SonicOS 7 NSv Getting Started Guide for AWS

Table of Contents

Feature Support Information

The AWS VPC does not support Layer 2 functionality. Therefore, the NSv interface to VPCs is restricted to the layer 3 network level and higher.

The Feature Support List table shows key SonicOS features and whether or not they are supported or unsupported in deployments of the NSv. The SonicWall NSv has nearly all the features and functionality of a SonicWall NSa hardware virtual machine running SonicOS 7 firmware.

For more information about supported features, refer to the SonicOS 7 NSv administration guide. This and other documents for the SonicWall NSv are available by selecting NSv as the Product at: https://www.sonicwall.com/support/technical-documentation.

The Feature Support List of NSv table shows the key SonicOS 7 features.

Feature Support List
Functional Category Feature Area Feature
Unified Security Policy Unified Policy combining Layer 4 to Layer 3 Rules Source/Destination IP/Port/Service
    Application based Control
    CFS/Web Filtering
    Botnet
    Geo-IP/country
    Single Pass Security
    Services enforcement
    Decryption Policy
    DoS Policy
    EndPoint Security Policy
    Rule Diagram
Profile Based Objects
    Endpoint Security
    Bandwidth Management
    QoS Marking
    Content Filter
    Intrusion Prevention
    DHCP Option
    AWS VPN
Action Profiles
    Security Profile
    DoS Profile
 Signature Objects
    AntiVirus Signature Object
    AntiSpyware Signature Object
  Rule Management
    Cloning
    Shadow rule analysis
    In-cell editing
    Group editing
    Export of Rules
    LiveCounters
 Managing Views
    Used/unused rules
    Active/inactive rules
    Sections
    Customizable Grid/Layout
    Custom Grouping
TLS 1.3 Supporting TLS 1.3 with enhanced security  
SDWAN SDWAN Scalability  
  SDWAN Usability Wizard  
API API Driven Management  
  Full API Support  
Dashboard Enhanced Home Page  
    Actionable Dashboard
    Enhanced Device View
    Top Traffic and User summary
    Insights to threats
    Policy/Object Overview
    Profiles and Signatures Overview
    Zero-Day Attack Origin Analysis
  Notification Center  
Debugging Enhanced Packet Monitoring  
  UI based System Logs Download  
  SSH Terminal on UI  
  System Diagnostic Utility Tools  
  Policy Lookup  
Capture Threat Assessment (CTA 2.0) Executive Template  
  Customizable Logo/Name/Company  
  Industry and Global Average Statistics  
  Risky File Analysis  
  Risky Application Summary  
  Malware Analysis  
  Glimpse of Threats  
Monitoring Risky Application Summary  
  Enhanced AppFlow Monitoring  
Management CSC Simple Reporting  
  ZeroTouch Registration and Provisioning  
General SonicCoreX and SonicOS Containerization  
  Data Encryption using AES-256  
  Enhanced Online Help