Intrusion Prevention |
Signature Scanning | Tightly integrated, signature-based intrusion prevention scans packet payloads for vulnerabilities and exploits that target critical internal systems. |
Signature Updates | SonicWALL's Research Team continuously updates and deploys an extensive list of over 5,400 IPS signatures covering 52 attack categories. These signatures take immediate effect and do not require reboots or any other interruption in service. |
Threat Prevention | The ability to inspect both inbound and outbound traffic ensures that the network will not unwittingly be used in Distributed Denial of Service attacks and will prevent any Command and Control Botnet communication. |
IPS Protection | Intrusion prevention can be deployed between internal security zones to protect sensitive servers and to prevent internal attacks. |
VPN |
IPSec VPN | High-performance IPSec VPN allows the firewall to connect remote branch offices to a central location. |
SSL VPN | Utilize clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers, intranet sites and applications from a variety of platforms. |
VPN Gateway | When using multiple WANs, a primary and secondary VPN can be configured to allow seamless automatic failover and failback of all VPN sessions. |
Route-based VPN | The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel failure by seamlessly re-routing traffic between endpoints through alternate routes. |
Clean VPN | SonicWALL Clean VPN™ both secures the integrity of VPN access and decontaminates malicious threats before they can enter the corporate network. |
Gateway Threat Prevention |
Anti-Malware | SonicWALL's patented RFDPI engine scans all ports and protocols for viruses without file size or stream length limitation. SonicLabs Researchers constantly provide updated threat protection, providing faster response times and threat prevention. |
RFDPI | Reassembly-Free Deep Packet Inspection keeps track of malware regardless of the order or inspection timing with which the packets arrive. This allows for extremely low latency while eliminating file and stream size limitations. This provides greater performance and security than outdated proxy designs which reassemble contents using sockets bolted to traditional anti-virus programs and are plagued with inefficiencies and the overhead of memory thrashing leading to high latency, low performance and size limitations. |
Cloud Anti-Virus | Using the built-in RFDI engine, SonicWALL can leverage the power of the cloud to provide the most comprehensive set of anti-malware signatures available, while minimizing latency or delay. The SonicWALL Cloud Anti-Virus Service provides millions of additional malware signatures for inspection of executable files using the most up-to-date information available. |
Inspection | RFDPI can be performed on both inbound and outbound connections to provide protection in all network traffic directions. |
Signature Updates | SonicLabs Research Team team creates and updates signature databases that are propagated automatically to the firewalls in the field, with those signatures taking immediate effect without any reboot or service interruption required. |
Firewall and Networking |
Packet Inspection | All network traffic is inspected, analyzed and brought into compliance with firewall access policies. |
DOS Protection | SYN Flood protection provides defense against DOS attacks using both layer 3 SYN proxy and layer 2 SYN blacklisting technologies. |
Deployment | Can be deployed in traditional NAT and Layer 2 Bridge modes. |
Policy Routing | Create routes based on protocol to direct traffic to a preferred WAN connection with the ability to fail back to a secondary WAN in the event of an outage. |
High Availability | Supports Active/Passive failover to ensure increased reliability by protecting against hardware or software faults. |
Load Balancing | Load balance up to four WAN interfaces using Round Robin, Spillover or Percentage based methods. |
WAN Acceleration | WAN Acceleration decreases latency and increases transfer speeds between remote sites for even higher network efficiency gains. |
VoIP |
Advanced QoS | Guarantee critical communications with 802.1p and DSCP tagging and remapping of VoIP traffic on the network. |
DPI of VoIP Traffic | Predefined signatures detect and block VoIP specific threats. |
Proxy Support | Block spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy. |
Management and Monitoring |
Web GUI | An intuitive web-based interface allows quick and convenient configuration in addition to management through SonicWALL Global Management System (GMS®), or the CLI. |
SNMP | SNMP provides the ability to protectively monitor and respond to threats and alerts. |
Netflow/IPFIX | Export an extended set of data through IPFIX or NetFlow protocols for granular insight into application traffic, bandwidth utilization and security threats in addition to powerful troubleshooting and forensics capabilities. Compatible with SonicWALL Scrutinizer and third-party monitoring and reporting applications. (TZ 215 only) |
Policy Management | With SonicWALL GMS, monitor, configure and report on multiple SonicWALL appliances from a single intuitive interface and customize your security environment to suit your individual policies. |
Application Intelligence and Control |
Application Control | Identify and control applications or individual components of an application based on RFDPI technology instead of relying on well-known ports and protocols. |
Bandwidth Management | Allocate bandwidth to critical applications while throttling unproductive application traffic for an efficient and productive network. |
Application Identification | Create and configure custom application identification based on traffic parameters or on patterns unique to an application in its network communications. |
Application Trafic Analytics | Provides organizations with granular insight into application traffic, bandwidth utilization and security in addition to powerful troubleshooting and forensics capabilities. (TZ 215 only) |
Signature Database | A continuously expanding database of over 3,500 application signatures ensures that administrators are able to control the usage of all the latest applications on their network at a category or individual level. |
Activity Tracking | User identification is seamlessly integrated with Microsoft® Active Directory and other authentication systems enabling tracking and reporting of individual user identification. |
GeoIP Identification | Identify and control network traffic going to or coming from specific countries. (TZ 215 only) |
Reviews
There are no reviews yet