as propagating malware or are known CnC points. |
Protocol abuse/anomaly | Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS. |
Zero-day protection | Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques that cover thousands of individual exploits. |
Anti-evasion technology | Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected by utilizing evasion techniques in Layers 2-7. |
Threat Prevention | |
Feature | Description |
Gateway anti-malware | The RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and other malware in files of unlimited length and size across all ports and TCP streams. |
CloudAV malware protection | A continuously updated database of over 17 million threat signatures resides in the SonicWALL cloud servers and is referenced to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of threats. |
Around-the-clock security updates | New threat updates are automatically pushed to firewalls in the field with active security services, and take effect immediately without reboots or interruptions. |
SSL decryption and inspection | Decrypts and inspects SSL traffic on the fly, without proxying, for malware, intrusions and data leakage, and applies application, URL and content control policies in order to protect against threats hidden in SSL encrypted traffic Included with security subscriptions for all models except SOHO. Sold as a separate license on SOHO |
Bi-directional raw TCP inspection | The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that they to sneak by outdated security systems that focus on securing a few well-known ports. |
Extensive protocol support | Identifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and decodes payloads for malware inspection, even if they do not run on standard, well-known ports. |
Application Intelligence and Control | |
Feature | Description |
Application control | Control applications, or individual application features, that are identified by the RFDPI engine against a continuously expanding database of over 3,500 application signatures, to increase network security and enhance network productivity. |
Custom application identification | Control custom applications by creating signatures based on specific parameters or patterns unique to an application in its network communications, in order to gain further control over the network. |
Application bandwidth management | Granularly allocate and regulate available bandwidth for critical applications or application categories while inhibiting nonessential application traffic. |
Granular control | Control applications, or specific components of an application, based on schedules, user groups, exclusion lists and a range of actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix integration |
Content Filtering | |
Feature | Description |
Inside/outside content filtering | Enforce acceptable use policies and block access to websites containing information or images that are objectionable or unproductive with Content Filtering Service. Extend policy enforcement to block internet content for devices located outside the firewall perimeter with the Content Filtering Client. |
Granular controls | Block content using the predefined categories or any combination of categories. Filtering can be scheduled by time of day, such as during school or business hours, and applied to individual users or groups. |
YouTube for Schools | Enable teachers to choose from hundreds of thousands of free educational videos from YouTube EDU that are organized by subject and grade and align with common educational standards. |
Web caching | URL ratings are cached locally on the SonicWALL firewall so that the response time for subsequent access to frequently visited sites is only a fraction of a second. |
Enforced Anti-Virus and Anti-Spyware | |
Feature | Description |
Multi-layered protection | Utilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint protection to block, viruses entering network through laptops, thumb drives and other unprotected systems. |
Automated enforcement option | Ensure every computer accessing the network has the most recent version of anti-virus and anti-spyware signatures installed and active, eliminating the costs commonly associated with desktop anti-virus and antispyware management. |
Automated deployment and installation option | Machine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across the network, minimizing administrative overhead. |
Always on, automatic virus protection | Frequent anti-virus and anti-spyware updates are delivered transparently to all desktops and file servers to improve end user productivity and decrease security management. |
Spyware protection | Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on desktops and laptops before they transmit confidential data, providing greater desktop security and performance. |
Firewall and Networking | |
Feature | Description |
Stateful packet inspection | All network traffic is inspected, analyzed and brought into compliance with firewall access policies. |
DDoS/DoS attack protection | SYN Flood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting technologies. Additionally, it provides the ability to protect against DOS/DDoS through UDP/ICMP flood protection and connection rate limiting. |
Flexible deployment options | The SonicWALL TZ Series can be deployed in traditional NAT, Layer 2 Bridge, Wire Mode and Network Tap modes. |
IPv6 support | Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With the latest SonicOS, the hardware will support filtering implementations. |
Dell X-Series switch integration | Manage security settings of additional ports, including POE and POE+, under a single pane of glass using TZ series dashboard with Dell X series switch (not available with the SOHO model) |
High availability | SonicWALL TZ500 and SonicWALL TZ600 models support high availability with Active/Standby with state synchronization. SonicWALL TZ300 and SonicWALL TZ400 models support high availability without Active/Standby synchronization. There is no high availability on SonicWALL SOHO models. |
Threat API | Enables the firewall to receive any and all proprietary, original equipment manufacturer and third-party intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised credentials, ransomware and advanced persistent threats. |
Wireless Network Security | IEEE 802.11ac wireless technology can deliver up to 1.3 Gbps of wireless throughput with greater range and reliability. Available on SonicWall TZ600 through SonicWall TZ300 models. Optional 802.11 a/b/g/n is available on SonicWall SOHO models. |
Management and Reporting | |
Feature | Description |
Global Management System | SonicWALL GMS monitors, configures and reports on multiple SonicWALL appliances and Dell X-Series switches through a single management console with an intuitive interface to reduce management costs and complexity. |
Powerful, single device management | An intuitive, web-based interface allows quick and convenient configuration. Also, a comprehensive command line interface and support for SNMPv2/3. |
IPFIX/NetFlow application flow reporting | Exports application traffic analytics and usage data through IPFIX or NetFlow protocols for real-time and historical monitoring and reporting with tools such as SonicWALL Scrutinizer or other tools that support IPFIX and NetFlow with extensions. |
Virtual Private Networking | |
Feature | Description |
Auto-provision VPN | Simplifies and reduces complex distributed firewall deployment down to a trivial effort by automating the initial site-to-site VPN gateway provisioning between SonicWall firewalls while security and connectivity occurs instantly and automatically. |
IPSec VPN for site-to-site connectivity | High-performance IPSec VPN allows the SonicWALL TZ Series to act as a VPN concentrator for thousands of other large sites, branch offices or home offices. |
SSL VPN or IPSec client remote access | Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers, intranet sites and applications from a variety of platforms. |
Redundant VPN gateway | When using multiple WANs, a primary and secondary VPN can be configured to allow seamless automatic failover and failback of all VPN sessions. |
Route-based VPN | The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel failure, by seamlessly re-routing traffic between endpoints through alternate routes. |
Content/Context Awareness | |
Feature | Description |
User activity tracking | User identification and activity are made available through seamless AD/LDAP/Citrix1/TerminalServices SSO integration combined with extensive information obtained through DPI. |
GeoIP country traffic identification | Identifies and controls network traffic going to or coming from specific countries to either protect against attacks from known or suspected origins of threat activity, or to investigate suspicious traffic originating from the network. |
Regular expression DPI filtering | Prevents data leakage by identifying and controlling content crossing the network through regular expression matching. |
Specifications
Models: | TZ SOHO | TZ300 | TZ400 | TZ500 | TZ600 |
---|---|---|---|---|---|
Performance Overview | |||||
SonicOS Version | SonicOS | ||||
Security Processor | 2 x 400 MHz / 2 x 800 MHz |
2 x 800 MHz | 4 x 800 MHz | 4 x 1 GHz | 4 x 1.4 GHz |
Interfaces | 5x1GbE, 1 USB, 1 Console | 5x1GbE, 1 USB, 1 Console | 7x1GbE, 1 USB, 1 Console | 8x1GbE, 2 USB, 1 Console | 10x1GbE, 2 USB, 1 Console, 1 Expansion Slot |
Memory (RAM) | 512 MB / 1GB | 1 GB | 1 GB | 1 GB | 1 GB |
Memory (flash) | 32 MB / 64 MB | 64 MB | 64 MB | 64 MB | 64 MB |
Expansion | USB | USB | USB | 2 USB | Expansion Slot (Rear)*, 2 USB |
Single Sign-On (SSO) Users | 250 | 500 | 500 | 500 | 500 |
VLAN Interfaces | 25 | 25 | 50 | 50 | 50 |
SonicPoints supported (maximum) | 2 | 8 | 16 | 16 | 24 |
Dell X-Series switch models supported | Not available | X1008/P, X1018/P, X1026/P, X1052/P, X4012 | |||
Firewall/VPN performance | TZ SOHO | TZ300 | TZ400 | TZ500 | TZ600 |
Firewall Inspection Throughput1 | 300 Mbps | 750 Mbps | 1,300 Mbps | 1,400 Mbps | 1,500 Mbps |
Full DPI Throughput2 | 50 Mbps | 100 Mbps | 300 Mbps | 400 Mbps | 500 Mbps |
Application Inspection Throughput2 | - | 300 Mbps | 900 Mbps | 1,000 Mbps | 1,100 Mbps |
IPS Throughput2 | 100 Mbps | 300 Mbps | 900 Mbps | 1,000 Mbps | 1,100 Mbps |
Anti-malware Throughput2 | 50 Mbps | 100 Mbps | 300 Mbps | 400 Mbps | 500 Mbps |
IMIX Throughput | 60 Mbps | 200 Mbps | 500 Mbps | 700 Mbps | 900 Mbps |
SSL Inspection & Decryption (DPI SSL) Throughput2 | 15 Mbps | 45 Mbps | 100 Mbps | 150 Mbps | 200 Mbps |
IPSec VPN Throughput3 | 100 Mbps | 300 Mbps | 900 Mbps | 1,000 Mbps | 1,100 Mbps |
Connections per second | 1,800 | 5,000 | 6,000 | 8,000 | 12,000 |
Maximum connections (SPI) | 10,000 | 50,000 | 100,000 | 125,000 | 150,000 |
Maximum connections (DPI) | 10,000 | 50,000 | 90,000 | 100,000 | 125,000 |
Maximum connections (DPI SSL) | 100 | 500 | 500 | 750 | 750 |
VPN | TZ SOHO | TZ300 | TZ400 | TZ500 | TZ600 |
Site-to-Site VPN Tunnels | 10 | 10 | 20 | 25 | 50 |
IPSec VPN Clients (maximum) | 1 (5) | 1 (10) | 2 (25) | 2 (25) | 2 (25) |
SSL VPN Licenses (maximum) | 1 (10) | 1 (50) | 2 (100) | 2 (150) | 2 (200) |
Virtual Assist Bundled (Maximum) | - | 1 (30-day trial) | 1 (30-day trial) | 1 (30-day trial) | 1 (30-day trial) |
Encryption/Authentication | DES, 3DES, AES (128, 192, 256-bit), MD5, SHA-1, Suite B Cryptography | ||||
Key Exchange | Diffie Hellman Groups 1, 2, 5, 14 | ||||
Route-based VPN | RIP, OSPF | ||||
Certificate Support | Verisign, Thawte, Cybertrust, RSA Keon, Entrust and Microsoft CA for SonicWALL-to-SonicWALL VPN, SCEP | ||||
VPN Features | Dead Peer Detection, DHCP Over VPN, IPSec NAT Traversal, Redundant VPN Gateway, Route-based VPN | ||||
Global VPN Client Platforms Supported | Microsoft Windows Vista 32/64-bit, Windows 7 32/64-bit, Windows 8.0 32/64-bit, Windows 8.1 32/64-bit, Windows 10 | ||||
NetExtender | Microsoft Windows Vista 32/64-bit, Windows 7, Windows 8.0 32/64-bit, Windows 8.1 32/64-bit, Mac OS X 10.4+, Linux FC3+/Ubuntu 7+/OpenSUSE | ||||
Mobile Connect | Apple iOS, Mac OS X, Google Android, Kindle Fire, Windows 8.1 (Embedded) | ||||
Security Services | TZ SOHO | TZ300 | TZ400 | TZ500 | TZ600 |
Deep Packet Inspection Services | Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, DPI SSL | ||||
Content Filtering Service (CFS) | HTTP URL, HTTPS IP, keyword and content scanning, ActiveX, Java Applet, and cookie blocking bandwidth management on filtering categories, allow/forbid lists | ||||
Enforced Client Anti-Virus and Anti-Spyware | McAfee and Kaspersky | ||||
Comprehensive Anti-Spam Service | Supported | ||||
Application Visualization | No | Yes | Yes | Yes | Yes |
Application Control | Yes | Yes | Yes | Yes | Yes |
Capture Advanced Threat Protection | No | Yes | Yes | Yes | Yes |
Networking | TZ SOHO | TZ300 | TZ400 | TZ500 | TZ600 |
IP Address Assignment | Static, (DHCP, PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP relay | ||||
NAT Modes | 1:1, 1:many, many:1, many:many, flexible NAT (overlapping IPs), PAT, transparent mode | ||||
Routing Protocols4 | BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast | ||||
QoS | Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1e (WMM) | ||||
Authentication | XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database | XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix | |||
Local User Database | 150 | 250 | |||
VoIP | Full H.323v1-5, SIP | ||||
Standards | TCP/IP, UDP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 | ||||
Certifications | FIPS 140-2 (with Suite B) Level 2, UC APL, VPNC, IPv6 (Phase 2), ICSA Network Firewall, ICSA Anti-virus | ||||
Certifications Pending | Common Criteria NDPP | ||||
Common Access Card (CAC) | Supported | ||||
High availability | No | Active/standby | Active/standby | Active/standby with stateful synchronization | Active/standby with stateful synchronization |
Hardware | TZ SOHO | TZ300 | TZ400 | TZ500 | TZ600 |
Form Factor | Desktop | ||||
Power Supply (W) | 24W external | 24W external | 24W external | 36W external | 60W external |
Maximum Power Consumption (W) | 6.4 / 11.3 | 6.9 / 12.0 | 9.2 / 13.8 | 13.4 / 17.7 | 16.1 |
Input Power | 100 to 240 VAC, 50-60 Hz, 1 A | ||||
Total Heat Dissipation | 21.8 / 38.7 BTU | 23.5 / 40.9 BTU | 31.3 / 47.1 BTU | 45.9 / 60.5 BTU | 55.1 BTU |
Dimensions (in) | 1.4x5.6x7.5 | 1.3x5.3x7.5 | 1.3x5.3x7.5 | 1.4x5.9x8.9 | 1.4x7.1x11.0 |
Dimensions (cm) | 3.6x14.1x19 | 3.5x13.4x19 | 3.5x13.4x19 | 3.5x15x22.5 | 3.5x18x28 |
Weight | 0.34 kg / 0.75 lbs 0.48 kg / 1.06 lbs |
0.73 kg / 1.61 lbs 0.84 kg / 1.85 lbs |
0.73 kg / 1.61 lbs 0.84 kg / 1.85 lbs |
0.92 kg / 2.03 lbs 1.05 kg / 2.31 lbs |
1.47 kg / 3.24 lbs |
WEEE Weight | 0.80 kg / 1.76 lbs 0.94 kg / 2.07 lbs |
1.15 kg / 2.53 lbs 1.26 kg / 2.78 lbs |
1.15 kg / 2.53 lbs 1.26 kg / 2.78 lbs |
1.34 kg / 2.95 lbs 1.48 kg / 3.26 lbs |
1.89 kg /4.16 lbs |
Shipping Weight | 1.20 kg / 2.64 lbs 1.34 kg / 2.95 lbs |
1.37 kg / 3.02 lbs 1.48 kg / 3.26 lbs |
1.37 kg / 3.02 lbs 1.48 kg / 3.26 lbs |
1.93 kg / 4.25 lbs 2.07 kg / 4.56 lbs |
2.48 kg / 5.47 lbs |
MTBF (Years) | 58.9/56.1 (wireless) | 56.1 | 54.0 | 40.8 | 18.4 |
Environment | 40-105° F, 0-40° C | ||||
Humidity | 5-95% non-condensing | ||||
Regulatory | TZ SOHO | TZ300 | TZ400 | TZ500 | TZ600 |
Regulatory Model (wired) | APL31-0B9 | APL28-0B4 | APL28-0B4 | APL29-0B6 | APL30-0B8 |
Major Regulatory Compliance (wired) | FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP | FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP | FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP | FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, UL cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP |
Regulatory Model (wireless) | APL41-0BA | APL28-0B5 | APL28-0B5 | APL29-0B7 | - |
Major Regulatory Compliance (wired) | FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH | FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH | FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH | FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH | - |
Integrated Wireless | TZ SOHO Series | TZ300, TZ400, TZ500 Series | TZ600 |
---|---|---|---|
Standards | 802.11 ac/a/b/g/n | 802.11a/b/g/n/ac (WEP, WPA, WPA2, 802.11i, TKIP, PSK,02.1x, EAP-PEAP, EAP-TTLS | - |
Frequency bands5 | 802.11a: 5.180-5.825 GHz; 802.11b/g: 2.412-2.472 GHz; 802.11n: 2.412-2.472 GHz, 5.180-5.825 GHz; | 802.11a: 5.180-5.825 GHz; 802.11b/g: 2.412-2.472 GHz; 802.11n: 2.412-2.472 GHz, 5.180-5.825 GHz; 802.11ac: 2.412-2.472 GHz, 5.180-5.825 GHz | - |
Operating Channels | 802.11a: US and Canada 12, Europe 11, Japan 4, Singapore 4, Taiwan 4; 802.11b/g: US and Canada 1-11, Europe 1-13, Japan 1-14 (14-802.11b only); 802.11n (2.4 GHz): US and Canada 1-11, Europe 1-13, Japan 1-13; 802.11n (5 GHz): US and Canada 36-48/149-165, Europe 36-48, Japan 36-48, Spain 36-48/52-64; | 802.11a: US and Canada 12, Europe 11, Japan 4, Singapore 4, Taiwan 4; 802.11b/g: US and Canada 1-11, Europe 1-13, Japan 1-14 (14-802.11b only); 802.11n (2.4 GHz): US and Canada 1-11, Europe 1-13, Japan 1-13; 802.11n (5 GHz): US and Canada 36-48/149-165, Europe 36-48, Japan 36-48, Spain 36-48/52-64; 802.11ac: US and Canada 36-48/149- 165, Europe 36-48, Japan 36-48, Spain 36-48/52-64 | - |
Transmit output power | Based on the regulatory domain specified by the system administrator | Based on the regulatory domain specified by the system administrator | - |
Transmit power control | Supported | Supported | - |
Data rates supported | 802.11a: 6, 9, 12, 18,24, 36, 48, 54 Mbps per channel; 802.11b: 1, 2, 5.5, 11 Mbps per channel; 802.11g: 6, 9, 12, 18, 24, 36, 48, 54 Mbps per channel; 802.11n: 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 15,30, 45, 60, 90, 120, 135, 150 Mbps per channel; | 802.11a: 6,9,12,18,24,36,48,54 Mbps per channel; 802.11b: 1,2,5.5,11 Mbps per channel; 802.11g: 6,9,12,18,24,36,48,54 Mbps per channel; 802.11n: 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 15,30, 45, 60, 90, 120, 135, 150 Mbps per channel; 802.11ac: 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 86.7, 96.3, 15, 30, 45, 60, 90, 120, 135, 150, 180, 200, 32.5, 65, 97.5, 130, 195, 260, 292.5, 325, 390, 433.3, 65, 130, 195, 260, 390, 520, 585, 650, 780, 866.7 Mbps per channel | - |
Modulation technology spectrum | 802.11a: Orthogonal Frequency Division Multiplexing (OFDM); 802.11b: Direct Sequence Spread Spectrum (DSSS); 802.11g: Orthogonal Frequency Division Multiplexing (OFDM)/Direct Sequence Spread Spectrum (DSSS); 802.11n: Orthogonal Frequency Division Multiplexing (OFDM) | 802.11a: Orthogonal Frequency Division Multiplexing (OFDM); 802.11b: Direct Sequence Spread Spectrum (DSSS); 802.11g: Orthogonal Frequency Division Multiplexing (OFDM)/ Direct Sequence Spread Spectrum (DSSS); 802.11n: Orthogonal Frequency Division Multiplexing (OFDM); 802.11ac: Orthogonal Frequency Division Multiplexing (OFDM) | - |
Product list:
High-End Firewall Series | NSSP 12400 |
NSSP 12800 | |
Mid-Range Firewall Series | NSa 9650 |
NSa 9450 | |
NSa 9250 | |
NSa 6650 | |
NSa 4650 | |
NSa 3650 | |
NSa 2650 | |
Entry Level Firewall Series | SOHO |
TZ300 | |
TZ400 | |
TZ500 | |
TZ600 | |
virtual firewalls NSv Series | NSv 10 |
NSv 25 | |
NSv 50 | |
NSv 100 | |
NSv 200 | |
NSv 300 | |
NSv 400 | |
NSv 800 | |
NSv 1600 | |
Wireless Security Series | SONICWAVE 432E |
SONICWAVE 432I | |
SONICWAVE 432O | |
SONICPOINT ACE | |
SONICPOINT ACI | |
SONICPOINT N2 |