en-US
search-icon

SuperMassive Series

Designed with leading-edge threat inspection technology and hardware processing power, SonicWall SuperMassive high end firewalls support today’s largest, most complex and demanding security use cases. With comprehensive security services including sandboxing, SSL inspection, intrusion prevention, anti-malware, application identification and content filtering, SuperMassive is the ideal next-generation high end firewall for securing large distributed enterprises and data centers.
High End Product Image

Get uncompromising security, performance, speed, and visibility.

Designed with leading-edge threat inspection technology and hardware processing power, SonicWall SuperMassive high end firewalls support today’s largest, most complex and demanding security use cases. With comprehensive security services including sandboxing, SSL inspection, intrusion prevention, anti-malware, application identification and content filtering, SuperMassive is the ideal next-generation high end firewall for securing large distributed enterprises and data centers.

Legend: S — Standard,  O — Optional,  N — Not Available

_productName 9800 9600 9400 9200
Deep Packet Inspection Firewall TotalSecure Firewall Overview S S S S
Stateful Packet Inspection Firewall TotalSecure Firewall Overview S S S S
Unlimited File Size Protection TotalSecure Firewall Overview S S S S
Protocols Scanned TotalSecure Firewall Overview S S S S
Application Intelligence and Control Total Secure Threat Prevention Services S S S S
Intrusion Prevention Service Total Secure Threat Prevention Services S S S S
Gateway Anti-Virus and Anti-Spyware Total Secure Threat Prevention Services S S S S
Content & URL Filtering (CFS) Total Secure Threat Prevention Services S S S S
SSL Inspection (DPI SSL) Total Secure Threat Prevention Services S S S S
Content Filtering Client (CFC)1 Total Secure Threat Prevention Services O O O O
Analyzer Reporting1 Total Secure Threat Prevention Services O O O O
Capture Advance Threat Protection1 Total Secure Threat Prevention Services O O O O
Enforced Client Anti-Virus and Anti-Spyware (McAfee® or Kaspersky®) Total Secure Threat Prevention Services O O O O
24x7 support Total Secure Threat Prevention Services S S S S
Interfaces Firewall General 4x10GbE SFP+, 12x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console
Management Firewall General CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS
Nodes Supported Firewall General Unrestricted Unrestricted Unrestricted Unrestricted
RAM Firewall General 64 GB 32 GB 16 GB 8 GB
Visual Information Display (LCD Display) Firewall General S S S S
Site-to-Site VPN Tunnels Firewall General 25000 10000 10000 10000
Global VPN Clients (Maximum) Firewall General 2000(10000) 2000(10000) 2000(6000) 2000(4000)
SSL VPN NetExtender Clients (Maximum) Firewall General 2 (3000) 2 (3000) 2 (3000) 2 (3000)
VLAN Interfaces Firewall General 512 512 512 512
SonicPoint Wireless Controller Firewall General N S S S
WWAN Failover (4G/LTE) Firewall General N N N N
Network Switch Management Firewall General N S S S
Firewall Inspection Throughput2 Firewall/VPN Performance 28 Gbps 20 Gbps 20 Gbps 15 Gbps
Full DPI Performance (GAV/GAS/IPS) Firewall/VPN Performance 9 Gbps 4.5 Gbps 4.4 Gbps 3 Gbps
Application Inspection Throughput Firewall/VPN Performance 20 Gbps 11.5 Gbps 10 Gbps 5 Gbps
IPS Throughput Firewall/VPN Performance 18 Gbps 11.5 Gbps 10 Gbps 5 Gbps
Anti-Malware Inspection Throughput Firewall/VPN Performance 9 Gbps 5 Gbps 4.5 Gbps 3.5 Gbps
IMIX Performance Firewall/VPN Performance 6 Gbps 5.5 Gbps 5.5 Gbps 4.4 Gbps
DPI SSL Performance Firewall/VPN Performance 3 Gbps 2 Gbps 2 Gbps 1 Gbps
VPN Throughput4 Firewall/VPN Performance 14 Gbps 11.5 Gbps 10 Gbps 5 Gbps
Latency Firewall/VPN Performance 18 μs 14 μs 14 μs 16 μs
Maximum Connections5 Firewall/VPN Performance 3.0M 10.0 M 7.5 M 5.0 M
Maximum DPI Connections Firewall/VPN Performance 2.5M 2.0 M 1.5 M 1.5 M
DPI SSL Performance (Maximum)6 Firewall/VPN Performance 48,000 12,000 (22,5006) 10,000 (17,5006) 8,000 (15,5006)
New Connections/Sec Firewall/VPN Performance 226,000 130,000 130,000 10,000
Logging Features Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog
Network Traffic Visualization Features S S S S
Netflow/IPFIX Reporting Features S S S S
SNMP Features S S S S
Authentication Features XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database
Dynamic Routing Features BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP
Single Sign-on (SSO) Features S S S S
Voice over IP (VoIP) Security Features S S S S
Interface to Interface Scanning Features S S S S
PortShield Security Features S S S S
Port Aggregation Features S S S S
Link Redundancy Features S S S S
Policy-based Routing Features S S S S
Route-based VPN Features S S S S
Dynamic Bandwidth Management Features S S S S
Stateful High Availability Features S S S S
Multi-WAN Features S S S S
Load Balancing Features S S S S
Object-Based Management Features S S S S
Policy-based NAT Features S S S S
Inbound Load Balancing Features S S S S
IKEv2 VPN Features S S S S
Active/Active Cluster Features S S S S
Terminal Services Authentication/Citrix Support Features N S S S
TLS/SSL/SSH Decryption and Inspection Features S S S S
SSL Control for IPv6 Features S S S S
Easy VPN Features S S S S
Biometric Authentication Features S S S S
DNS Proxy Features S S S S
High Availability Failover Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync
Multi-WAN Failover Failover S S S S
Automated Failover/Failback Failover S S S S
  1. Services must be purchased separately.
  2. Testing Methodologies: Maximum performance based on RFC 2544 (for firewall). Actual performance may vary depending on network conditions and activated services.
  3. Full DPI/Gateway AV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools. Testing done with multiple flows through multiple port pairs.
  4. VPN throughput measured using UDP traffic at 1280 byte packet size adhering to RFC 2544.
  5. Actual maximum connection counts are lower when services are enabled.
  6. For every 125,000 DPI connections reduced, the number of available DPI SSL connections increases by 750.
Close Overview
High-Performance Network Security Image

High-Performance Network Security

  • Protect against advanced threats and exploits in real-time
  • Block evasive intrusions and attacks hiding in encrypted traffic
  • Monitor and control of application traffic
  • Centralize security management, analytics and reporting
  • Thwart command and control communications and data exfiltration
Scale your security for data center modernization Image

Scale your security for data center modernization

Scale your security for data center modernization To enable the growing digital business, expectations for IT organizations to lead and deliver value, responsiveness and security has reached an all-time high. Innovative services plus increased data and capacity requirements compel IT leaders to address new operational challenges through data center modernization. SonicWall provides a network-based model for scaling network security to solve complex and demanding data center operations - all at a low cost.

Get our White Paper on our massively scalable approach to network security >
Stop advanced threats with network security segments Image

Stop advanced threats with network security segments

Modern threats take advantage of all areas of your network to succeed. In order to stop advanced attacks, networks need to be divided into security segments to contain and mitigate threat propagation. However, defining logical segments is only part of the solution. Effective segmentation requires an integrated, dynamic network security approach to comprehensively enforce the integrity of each and every segment, and do so manageably and affordably.

Get a Solutions Brief on zone-based approach to network security >