en-MX
search-icon

SuperMassive Series

Designed with leading-edge threat inspection technology and hardware processing power, SonicWall SuperMassive high end firewalls support today’s largest, most complex and demanding security use cases. With comprehensive security services including sandboxing, SSL inspection, intrusion prevention, anti-malware, application identification and content filtering, SuperMassive is the ideal next-generation high end firewall for securing large distributed enterprises and data centers.
High End Product Image

Get uncompromising security, performance, speed, and visibility.

Designed with leading-edge threat inspection technology and hardware processing power, SonicWall SuperMassive high end firewalls support today’s largest, most complex and demanding security use cases. With comprehensive security services including sandboxing, SSL inspection, intrusion prevention, anti-malware, application identification and content filtering, SuperMassive is the ideal next-generation high end firewall for securing large distributed enterprises and data centers.

Legend: S — Standard,  O — Optional,  N — Not Available

_productName 9800 9600 9400 9200
Deep Packet Inspection Firewall TotalSecure Firewall Overview S S S S
Stateful Packet Inspection Firewall Firewall Overview S S S S
Unlimited file size protection Firewall Overview S S S S
Protocols scanned Firewall Overview S S S S
Application Intelligence and Control Security Services Included S S S S
Intrusion Prevention Service Security Services Included S S S S
Gateway Anti-Virus and Anti-Spyware2 Threat Prevention Services Available S S S S
Enforced Client Anti-Virus and Anti-Spyware (McAfee® or Kaspersky®) Security Services Included O O O O
Content & URL Filtering (CFS)2 Threat Prevention Services Available S S S S
Content Filtering Client (CFC) Security Services Included O O O O
Analyzer Reporting Threat Prevention Services Available O O O O
SSL Inspection (DPI SSL)2 Threat Prevention Services Available S S S S
24x7 support Threat Prevention Services Available S S S S
Capture Advance Threat Protection Security Services Included O O O O
Interfaces Firewall general 4x10GbE SFP+, 12x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 4x10GbE SFP+, 8x1GbE SFP, 1GbE Management, 1 Console
Management Firewall general CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS
Nodes Supported Firewall general Unrestricted Unrestricted
RAM Firewall general 64 GB 32 GB 16 GB 8 GB
Storage Firewall general
Visual information display (LCD Display) Firewall general S S S S
Site-to-site VPN tunnels Firewall general 25000 10000 10000 10000
Global VPN clients (Maximum) Firewall general 2000(10000) 2000(10000) 2000(6000) 2000(4000)
SSL VPN NetExtender clients (Maximum) Firewall general 2 (3000) 2 (3000) 2 (3000) 2 (3000)
Unique malware threats blocked Firewall general
VLAN interfaces Firewall general
SonicPoints Wireless Controller Firewall general N S S S
WWAN Failover (4G/LTE) Firewall general N N N N
Network Switch Management Firewall general N S S S
Firewall inspection throughput Firewall/VPN performance 40 Gbps 20 Gbps 20 Gbps 15 Gbps
IPS throughput Firewall/VPN performance 24 Gbps 11.5 Gbps 10 Gbps 5 Gbps
Anti-Malware inspection throughput Firewall/VPN performance 10 Gbps 5.0 Gbps 4.5 Gbps 3.5 Gbps
VPN throughput Firewall/VPN performance 18 Gbps 11.5 Gbps 10 Gbps 5 Gbps
Application inspection throughput Firewall/VPN performance 20.0 Gbps 11.5 Gbps 10.0 Gbps 5.0 Gbps
Maximum connections3 Firewall/VPN performance 3.0M 1.5M 1.25M 1.25M
Maximum DPI connections Firewall/VPN performance 2.5M 1.25M 1.0M 1.0M
New connections/sec Firewall/VPN performance 280000 130000 130000 100000
IMIX performance Firewall/VPN performance 9 Gbps 5.5 Gbps 5.5 Gbps 4.4 Gbps
Latency Firewall/VPN performance 18 μs 14 μs 14 μs 16 μs
SSL DPI Performance Firewall/VPN performance 48000 12000 10000 8000
Logging Features Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog
Network traffic visualization Features S S S S
Netflow/IPFIX reporting Features S S S S
SNMP Features S S S S
Logging Features Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog
Authentication Features XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database
Authentication Features XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database
Dynamic routing Features BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP
Dynamic Routing Features BGP, OSPF, RIP BGP, OSPF, RIP
Single Sign-on (SSO) Features S S S S
Voice over IP (VoIP) security Features S S S S
Interface to interface scanning Features S S S S
PortShield security Features S S S S
Port aggregation Features S S S S
Link redundancy Features S S S S
Policy-based routing Features S S S S
Route-based VPN Features S S S S
Dynamic bandwidth management Features S S S S
Stateful high availability Features S S S S
Multi-WAN Features S S S S
Load balancing Features S S S S
Object-based management Features S S S S
Policy-based NAT Features S S S S
Inbound load balancing Features S S S S
IKEv2 VPN Features S S S S
Active/active cluster Features S S S S
Terminal services Authentication/Citrix support Features N S S S
Onboard Quality of Service (QoS) Features
TLS/SL/SSH decryption and inspection Features S S S S
SSL control Features S S S S
Easy VPN Features S S S S
IPv6 Features
DNS Proxy Features S S S S
Hardware Failover Failover Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync
Biometric Authentication Features S S S S
Hardware Failover Failover Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync
Multi-WAN Failover Failover S S S S
Automated Failover/Failback Failover S S S S
Close Overview
High-Performance Network Security Image

High-Performance Network Security

  • Protect against advanced threats and exploits in real-time
  • Block evasive intrusions and attacks hiding in encrypted traffic
  • Monitor and control of application traffic
  • Centralize security management, analytics and reporting
  • Thwart command and control communications and data exfiltration
Scale your security for data center modernization Image

Scale your security for data center modernization

Scale your security for data center modernization To enable the growing digital business, expectations for IT organizations to lead and deliver value, responsiveness and security has reached an all-time high. Innovative services plus increased data and capacity requirements compel IT leaders to address new operational challenges through data center modernization. SonicWall provides a network-based model for scaling network security to solve complex and demanding data center operations - all at a low cost.

Get our White Paper on our massively scalable approach to network security >
Stop advanced threats with network security segments Image

Stop advanced threats with network security segments

Modern threats take advantage of all areas of your network to succeed. In order to stop advanced attacks, networks need to be divided into security segments to contain and mitigate threat propagation. However, defining logical segments is only part of the solution. Effective segmentation requires an integrated, dynamic network security approach to comprehensively enforce the integrity of each and every segment, and do so manageably and affordably.

Get a Solutions Brief on zone-based approach to network security >