Sonicwall TZ Series Datasheet 68221
Sonicwall TZ Series Datasheet 68221
Sonicwall TZ Series Datasheet 68221
Benefits:
Enterprise grade network protection
that includes anti-malware, intrusion
prevention, application control and
content/URL filtering
Deep packet inspection on all
traffic without restrictions on file
size or protocol, including encrypted
SSL connections
Secure 802.11ac wireless
connectivity using integrated
wireless controller or via external Dell
SonicPoint wireless access points
SSL VPN remote access for Apple
iOS, Google Android, Amazon
Kindle, Windows, Mac OS and
Linux devices
TZ600 series
Firewall throughput
1.5 Gbps
500 Mbps
Anti-malware throughput
500 Mbps
IPS throughput
1.1 Gbps
IMIX throughput
900 Mbps
125,000
New connections/sec
12,000
USB port
Link and
(3G/4G WAN activity
Failover)
Indicator LEDs
TZ500 series
Firewall throughput
1.4 Gbps
400 Mbps
Anti-malware throughput
400 Mbps
IPS throughput
1.0 Gbps
IMIX throughput
700 Mbps
100,000
New connections/sec
8,000
Optional
wireless
USB port
Link and
(3G/4G WAN activity
Failover)
Indicator LEDs
Console
port
6x1GbE switch
(configurable)
X0 LAN Port
X1 WAN Port
Secure
power
TZ400 series
Firewall throughput
1.3 Gbps
300 Mbps
Anti-malware throughput
300 Mbps
IPS throughput
900 Mbps
IMIX throughput
500 Mbps
90,000
New connections/sec
6,000
Optional
wireless
USB port
Link and
(3G/4G WAN activity
Failover)
Indicator LEDs
X0 LAN Port
X1 WAN Port
Secure
power
TZ300 series
Firewall throughput
750 Mbps
100 Mbps
Anti-malware throughput
100 Mbps
IPS throughput
300 Mbps
IMIX throughput
200 Mbps
50,000
New connections/sec
5,000
Optional
wireless
USB port
Link and
(3G/4G WAN activity
Failover)
Indicator LEDs
Console
port
3x1GbE switch
(configurable)
X0 LAN Port
X1 WAN Port
Secure
power
SOHO series
Firewall throughput
300 Mbps
50 Mbps
Anti-malware throughput
50 Mbps
IPS throughput
100 Mbps
IMIX throughput
60 Mbps
10,000
New connections/sec
1,800
Optional
wireless
Link and
activity
Indicator LEDs
USB port
(3G/4G WAN
Failover)
X0 LAN Port
X1 WAN Port
Secure
power
Proxy
Scanning
Packet
disassembly
Traffic in
Traffic out
Inspection time
Less
More
Inspection time
Inspection capacity
Min
Max
Traffic out
Traffic in
Less
Competitive architecture
Inspection capacity
More
Reassembly-free packet
scanning without proxy
or content size limitations
Min
Max
Corporate
headquarters
NSA or SuperMassive
Branch office
TZ300
Branch office
TZ400
Global
Management
System
GMS
Software
or virtual
appliance
Branch office
TZ500
Branch office
TZ600
TZ product line
Internet
Global
Management
System
Corporate
headquarters
Home/work LAN
Internet
TZ product line
3G/analog failover
Sales network
Features
RFDPI engine
Feature
Description
This high-performance, proprietary and patented inspection engine performs stream based bi-directional
traffic analysis, without proxying or buffering, to uncover intrusion attempts, malware and identify application
traffic regardless of port.
Bi-directional inspection
Scans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not used
to distribute malware, and does not become a launch platform for attacks in case an infected machine is
brought inside.
Single-pass inspection
A single-pass DPI architecture simultaneously scans for malware, intrusions and application identification,
drastically reducing DPI latency and ensuring that all threat information is correlated in a single architecture.
Stream-based inspection
Proxy-less and non-buffering inspection technology provides ultra-low latency performance for deep packet
inspection of simultaneous network streams without introducing file and stream size limitations, and can be
applied on common protocols as well as raw TCP streams.
Intrusion prevention
Feature
Description
Countermeasure-based protection
Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan
packet payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.
The Dell SonicWALL Threat Research Team continuously researches and deploys updates to an extensive list
of IPS countermeasures that covers more than 50 attack categories. The new updates take immediate effect
without any reboot or service interruption required.
Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention,
preventing threats from propagating across the zone boundaries.
Identifies and blocks command and control traffic originating from bots on the local network to IPs and
domains that are identified as propagating malware or are known CnC points.
Protocol abuse/anomaly
Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
Zero-day protection
Protects the network against zero-day attacks with constant updates against the latest exploit methods and
techniques that cover thousands of individual exploits.
Anti-evasion technology
Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network
undetected by utilizing evasion techniques in Layers 2-7.
Threat prevention
Feature
Description
Gateway anti-malware
The RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and other
malware in files of unlimited length and size across all ports and TCP streams.
A continuously updated database of over 17 million threat signatures resides in the Dell SonicWALL cloud
servers and is referenced to augment the capabilities of the onboard signature database, providing RFDPI with
extensive coverage of threats.
New threat updates are automatically pushed to firewalls in the field with active security services, and take
effect immediately without reboots or interruptions.
Decrypts and inspects SSL traffic on the fly, without proxying, for malware, intrusions and data leakage, and
applies application, URL and content control policies in order to protect against threats hidden in SSL encrypted
traffic Included with security subscriptions for all models except SOHO. Sold as a separate license on SOHO.
The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that
they to sneak by outdated security systems that focus on securing a few well-known ports.
Identifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw
TCP, and decodes payloads for malware inspection, even if they do not run on standard, well-known ports.
Description
Application control
Control applications, or individual application features, that are identified by the RFDPI engine against a
continuously expanding database of over 3,500 application signatures, to increase network security and
enhance network productivity.
Control custom applications by creating signatures based on specific parameters or patterns unique to an
application in its network communications, in order to gain further control over the network.
Granularly allocate and regulate available bandwidth for critical applications or application categories while
inhibiting nonessential application traffic.
Granular control
Control applications, or specific components of an application, based on schedules, user groups, exclusion
lists and a range of actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix
integration.
Content filtering
Feature
Description
Enforce acceptable use policies and block access to websites containing information or images that are
objectionable or unproductive with Content Filtering Service. Extend policy enforcement to block internet
content for devices located outside the firewall perimeter with the Content Filtering Client.
Features
Content filtering
Feature
Description
Granular controls
Block content using the predefined categories or any combination of categories. Filtering can be scheduled by
time of day, such as during school or business hours, and applied to individual users or groups.
Enable teachers to choose from hundreds of thousands of free educational videos from YouTube EDU that are
organized by subject and grade and align with common educational standards.
Web caching
URL ratings are cached locally on the Dell SonicWALL firewall so that the response time for subsequent access
to frequently visited sites is only a fraction of a second.
Description
Multi-layered protection
Utilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint protection to
block, viruses entering network through laptops, thumb drives and other unprotected systems.
Ensure every computer accessing the network has the most recent version of anti-virus and anti-spyware
signatures installed and active, eliminating the costs commonly associated with desktop anti-virus and antispyware management.
Machine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across
the network, minimizing administrative overhead.
Frequent anti-virus and anti-spyware updates are delivered transparently to all desktops and file servers to
improve end user productivity and decrease security management.
Spyware protection
Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on
desktops and laptops before they transmit confidential data, providing greater desktop security and performance.
Description
All network traffic is inspected, analyzed and brought into compliance with firewall access policies.
SYN Flood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN
blacklisting technologies. Additionally, it provides the ability to protect against DOS/DDoS through UDP/ICMP
flood protection and connection rate limiting.
The SonicWALL TZ Series can be deployed in traditional NAT, Layer 2 Bridge, Wire Mode and Network Tap modes.
IPv6 support
Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With the latest SonicOS, the hardware will
support filtering implementations.
High availability
SonicWALL TZ500 and SonicWALL TZ600 models support high availability with Active/Standby with
state synchronization. SonicWALL TZ300 and SonicWALL TZ400 models support high availability without
Active/Standby synchronization. There is no high availability on SonicWALL SOHO models.
IEEE 802.11ac wireless technology can deliver up to 1.3 Gbps of wireless throughput with greater range and
reliability. Available on SonicWALL TZ600 through SonicWALL TZ300 models. Optional 802.11 a/b/g/n is
available on SonicWALL SOHO models.
Description
Dell SonicWALL GMS monitors, configures and reports on multiple Dell SonicWALL appliances through a single
management console with an intuitive interface to reduce management costs and complexity.
An intuitive, web-based interface allows quick and convenient configuration. Also, a comprehensive
command line interface and support for SNMPv2/3.
Exports application traffic analytics and usage data through IPFIX or NetFlow protocols for real-time and
historical monitoring and reporting with tools such as Dell SonicWALL Scrutinizer or other tools that support
IPFIX and NetFlow with extensions.
Description
High-performance IPSec VPN allows the SonicWALL TZ Series to act as a VPN concentrator for thousands of
other large sites, branch offices or home offices.
Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files,
computers, intranet sites and applications from a variety of platforms.
When using multiple WANs, a primary and secondary VPN can be configured to allow seamless automatic
failover and failback of all VPN sessions.
Route-based VPN
The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary
VPN tunnel failure, by seamlessly re-routing traffic between endpoints through alternate routes.
Content/context awareness
Feature
Description
User identification and activity are made available through seamless AD/LDAP/Citrix1/TerminalServices SSO
integration combined with extensive information obtained through DPI.
Identifies and controls network traffic going to or coming from specific countries to either protect against attacks
from known or suspected origins of threat activity, or to investigate suspicious traffic originating from the network.
Prevents data leakage by identifying and controlling content crossing the network through regular
expression matching.
VoIP
Intrusion prevention
Signature-based scanning
Automatic signature updates
Bidirectional inspection engine
Granular IPS rule capability
GeoIP and reputation-based filtering
Regular expression matching
Anti-malware
Application control
Application control
Application component blocking
Application bandwidth management
Custom application signature creation
Data leakage prevention
Application reporting over NetFlow/IPFIX
User activity tracking (SSO)
Comprehensive application signature
database
URL filtering
Anti-proxy technology
Keyword blocking
Bandwidth manage CFS rating categories
Unified policy model with app control
57 content filtering categories
Content Filtering Service Client
VPN
Networking
PortShield
Layer-2 network discovery
IPv6
Enhanced logging
Port mirroring
Layer-2 QoS
Port Security
Dynamic routing
Policy-based routing
Asymmetric routing
DHCP server
Bandwidth management
Active/Standby high availability with state
sync*
Inbound/outbound load balancing
L2 bridge, NAT mode DDNS
3G/4G WAN failover
* State sync high availability only on SonicWALL TZ500 and SonicWALL TZ600 models
Web GUI
Command line interface (CLI)
SNMPv2/v3
Off-box reporting (Scrutinizer)
Centralized management and reporting
Logging
Netflow/IPFix exporting
App traffic visualization
Centralized policy management
Single Sign-On (SSO)
Terminal service/Citrix support
Application and bandwidth visualization
IPv4 and IPv6 management
IPv6
IPv6 filtering
6rd (rapid deployment)
DHCP prefix delegation
BGP
Wireless
SOHO series
Operating system
SonicOS 5.9x /
6.2.x
Security processor
2 x 400 MHz /
2 x 800 MHz
TZ300 series
TZ400 series
TZ500 series
TZ600 series
SonicOS 6.2.x
2 x 800 MHz
4 x 800 MHz
4 x 1 GHz
4 x 1.4 GHz
Memory (RAM)
512 MB / 1GB
1 GB
1 GB
1 GB
1 GB
Memory (flash)
32 MB / 64 MB
64 MB
64 MB
64 MB
64 MB
10
USB
USB
USB
2 USB
Expansion Slot
(Rear)*, 2 USB
300 Mbps
750 Mbps
1,300 Mbps
1,400 Mbps
1,500 Mbps
50 Mbps
100 Mbps
300 Mbps
400 Mbps
500 Mbps
300 Mbps
900 Mbps
1,000 Mbps
1,100 Mbps
IPS throughput2
100 Mbps
300 Mbps
900 Mbps
1,000 Mbps
1,100 Mbps
50 Mbps
100 Mbps
300 Mbps
400 Mbps
500 Mbps
IMIX throughput3
60 Mbps
200 Mbps
500 Mbps
700 Mbps
900 Mbps
Expansion
Firewall inspection throughput1
Full DPI throughput2
Application inspection throughput2
15 Mbps
45 Mbps
100 Mbps
150 Mbps
200 Mbps
100 Mbps
300 Mbps
900 Mbps
1,000 Mbps
1,100 Mbps
1,800
5,000
6,000
8,000
12,000
10,000
50,000
100,000
125,000
150,000
10,000
50,000
90,000
100,000
125,000
250
500
500
500
500
VLAN interfaces
25
25
50
50
50
16
16
24
SOHO series
TZ300 series
TZ400 series
TZ500 series
TZ600 series
VPN
Site-to-site VPN tunnels
10
10
20
25
50
1 (5)
1 (10)
2 (25)
2 (25)
2 (25)
1 (10)
1 (50)
2 (100)
2 (150)
2 (200)
1 (30-day trial)
1 (30-day trial)
1 (30-day trial)
1 (30-day trial)
DES, 3DES, AES (128, 192, 256-bit), MD5, SHA-1, Suite B Cryptography
Key exchange
Route-based VPN
RIP, OSPF
Certificate support
Verisign, Thawte, Cybertrust, RSA Keon, Entrust and Microsoft CA for Dell SonicWALL-to-Dell SonicWALL VPN, SCEP
VPN features
Dead Peer Detection, DHCP Over VPN, IPSec NAT Traversal, Redundant VPN Gateway, Route-based VPN
Microsoft Windows Vista 32/64-bit, Windows 7 32/64-bit, Windows 8.0 32/64-bit, Windows 8.1 32/64-bit
NetExtender
Microsoft Windows Vista 32/64-bit, Windows 7, Windows 8.0 32/64-bit, Windows 8.1 32/64-bit, Mac OS X
10.4+, Linux FC3+/Ubuntu 7+/OpenSUSE
Apple iOS, Mac OS X, Google Android, Kindle Fire, Windows 8.1 (Embedded)
Mobile Connect
Security services
SOHO series
TZ300 series
TZ400 series
TZ500 series
TZ600 series
McAfee
Supported
Application Visualization
No
Yes
Yes
Yes
Yes
Application Control
Yes
Yes
Yes
Yes
Yes
10
SOHO series
IP address assignment
NAT modes
Authentication
TZ400 series
250
VoIP
Certifications
Certifications pending
Hardware
Supported
No
Active/standby
Active/standby
Active/standby
with stateful
synchronization
Active/standby
with stateful
synchronization
SOHO series
TZ300 series
TZ400 series
TZ500 series
TZ600 series
Form factor
Power supply (W)
Maximum power consumption (W)
TZ600 series
Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1e (WMM)
TZ500 series
1:1, 1:many, many:1, many:many, flexible NAT (overlapping IPs), PAT, transparent mode
Routing protocols
QoS
TZ300 series
Static, (DHCP, PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP relay
Desktop
24W external
24W external
24W external
36W external
60W external
6.4 / 11.3
6.9 / 12.0
9.2 / 13.8
13.4 / 17.7
16.1
Input power
55.1 BTU
Dimensions
3.6x14.1x19cm
3.5x13.4x19cm
3.5x13.4x19cm
3.5x15x22.5cm
3.5x18x28cm
Weight
WEEE weight
Shipping weight
30/15
28/14
27/13
20/12
18
TZ600 series
MTBF (years)
Environment
40-105 F, 0-40 C
Humidity
Regulatory
Regulatory model (wired)
Major regulatory compliance (wired models)
11
5-95% non-condensing
SOHO series
TZ300 series
TZ400 series
TZ500 series
APL31-0B9
APL28-0B4
APL28-0B4
APL29-0B6
APL30-0B8
APL41-0BA
APL28-0B5
APL28-0B5
APL29-0B7
Operating Channels
SOHO series
TZ600 series
802.11 ac/a/b/g/n
Supported
Supported
802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps per channel; 802.11b:
1, 2, 5.5, 11 Mbps per channel; 802.11g: 6, 9, 12, 18, 24, 36, 48,
54 Mbps per channel; 802.11n: 7.2, 14.4, 21.7, 28.9, 43.3, 57.8,
65, 72.2, 15,30, 45, 60, 90, 120, 135, 150 Mbps per channel;
802.11ac: 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 86.7, 96.3, 15,
30, 45, 60, 90, 120, 135, 150, 180, 200, 32.5, 65, 97.5, 130, 195,
260, 292.5, 325, 390, 433.3, 65, 130, 195, 260, 390, 520, 585,
650, 780, 866.7 Mbps per channel
Modulation technology
spectrum
*Future use.
1
Testing Methodologies: Maximum performance based on RFC 2544 (for firewall). Actual performance may vary depending on network conditions and activated services.
2
Full DPI/GatewayAV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools. Testing done
with multiple flows through multiple port pairs.
3
VPN throughput measured using UDP traffic at 1280 byte packet size adhering to RFC 2544. All specifications, features and availability are subject to change.
4
Available only on SonicWALL TZ300, TZ400, TZ500 and TZ600
12
SKU
01-SSC-0651
01-SSC-0653
01-SSC-0581
01-SSC-0583
01-SSC-0514
01-SSC-0516
01-SSC-0445
01-SSC-0446
01-SSC-0219
01-SSC-0439
01-SSC-0220
Services
SKU
01-SSC-0688
01-SSC-0670
01-SSC-0676
01-SSC-0682
01-SSC-0700
01-SSC-0638
01-SSC-0602
01-SSC-0608
01-SSC-0632
01-SSC-0620
01-SSC-0567
01-SSC-0534
01-SSC-0540
01-SSC-0561
01-SSC-0552
01-SSC-0488
01-SSC-0458
01-SSC-0464
01-SSC-0482
01-SSC-0476
01-SSC-0258
01-SSC-0228
01-SSC-0234
01-SSC-0252
01-SSC-0246
Dell Software
5 Polaris Way, Aliso Viejo, CA 92656 | www.dell.com
If you are located outside North America, you can find local
office information on our Web site.
2015 Dell, Inc. ALL RIGHTS RESERVED. Dell, Dell Software, the Dell Software logo and productsas
identified in this documentare registered trademarks of Dell, Inc. in the U.S.A. and/or other countries.
All other trademarks and registered trademarks are property of their respective owners.
Datasheet-SonicWALL-TZ Series-US-KS-26675