en-US
search-icon

NSv Series

SonicWall Network Security virtual (NSv) firewalls protect all critical components of your private/public cloud environment from resource misuse attacks, cross virtual machine attacks, side channel attacks and common network based exploits and threats. It captures traffic between virtual machines and networks for automated breach prevention and establishes access control measures for data confidentiality and ensures VMs safety and integrity.

Virtual Product Image

SonicWall Network Security virtual (NSv) firewalls protect all critical components of your private/public cloud environment from resource misuse attacks, cross virtual machine attacks, side channel attacks and common network based exploits and threats. It captures traffic between virtual machines and networks for automated breach prevention and establishes access control measures for data confidentiality and ensures VMs safety and integrity.

Legend: S — Standard,  O — Optional,  N — Not Available

_productName NSv 10 NSv 25 NSv 50 NSv 100 NSv 200 NSv 300 NSv 400 NSv 800 NSv 1600
Operating system Firewall General SonicOS SonicOS SonicOS SonicOS SonicOS SonicOS SonicOS SonicOS SonicOS
Max Cores Firewall General 2 2 2 2 2 3 4 8 16
Max Mgmt/DataPlane Cores Firewall General 1/1 1/1 1/1 1/1 1/1 1/2 1/3 1/8 1/15
Min Memory Required Firewall General 4G 4G 4G 4G 4G 4G 6G 8G 10G
Supported IP/Nodes Firewall General 10 25 50 100 Unlimited Unlimited Unlimited Unlimited Unlimited
Storage Firewall General 60 GB 60 GB 60 GB 60 GB 60 GB 60 GB 60 GB 60 GB 60 GB
SSO users Firewall General 25 50 100 100 500 5,000 10,000 15,000 20,000
Logging Firewall General Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog
High availability Firewall General Active/Passive with State Sync Active/Passive with State Sync Active/Passive with State Sync Active/Passive with State Sync Active/Passive with State Sync Active/Passive with State Sync Active/Passive with State Sync Active/Passive with State Sync Active/Passive with State Sync
Max TLS/SSL Connections Firewall Specifications 500 1,000 2,000 4,000 8,000 12,000 20,000 30,000 50,000
Connections per second Firewall Specifications 1,800 5,000 8,000 12,000 15,000 15,000 60,000 130,000 229,000
Maximum connections (SPI) Firewall Specifications 10,000 50,000 125,000 150,000 225,000 1M 1.5M 3M 4M
Maximum connections (DPI) Firewall Specifications 10,000 50,000 100,000 125,000 125,000 500,000 1.25M 2M 2.5M
Site-to-Site VPN Tunnels VPN 10 10 25 50 75 100 6000 10,000 25,000
IPSec VPN clients (max) VPN 10 10 25 25 50(1000) 50(1000) 2000(4000) 2000(6000) 2000(10,000)
SSL VPN NetExtender Clients (Maximum) VPN 2(10) 2(25) 2(25) 2(25) 2(100) 2(100) 2(100) 2(100) 2(100)
Encryption/authentication VPN DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC) DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B, Common Access Card (CAC)
Key exchange VPN Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v Diffie Hellman Groups 1, 2, 5, 14v
Route-based VPN VPN RIP, OSPF, BGP RIP, OSPF, BGP RIP, OSPF, BGP RIP, OSPF, BGP RIP, OSPF, BGP RIP, OSPF, BGP RIP, OSPF, BGP RIP, OSPF, BGP RIP, OSPF, BGP
IP address assignment Networking IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay IP address assignment Static, DHCP, internal DHCP server, DHCP relay
NAT modes Networking NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode NAT modes 1:1, many:1, 1:many, flexible NAT (overlapping IPs), PAT, transparent mode
VLAN Interfaces Networking 25 25 50 50 50 256 500 512 512
Routing protocols Networking BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast
QoS Networking Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p
Authentication Networking XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix
VoIP Networking Full H323-v1-5, SIP Full H323-v1-5, SIP Full H323-v1-5, SIP Full H323-v1-5, SIP Full H323-v1-5, SIP Full H323-v1-5, SIP Full H323-v1-5, SIP Full H323-v1-5, SIP Full H323-v1-5, SIP
Standards Networking TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
Close Overview
PUBLIC AND PRIVATE CLOUD SECURITY Image

PUBLIC AND PRIVATE CLOUD SECURITY

  • Gain complete visibility into intra-host communication between virtual machines for threat prevention
  • Ensure appropriate placement of security policies throughout the virtual environment
  • Deliver safe application enablement rules by the application, user and device regardless of VM location
  • Implement proper security zoning (VLANs) and isolation
VIRTUAL MACHINE PROTECTON Image

VIRTUAL MACHINE PROTECTON

  • Defend against zero-day vulnerabilities with Capture Advanced Threat Protection
  • Prevent unauthorized takeover of virtual systems
  • Stop unauthorized access to protected data assets
  • Block malicious and intrusive actions such as spreading malware, executing operating system commands, file system browsing and C&C communication
  • Reduce service disruption of any part or entire virtual ecosystem