SonicOS/X 7 About SonicOS and SonicOSX

Feature Support on NSv Series

SonicOS/X 7 on SonicWall NSv Series supports the majority of features supported on SonicWall physical firewalls, with only a few exceptions. These exceptions are generally those features that control an external device, such as a switch, wireless hardware, or cellular WWAN devices.

The table below lists the key SonicOS and SonicOSX features and whether they are supported or not supported on the NSv Series.

SonicOS/X 7 Feature Support on the NSv Series
Main Category Feature Category Feature Description Supported
Unified Policy Features Unified Security Policy Source/Destination IP, Port, Service, and User SPI Rule based on user Information Yes
    Application Control Application Signature and Component control within a Security Rule Yes
    CFS/Web Filtering Content Filtering Rules within a Security Rule Yes
    Botnet Botnet control within a Security Rule Yes
    Geo-IP / Country Country-based control within a Security Rule Yes
    EndPoint Security Policy Endpoint Security with Capture Client based on Rules Yes
    Rule Diagram Pictorial view of a Security Policy, NAT Policy or Route Policy to assist in finding real-time statistics Yes
  Decryption Policy   Rules to inspect SSL/TLS traffic Yes
  DoS Policy   Rules to inspect Denial of Service (DoS) and Distributed DoS (DDOS) attacks, such as flooding or Smurf Yes
  Profile Objects Endpoint Security   Yes
    Bandwidth Management   Yes
    QoS Marking   Yes
    Content Filter   Yes
    Intrusion Prevention   Yes
    DHCP Option   Yes
    AWS VPN   Yes
  Action Profiles Security Profile   Yes
    DoS Profile   Yes
  Signature Objects Anti-Virus Signature Object Anti-Virus Signatures with more details on each signature Yes
    Anti-Spyware Signature Object Anti-Spyware Signatures with more details on each signature Yes
  Rule management Cloning Cloning of an existing security rule to create a new rule Yes
    Shadow rule analysis Displays duplicate and shadowing rules within every policy Yes
    In-cell editing Ability to perform selective cell editing on the security rule without opening the rule, reducing the number of clicks for the administrator Yes
    Group editing   Yes
    Export of Rules Rules can be exported in CSV format Yes
    Live Counters Capture live statistics for a security policy Yes
  Managing views Used/Unused Rules Display the security rules which are being actively used or not being used Yes
    Active/Inactive Rules Display the security rules which are enabled or disabled Yes
    Section Policy Grouping Grouping of policies by sections to help manage thousands of security rules Yes
    Customizable Grid/Layout Customizable and movable columns within Security Policy, NAT Policy, Route Policy, Decryption Policy, and DoS Policy pages Yes
    Custom Grouping Grouping of policies by custom options like zone, tag, or other Yes
Decryption Features Decryption Support for TLSv1.3   TLS 1.3 enhanced security implemented in firewall management, SSL VPN and DPI Yes
  Blocking Cipher Controls   Block or unblock cipher control selectively Yes
  Decryption Rule Monitoring   Enhanced monitoring of Decryption Rules including Bandwidth, Connection Rate, Connection Usage Yes
Multi-Instance Features Multi-Instance Support   Multiple virtual firewalls running on a single firewall No
  Instance View   View usage and other related statistics for each instance No
  Per-Instance Separate Firmware   Ability to run separate firmware on each instance and the root instance No
  Instance Licensing from Root   License the instances from the root instance and display the key for each instance No
SDWAN Features SDWAN Scalability   Scalable tunnel interfaces for distributed enterprises Yes
  SDWAN Usability Wizard   Wizard to automatically configure an SDWAN Policy on the firewall Yes
API Features RESTful API Support   Complete API support for configuring every section of the management interface Yes
HOME Page Features Dashboard Features Actionable Dashboard Dashboard with actionable alerts Yes
    Device View Enhancements Displays the real-time status of the front panel interfaces and LEDs Yes
    Top Traffic Summary Traffic distribution usage on the firewall with real-time updates and the most-used applications Yes
    Top User Summary Summary of top users based on allowed or blocked sessions, by data sent and received Yes
    Insights into Threats Real-time threat summary for the network, including virus, zero-day malware, spyware, vulnerabilities, risky applications Yes
    Policy Overview Graphical view of used/unused and allowed/denied statistics for Security, NAT, Route, Decryption, and DoS Policies Yes
    Objects Overview Graphical view of custom and default Address, Zone, Service, Schedules, Custom Match, Application, Country, URI, Website, and Web Category objects Yes
    Profiles and Signatures Overview Graphical view of custom and default profiles and signatures for IPS, Security, DoS, Block Page, Gateway Anti-Virus, Anti-Spyware and others Yes
    Zero-Day Attack Origin Analysis Displays location-based attack origin by countries Yes
  Network Topology   Topology View displaying hosts, access points connected in the network based on device name, MAC address and IP address Yes
  Notification Center  

Summary of threats, event logs, system alerts with actionable alerts and outstanding tasks for the administrator

Yes
Debugging and Diagnostic Features Packet Monitoring Enhancement   Packet Monitor ability to find the related Security Rule, NAT Rule, Route Rule, Decryption Rule, and Signatures for Application, IPS, Anti-Virus, and Anti-Spyware Yes
  System Logs Download   Console logs can be downloaded from the web management interface without requiring connection to the Console port Yes
  SSH Terminal   SSH Terminal access within web management interface for troubleshooting Yes
  System Diagnostics   Enhanced system diagnostics for troubleshooting Yes
  Policy Lookup   Policy Lookup displays the rule that will be used for a particular type of traffic based on the math attributes Yes
Capture Threat Assessment (CTA 2.0) Template Customization Executive Template Executive Template for company executives with a summarized report containing Key Findings and Recommendations Yes
  Report Customization Customizable Logo, Name, and Company Customization of logo, administrator name and company name Yes
  Reporting Enhancements Key Findings   Yes
    Risky File Analysis   Yes
    Risky Application Summary   Yes
    Malware Analysis   Yes
    Glimpse of Threats   Yes
    Web Filtering Statistics   Yes
    Recommendations   Yes
  Comparison Statistics Industry Average Comparison with peer industry statistics Yes
    All Organizations Average Comparison with global statistics Yes
Wireless Features Enhanced Access Point Snapshot   Displays real-time statistics about access point network status and client associations No
  Access Point Traffic Rate   Real-Time bandwidth usage by access points No
  WiFi Client Report   Real-Time WiFi client report based on OS type, frequency, top client chart No
  Real-Time WiFi Client Monitor   Determines the host machine, OS type, frequency, access point information, data transfer No
Switch Features SonicWall Switch Support   SonicWall Switch in standalone and daisy chain deployments No
  Switch Network Overview   SonicWall Switch views: physical view, list view, and VLAN view No
  Bandwidth Usage per Switch Port   Display SonicWall Switch bandwidth usage per port No
  PoE Usage   Display SonicWalll Switch PoE statistics including power usage No
Monitoring Features Risky Application Statistics     Yes
  AppFlow Monitoring Enhancements     Yes
Management NSM Management     No
  API Driven Management     Yes
  ZeroTouch Registration and Provisioning     Yes
  CSC Simple Reporting     No
General Features Global Search   Search globally for parameters within the SonicOS/X configuration to determine the Objects or Policies in which the parameters are referenced Yes
  Storage Device Configuration   Configuration of storage modules including extended modules, and display module usage statistics No