Overview
Features
Services
Comparison

SonicWall NSA Series
View a comparison matrix that compares the various models
of the NSA Series.
View Matrix
NSA 250M/W | NSA 2600 | NSA 3600 | NSA 4600 | NSA 5600 | NSA 6600 | ||
|---|---|---|---|---|---|---|---|
| Overview | |||||||
| Operating system | SonicOS 5.9 | SonicOS 6.2 | SonicOS 6.2 | SonicOS 6.2 | SonicOS 6.2 | SonicOS 6.2 | |
| Security Processor | 2x 700 MHz | 4x 800 MHz | 6x 800 MHz | 8x 1.1 GHz | 10x 1.3 GHz | 24x 1.0 GHz | |
| Memory(RAM) | 512 MB | 2 GB | 2 GB | 2 GB | 4 GB | 4 GB | |
| 10 GbE SFP+ interfaces | - | - | 2 | 2 | 2 | 4 | |
| 1 GbE SFP interfaces | - | - | 4 | 4 | 4 | 8 | |
| 1 GbE Copper interfaces | 5 | 8 | 12 | 12 | 12 | 8 | |
| 1GbE Copper Management interfaces | - | 1 | 1 | 1 | 1 | 1 | |
| Expansion | Expansion Slot (Rear), SD Card, USB | Expansion Slot (Front), SD Card, USB | Expansion Slot (Rear), SD Card, USB | Expansion Slot (Rear), SD Card, USB | Expansion Slot (Rear), SD Card, USB | Expansion Slot (Rear), SD Card, USB | |
| Firewall inspection throughput1 | 750 Mbps | 1.9 Gbps | 3.4 Gbps | 6.0 Gbps | 9.0 Gbps | 12.0 Gbps | |
| Full DPI throughput2 | 130 Mbps | 300 Mbps | 500 Mbps | 800 Mbps | 1.6 Gbps | 3.0 Gbps | |
| Application inspection throughput2 | 250 Mbps | 700 Mbps | 1.1 Gbps | 2.0 Gbps | 3.0 Gbps | 4.5 Gbps | |
| IPS throughput2 | 250 Mbps | 700 Mbps | 1.1 Gbps | 2.0 Gbps | 3.0 Gbps | 4.5 Gbps | |
| Anti-malware inspection throughput2 | 140 Mbps | 400 Mbps | 600 Mbps | 1.1 Gbps | 1.7 Gbps | 3.0 Gbps | |
| IMIX throughput3 | 210 Mbps | 600 Mbps | 900 Mbps | 1.6 Gbps | 2.4 Gbps | 3.5 Gbps | |
| SSL Inspection and Decryption (DPI SSL)2 | Available | 200 Mbps | 300 Mbps | 500 Mbps | 800 Mbps | 1.3 Gbps | |
| VPN throughput3 | 200 Mbps | 1.1 Gbps | 1.5 Gbps | 3.0 Gbps | 4.5 Gbps | 5.0 Gbps | |
| Connections per second | 3,000/sec | 15,000/sec | 20,000/sec | 40,000/sec | 60,000/sec | 90,000/sec | |
| Maximum connections (SPI) | 110,000 | 225,000 | 325,000 | 400,000 | 562,500 | 750,000 | |
| Maximum connections (DPI) | 64,000 | 125,000 | 175,000 | 200,000 | 375,000 | 500,000 | |
| Single Sign On(SSO) Users | 250 | 30,000 | 40,000 | 50,000 | 60,000 | 70,000 | |
| VLAN interfaces | 35 | 256 | 256 | 256 | 400 | 500 | |
| SonicPoints supported (Maximum) | 16 | 32 | 48 | 64 | 96 | 128 | |
| NSA 250M/W | NSA 2600 | NSA 3600 | NSA 4600 | NSA 5600 | NSA 6600 | ||
| VPN | |||||||
| Site-to-Site VPN Tunnels | 50 | 75 | 800 | 1500 | 4000 | 6000 | |
| IPSec VPN clients(Maximum) | 2(25) | 10 (250) | 50 (1,000) | 500 (3,000) | 2,000 (4,000) | 2,000 (6,000) | |
| SSL VPN licenses(Maximum) | 2(15) | 2 (250) | 2 (350) | 2 (500) | 2 (1000) | 2 (1500) | |
| Encryption/Authentication | DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1 | ||||||
| Key exchange | Diffie Hellman Groups 1, 2, 5, 14 | ||||||
| Route-based VPN | RIP, OSPF | ||||||
| NSA 250M/W | NSA 2600 | NSA 3600 | NSA 4600 | NSA 5600 | NSA 6600 | ||
| Networking | |||||||
| IP address assignment | Static,(DHCP PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP Relay | ||||||
| NAT modes | 1:1, many:1, 1:many, flexible NAT (overlapping IPS), PAT, transparent mode | ||||||
| Routing protocols | BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast | ||||||
| QoS | Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1p | ||||||
| Authentication | XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix | ||||||
| VoIP | Full H323-v1-5, SIP | ||||||
| Standards | TCP/IP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3 | ||||||
| Certifications | VPNC, ICSA Firewall, ICSA Anti-Virus, FIPS 140-2, Common Criteria EAL 1+ | VPNC, ICSA Firewall, ICSA Anti-Virus, FIPS 140-2, Common Criteria EAL 1+, UC APL | |||||
| Common Access Card (CAC) | SonicOS 5.9 | Pending | Pending | Pending | Pending | Pending | |
| NSA 250M/W | NSA 2600 | NSA 3600 | NSA 4600 | NSA 5600 | NSA 6600 | ||
| Hardware | |||||||
| Form factor | Desktop (1U Rack Mountable Kit Available) | 1U Rack Mountable | |||||
| Fans | 2 Internal fans | Dual, Fixed | Dual, Fixed | Dual, Fixed | Dual, Fixed | Dual, redundant, hot swappable | |
| Power Supply(W) | 36 | 200 | 250 | 250 | 250 | 250 | |
| Maximum power consumption (W) | 12 / 16 | 49.4 | 74.3 | 86.7 | 90.9 | 113.1 | |
| Input power | 100-240 VAC, 60-50 Hz | 100-240 VAC, 60-50 Hz | 100-240 VAC, 60-50 Hz | 100-240 VAC, 60-50 Hz | 100-240 VAC, 60-50 Hz | 100-240 VAC, 60-50 Hz | |
| Dimensions | 1.4 x 7.1 x 10.7 (3.5 x 18 x 27cm) | 1.75x10.25x17 in (4.5x26x43 cm) | 1.75 x 19.1 x 17 in (4.5 x 48.5 x 43.3 cm) | ||||
| Weight | 3.05 lbs/1.38 kg/3.15 lbs/1.43 kg | 10.1 lb / 4.6 kg | 13.56 lb/6.15 Kg | 14.93 lb/6.77 Kg | |||
| WEEE weight | 4.4 lbs/2.0kg/4.65 lbs/2.11 kg | 11.0 lb/5.0 kg | 14.24 lb/6.46 Kg | 19.78 lb/8.97 Kg | |||
| Shipping weight | 5.6 lbs/5.9 lbs | 14.3 lb/6.5 kg | 20.79lb/9.43 Kg | 26.12 lb/11.85 Kg | |||
| MTBF (Years) | 23.4/14.1 | 20.2 | 16.8 | 16 | 15.4 | 13.3 | |
| Environment | 40-105 F, 0 - 40 C | 32-105 F, 0-40 deg C | |||||
| Humidity | 5 - 95% non-condensing | 10-90% non-condensing | |||||
| NSA 250M/W | NSA 2600 | NSA 3600 | NSA 4600 | NSA 5600 | NSA 6600 | ||
| Regulatory | |||||||
| NSA 250M | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, CU | ||||||
| NSA 250MW | FCC Class A, FCC Cert, ICES Class A, IC Cert, CE (EMC, LVD, RoHS, R&TTE), C-Tick, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, NCC Taiwan | ||||||
| NSA 2400 | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, CU | ||||||
| NSA 2600 | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, CU | ||||||
| NSA 3600 | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, CU | ||||||
| NSA 4600 | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, CU | ||||||
| NSA 5600 | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, CU | ||||||
| NSA 6600 | FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, MSIP/KCC Class A, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL, BSMI, CU | ||||||
| NSA 250M/W | NSA 2600 | NSA 3600 | NSA 4600 | NSA 5600 | NSA 6600 | ||
| Integrated Wireless | |||||||
| Standards | 802.11a/b/g/n(WEP, WPA, WPA2, 802.11i, TKIP, PSK,02.1x, EAP-PEAP, EAP-TTLS | ||||||
| Virtual access points (VAPs)5 antennas (5 dBi Diversity) | External triple, detachable | ||||||
| Radio power-802.11a/802.11b/802.11g | 15.5 dBm max/18 dBm max/17 dBM @ 6 Mbps, 13 dBM @ 54 Mbps | ||||||
| Radio power-802.11n (2.4GHz)/802.11n (5.0GHz) | 19 dBm MCS 0, 11 dBm MCS 15/17 dBm MCS 0, 12 dBm MCS 15 | ||||||
| Radio receive sensitivity-802.11a/802.11b/802.11g | -95 dBm MCS 0, -81 dBm MCS 15/-90 dBm @ 11Mbps/-91 dBm @ 6Mbps, -74 dBm @ 54 Mbps | ||||||
| Radio receive sensitivity-802.11n(2.4GHz)/802.11n(5.0GHz) | -89 dBm MCS 0, -70 dBm MCS 15/-95 dBm MCS 0, -76 dBm MCS 15 | ||||||
1 Testing Methodologies: Maximum performance based on RFC 2544(for firewall). Actual performance may vary depending on network conditions and activated services.
2 Full DPI/GatewayAV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test and Ixia test tools. Testing done with multiple flows through multiple port pairs.
3 VPN throughput measured using UDP traffic at 1280 byte packet size adhering to RFC 2544. All specifications, features and availability are subject to change.
*Future use.
Videos


First Source secures infrastructure with a Dell SonicWALL Next-Gen Firewall


Keeping Children Safe in Education – what the new DfE guidance means from an ICT perspective


IDC’s Sean Pike on Sandbox Security; Nothing to Play Around With



Becoming your own Department of Yes for securing cloud applications

Computing chats with Ramses Gallego from Dell Security about recent high-profile security breaches

Massage Envy uses SonicWALL firewalls to enhance security and simplify management

See highlights from partner interviews at Peak Performance 2015





eResearch SA builds a private cloud using Dell SonicWALL security solutions

Jenkon provides better service with information management solutions from Dell Software

Jenkon provides state-of-the-art services with end-to-end solutions from Dell





See how SonicWALL Mobile Connect protects corporate resources at RSA 2014

See how SonicWALL solutions improve email security at RSA 2014

Update your security hardware using the Dell Advantage Loyalty Program

Update your security hardware using the Competitive Trade-In offer

Update your security hardware using the Secure Upgrade Plus program

Enable new technologies and protect your business from security gaps with Dell Security solutions


Guard against malware and security threats with Dell SonicWALL security services

Guarantee application bandwidth priority with Dell SonicWALL security services

Prevent network intrusions with Dell SonicWALL security services

Guard against SSL threats with Dell SonicWALL security services



Counter a new set of network security challenges with Dell SonicWALL

Enhance network security with Dell SonicWALL Next-Generation Firewalls

Get the highest level of protection with continuous threat research from Dell SonicWALL

RocketSpace keeps their clients connected with Dell Security

Balance network performance, access and security with Dell SonicWALL
Datasheets
- Business insight: Mobility
- Deep Packet Inspection
- Secure Upgrade Plus
- Security-as-a-Service Data Sheet
- SonicWALL Application Intelligence, Control and Visualization
- SonicWall Capture Advanced Threat Protection Service
- SonicWALL Comprehensive Anti-Spam Service
- SonicWALL Comprehensive Gateway Security Suite
- SonicWALL Content Filtering Service and Content Filtering Client
- SonicWALL Enforced Client Anti-Virus and Anti-Spyware Software
- SonicWALL Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, and Application Intelligence and Control Service
- SonicWALL Intrusion Prevention
- SonicWALL Malware Prevention
- SonicWALL Mobile Connect
- SonicWall Network Security Appliance (NSA) Series
- SonicWall Product Line Brochure
- SonicWall Product Line Data Sheet
- SonicWALL SSL Inspection
- SonicWALL Support and Professional Services Brochure
- SonicWALL VPN Client
- SonicWALL Wireless Network Security
- SonicWall Wireless Network Security A4 English
- SonicWall Wireless Network Security US
- Virtual Private Networking
White Papers
- 10 Easy Steps to Secure Your Small Business
- 11 Cool Things Your Firewall Should Do
- 12 things effective intrusion prevention systems should do
- 12 Things Effective Intrusion Prevention Systems Should Do
- 2016 Security Threat Report - Executive Summary
- 2016 SonicWall Security Annual Threat Report
- Achieve deeper network security
- Achieve deeper network security and application control
- Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
- Beyond next generation firewalls eguide
- Eight Ways to Protect Your Network Against Ransomware
- GameChanger: Lock Down Without Locking Out
- Holiday Shopping
- How ransomware can hold your business hostage
- How Traditional Firewalls Fail Today's Networks
- Keep Schools Secure to Keep Learning
- Leveraging Security to Meet Compliance
- Managed Service Providers
- Network Security for Retail & Small Businesses | 10 Steps
- Next Generation Firewalls: Critical to your organizations network security
- Quantifying the Impact of Network-Based Attacks
- Security at the Speed of 802.11ac
- Shellshock and Future Vulnerabilities - Buying Precious Time
- SonicWall Enterprise Security 2.0
- SSL decryption and inspection keeps attackers from your data and out of your network
- The Wild World of Malware: Keeping Your Company Safe
- Twelve Ways Application and Users Are Draining Your Bandwidth and How to Fix It
- Virtualization
- Vulnerable No More: How to Solve Common K-12 Security Challenges
- What to look for when evaluating next generation firewalls
- Why threat intelligence is critical for next-generation firewalls
- Wireless Network Security - Adding Security, Performance, Manageability and Value to Wireless Deployments
Infographics
Case Studies
- Benetton; Network security gets a complete makeover
- Boston Pizza International: Large restaurant chain protects over 350 stores,keeps threats at bay
- Cal-Maine Foods cuts TCO and boosts productivity with SonicWall
- Church of the Highlands; Church brings members together with IT
- City of Alexandria decreases spam by 95 percent
- Connex Credit Union: Connex cuts costs with flexible, reliable SonicWall solutions
- Contech Engineered Solutions: Stronger relationships, simpler management
- Denver Broncos: Professional football team boosts online defense
- Dubai Culture & Arts; Dubai drives cultural development
- First Source Boosts Security With a SonicWall Next-Gen Firewall
- Getty Images; Getty Images readies for Olympics with SonicWall
- Green Clinic Health System: Enhancing compliance and care with highly available IT
- Hi-Tech Computers: MSP wins customers by offering Firewall as a Service
- Konvert: Staffing company boosts productivity for employees
- Konvert: Staffing company boosts productivity for employees
- La Perla; La Perla streamlines secure global networking with SonicWall
- Linz General Hospital; IT security key success factor at Linz General Hospital
- Manor Lakes P-12 College gives next-generation firewall an A
- Mi-WiFi: Locking down networks, gaining new business
- NISC; Utility cooperative turns on security, drives wireless for 600 members
- Orion Health: Health Care Technology Company Improves Security to enable continued growth
- Ozinga:Ozinga cuts TCO and eases remote management with SonicWall
- Park City Mountain Resort; Giving resort guests the best experience
- Secure Designs, Inc. (SDI)
- Speros: Technology company offers firewall as a service
- Things Remembered; Things Remembered meets PCI and ROI with SonicWall
- Weber County; Weber County protects public data from evolving threats with SonicWall Next-Generation Firewalls
- Wendys franchisee ensures PCI DSS compliance
Technical Briefs
- Application Intelligence in Healthcare Information Systems
- Digital Dialogue: The Critical Balance of Security and Access
- Enabling Protection, Control and Performance with Secure Network Optimization
- Executive Brief: The Dark Side of Encryption - Decrypt Traffic to Stop Hidden Threats
- Executive Brief: Uncover your risk profile
- Executive brief: Why network sandboxing is required to stop ransomware
- Executive brief: Why you need network segmentation to stop advanced threats.
- Helping Schools Secure Their Networks While Saving Their Budgets
- Leverage the Cloud with Confidence Using Next-Generation Firewalls
- Network Security for Government
- Secure Technology Solutions for Retailers
- Security, Manageability and Scalability for the Distributed Network
- Security-as-a-Service Value Proposition and Comparison Matrix
- Solution brief: How to protect against ransomware.
- Solution Brief: How to stop advanced threats with network security segments
- Solution brief: Putting a solid sandbox strategy in place
- Solution Brief: Security & Network Optimization: Application Intelligence & Control
- Streamline Your Network Security
- Technical brief: How SonicWall NGFWs deliver deeper network security
- Technical Considerations for K-12 Education Network Security
- The Importance of Application Intelligence and Control in Virtual Environments
- The Triple-A approach to network security
- YouTube for Schools Solution Brief
On-Demand Webcasts
- The Dark Side of Encrypted Traffic
- Keeping your retail network secure and compliant
- Anti-ransomware - Fight back with adaptive network security
- The Dark Side of HTTPS – Fight Hidden Threats With Hyper scale Adaptive Network Security
- How to Protect Your Organization from Ransomware
- Hacker Craft - Avoiding the breach
- The Digital Transition: K-12 Schools Making Progress, But Have More Work Ahead
- How to gain control of employee web access with proxy server and next generation firewall technologies
- Fighting against shape shifting type threats
- A better approach to vetting NGFW for a safer network
- A better approach to vetting NGFW for a safer network
- Achieve Deeper Network Security and Control
- Federal Cybersecurity Sprint Knowledge Series: Session 2 - Deploy Comprehensive Security Patch Management to Stay Current
- “Triple-A” Security Approach to Network Security - Empowering Your Business
- Move up to 802.11ac wireless. Just remember to keep it secure.
- POS Attacks Persist: Fight Back with 5 Key Defense Strategies
- SonicWall Interactive Live Demo - January
- Endpoint to Perimeter: Network Protection That’s Inside Out and Outside In
- Embrace Your End Users – Don’t Fight Them or Ignore Them!
- Solving Your Biggest Network Security Challenge
- Next-Generation Firewall Technical Deep Dive/Advanced Configuration - August
- SonicWall Interactive Live Demo - January Interactive Live Demo
- Best Practices for Safeguarding Your Network from Today's Rapidly Evolving Threats
- How well prepared are you for the next security threat?
- Content Filtering Coverage: Are You In, Out or Both?
- Improving Network Efficiencies with SonicWall WAN Acceleration
- Mobile security; Protecting corporate apps and data
- Securing information in higher education organisations
- Top trends driving IT security in 2014
- Latest security threats research and analysis
- Overview of an ever-evolving threat landscape
- Protection and Productivity During the Holiday Buying Season
- Mobile security; the risks of co-mingling personal and business
- Deeper Level of Network Security
- Mobile Madness - Strategies to mitigate Mobile Security Threats
- Latest security threats research and analysis
- Why it's time to upgrade to a Next-Generation Firewall
- Why protection and performance does matter for your network
- End Point to Perimeter: Network protection that’s inside out and outside in
- Overview of an ever-evolving threat landscape
- Top trends driving IT Security for 2013
- Under the hood: Malware research and protection












