SonicWall NSA 5600 Firewall - 2 units - Active and HA Appliances For Sale

SonicWall NSA 5600 Firewall - 2 units - Active and HA Appliances

This item has been shown 23 times.

Buy Now

SonicWall NSA 5600 Firewall - 2 units - Active and HA Appliances:

SonicWall NSA5600 - Both Active and HA units included in this sale. Both include rack ears.
Network Security Appliance Series Overview:Industry-validated security effectiveness and performance for mid-sized networks

The SonicWall Network Security Appliance (NSA) series provides midsized networks, branch offices and distributed enterprises with advanced threat prevention in a high-performance security platform. Combining nextgeneration firewall technology with our patented* Reassembly-Free Deep Packet Inspection (RFDPI) engine on a multi-core architecture, the NSA series offers the security, performance and control organizations require.

The SonicWall Network Security Appliance (NSA) series provides midsized networks, branch offices and distributed enterprises with advanced threat prevention in a high-performance security platform. Combining nextgeneration firewall technology with our patented* Reassembly-Free Deep Packet Inspection (RFDPI) engine on a multi-core architecture, the NSA series offers the security, performance and control organizations require.


Superior threat prevention and performance

  • Patented reassembly-free deep packet inspection technology
  • On-box and cloud-based threat prevention
  • SSL/TLS decryption and inspection
  • Industry-validated security effectiveness
  • Multi-core hardware architecture
  • Dedicated in-house threat research team

Network control and flexibility

  • Powerful SonicOS operating system
  • Application intelligence and control
  • Network segmentation with VLANs
  • Wireless network security

Easy deployment, setup and ongoing management

  • Tightly integrated solution
  • Centralized management
  • Scalability through multiple hardware platforms
  • Low total cost of threat prevention and performance

    NSA series next-generation firewalls (NGFWs) integrate a series of advanced security technologies to deliver a superior level of threat prevention. Our patented single-pass RFDPI threat prevention engine examines every byte of every packet, inspecting both inbound and outbound traffic simultaneously. The NSA series leverages on-box capabilities including intrusion prevention, anti-malware and web/URL filtering in addition to cloud-based services such as CloudAV and SonicWall Capture multi-engine sandboxing to block zero-day threats at the gateway. Unlike other security products that cannot inspect large files for hidden threats, NSA firewalls scan files of any size across all ports and protocols. The security architecture in SonicWall NGFWs has been validated as one of the industry’s best for security effectiveness by NSS Labs which awarded SonicWall its “Recommended” rating for the fourth consecutive year.

    Going beyond intrusion prevention, anti-malware and web filtering, SonicWall NGFWs provide a further level of protection by performing full decryption and inspection of TLS/SSL and SSH encrypted traffic as well as non-proxyable applications, enabling complete protection regardless of transport or protocol. It looks deep inside every packets (the header and data part) searching for protocol non-compliance, threats, zero-days, intrusions, and even defined criteria to detect and prevent hidden attacks that leverage cryptography, block encrypted malware downloads, cease the spread of infections, and thwart command and control (C&C) communications and data exfiltration. Inclusion and exclusion rules allow total control to customize which traffic is subjected to decryption and inspection based on specific organizational compliance and/ or legal requirements.

    When organizations activate deep packet inspection functions such as intrusion prevention, anti-virus, anti spyware, TLS/SSL decryption/inspection and others on their firewalls network performance often slows down, sometimes dramatically. NSA series firewalls feature a multi-core hardware architecture that utilizes specialized security microprocessors. Combined with our RFDPI engine, this unique design eliminates the performance degradation networks experience with other firewalls.

    In today’s security environment, it’s not enough to rely on solely on outside parties for threat information. That’s why SonicWall formed its own in-house threat research team more than 15 years ago. This dedicated team gathers, analyzes and vets data from over one million sensors in its GRID network. SonicWall also participates in industry collaboration efforts and engages with threat research communities to gather and share samples of attacks and vulnerabilities. This shared threat intelligence is used to develop real-time countermeasures that are automatically deployed to our customers’ firewalls.

    Network control and flexibility

    At the core of the NSA series is SonicOS, SonicWall’s feature-rich operating system. SonicOS provides organizations with the network control and flexibility they require through application intelligence and control, real-time visualization, an intrusion prevention system (IPS) featuring sophisticated antievasion technology, high-speed virtual private networking (VPN) and other robust security features.

    Using application intelligence and control, network administrators can identify and categorize productive applications from those that are unproductive or potentially dangerous, and control that traffic through powerful application-level policies on both a peruser and a per-group basis (along with schedules and exception lists). Businesscritical applications can be prioritized and allocated more bandwidth while non-essential applications are bandwidth-limited. Real-time monitoring and visualization provides a graphical representation of applications, users and bandwidth usage for granular insight into traffic across the network.

    For organizations that require advanced flexibility in their network design, SonicOS offers the tools to securely segment the network through the use of virtual LANs (VLANs) which enable network administrators to create a virtual LAN interface that allows for network separation into one or more logical groups. Administrators create rules that determine the level of communication with devices on other VLANs.

    Built into every NSA series firewall is a wireless access controller that enables organizations to extend the network perimeter securely through the use of wireless technology. Together, SonicWall firewalls and SonicPoint 802.11ac wireless access points create a wireless network security solution that combines industry-leading next-generation firewall technology with high-speed wireless for enterprise-class network security and performance across the wireless network.

    Easy deployment, setup and ongoing management

    Like all SonicWall firewalls, the NSA series tightly integrates key security, connectivity and flexibility technologies into a single, comprehensive solution. This includes SonicPoint wireless access points and the SonicWall WAN Acceleration Appliance (WXA) series, both of which are automatically detected and provisioned by the managing NSA firewall. Consolidating multiple capabilities eliminates the need to purchase and install point products that don’t always work well together. This reduces the effort it takes to deploy the solution into the network and configure it, saving both time and money.

    Ongoing management and monitoring of network security are handled centrally through the firewall or through the SonicWall Global Management System (GMS), providing network administrators with a single pane of glass from which to manage all aspects of the network. Together, the simplified deployment and setup along with the ease of management enable organizations to lower their total cost of ownership and realize a high return on investment.

    Network Security Appliance Features:
    • Best in-class protection
    • Multi-core architecture
    • Ultra high performance
    • Intrusion prevention
    • Network-based anti-malware
    • Secure remote access
    • Secure wireless
    • URL filtering
    • Gateway anti-spam
    • Application control
    • Centralized management

    The SonicWall NSA Series next-generation firewalls (NGFWs) utilize the latest multi-core hardware design and Reassembly-Free Deep Packet Inspection to protect the network from internal and external attacks without compromising performance. The NSA Series combines intrusion prevention, content and URL inspection, application intelligence and control, high availability and other advanced networking features.

    • TheSonicWall NSA 5600is ideal for distributed, branch office and corporate environments needing significant throughput.
    FeaturesRFDPI Deep Packet Inspection (RFDPI)This high-performance, proprietary and patented inspection engine performs stream-based bi-directional traffic analysis, without proxying or buffering, to uncover intrusion attempts, malware and identify application traffic regardless of port.Bi-directional inspectionScans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not used to distribute malware, and does not become a launch platform for attacks in case an infected machine is brought inside.Stream-based inspectionProxy-less and non-buffering inspection technology provides ultra-low latency performance for DPI of millions of simultaneous network streams without introducing file and stream size limitations, and can be applied on common protocols as well as raw TCP streams.Highly parallel and scalableThe unique design of the RFDPI engine works with the multi-core architecture to provide high DPI throughput and extremely high new session establishment rates to deal with traffic spikes in demanding networks.Single-pass inspectionA single-pass DPI architecture simultaneously scans for malware, intrusions and for application identification, drastically reducing DPI latency and ensuring that all threat information is correlated in a single architecture.Firewall and NetworkingFeature:Description:Threat APIAll the firewall to receive and leverage any and all proprietary, original equipment manufacturer and third-party intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised credentials, ransomware and advanced persistent threats.Stateful Packet InspectionAll network traffic is inspected, analyzed and brought into compliance with firewall access policies.High availability/clusteringThe NSA Series supports Active/Passive with state synchronization, Active/Active DPI and Active/ Active Clustering high availability modes. Active/Active DPI offloads the Deep Packet Inspection load to cores on the passive appliance to boost throughput.DDoS/DoS attack protectionSYN Flood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting technologies. Additionally, it provides the ability to protect against DOS/DDoS through UDP/ICMP flood protection and connection rate limiting.IPv6 supportInternet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With the latest SonicOS 6.2, the hardware will support filtering and wire mode implementations.Flexible deployment optionsThe NSA Series can be deployed in traditional NAT, Layer 2 Bridge, Wire Mode, and Network Tap modes.WAN load balancingLoad-balances multiple WAN interfaces using Round Robin, Spillover or Percentage methods. Policy-based routing Creates routes based on protocol to direct traffic to a preferred WAN connection with the ability to fail back to a secondary WAN in the event of an outage.Advanced QoSGuarantees critical communications with 802.1p and DSCP tagging, and remapping of VoIP traffic on the network.H.323 gatekeeper and SIP proxy supportBlocks spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy.Integrated Dell X-Series network switch managementManage security settings of additional ports, including Portshield, HA, POE and POE+, under a single pane of glass using the SuperMassive management dashboard for Dell’s X series network switch.Biometric AuthenticationSupports mobile device authentication such as fingerprint recognition that cannot be easily duplicated or shared to securely authenticate the user identity for network access.Open Authentication and Social LoginEnable guest users to use their credentials from social networking services such as Facebook, Twitter, or Google+ to sign in and access the Internet and other guest services through a host's wireless, LAN or DMZ zones using pass-through authentication.Management and ReportingFeature:Description:Global Management SystemSonicWall GMS monitors, configures and reports on multiple SonicWall appliances through a single management console with an intuitive interface, reducing management costs and complexity.Powerful single device managementAn intuitive web-based interface allows quick and convenient configuration, in addition to a comprehensive CLI and support for SNMPv2/3.IPFIX/NetFlow application flow reportingExports application traffic analytics and usage data through IPFIX or NetFlow protocols for realtime and historical monitoring and reporting with tools, such as SonicWall Scrutinizer or other tools that support IPFIX and NetFlow with extensions.Virtual Private VPNSimplifies and reduces complex distributed firewall deployment down to a trivial effort by automating the initial siteto-site VPN gateway provisioning between SonicWall firewalls while security and connectivity occurs instantly and automatically.IPSec VPN for site-to-site connectivityHigh-performance IPSec VPN allows the NSA Series to act as a VPN concentrator for thousands of other large sites, branch offices or home offices.SSL VPN or IPSec client remote accessUtilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers, intranet sites and applications from a variety of platforms.Redundant VPN gatewayWhen using multiple WANs, a primary and secondary VPN can be configured to allow seamless, automatic failover and failback of all VPN sessions.Route-based VPNThe ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel failure, by seamlessly re-routing traffic between endpoints through alternate routes.Content/Context AwarenessFeature:Description:User activity trackingUser identification and activity are made available through seamless AD/LDAP/Citrix/Terminal Services SSO integration combined with extensive information obtained through DPI.GeoIP country traffic identificationIdentifies and controls network traffic going to or coming from specific countries to either protect against attacks from known or suspected origins of threat activity, or to investigate suspicious traffic originating from the network. Ability to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP address. Eliminates unwanted filtering of IP addresses due to misclassification.Regular Expression DPI filteringPrevents data leakage by identifying and controlling content crossing the network through regular expression matching. Ability to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP address.
    Breach prevention subscription servicesCapture Advanced Threat sandboxingThe multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation, and hypervisor level analysis technology, executes suspicious code and analyzes behavior, providing comprehensive visibility to malicious activity.Broad file type and size analysisSupports analysis of a broad range of file types, including executable programs (PE), DLL, PDFs, MS Office documents, archives, JAR, and APK plus multiple operating systems including Windows, Android, Mac OSX and multi-browser environments.Rapid deployment of signaturesWhen a file is identified as malicious, a signature is immediately deployed to firewalls with SonicWall Capture subscriptions and Gateway Anti-Virus and IPS signature databases and the URL, IP and domain reputation databases within 48 hours.Block until verdictTo prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the gateway until a verdict is determined.Encrypted Threat PreventionFeature:Description:SSL decryption and inspectionDecrypts and inspects SSL traffic on the fly, without proxying, for malware, intrusions and data leakage, and applies application, URL and content control policies in order to protect against threats hidden in SSL encrypted traffic Included with security subscriptions for all models except SOHO. Sold as a separate license on SOHO.SSH inspectionDeep packet inspection of SSH (DPI-SSH) decrypts and inspect data traversing over SSH tunnel to prevent attacks that leverage SSH.Intrusion protectionTightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.Automatic signature updatesThe SonicWall Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures that covers more than 50 attack categories. The new updates take immediate effect without any reboot or service interruption required.Intra-zone IPS protectionBolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing threats from propagating across the zone boundaries.Botnet command and control (CnC) detection and blockingIdentifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are identified as propagating malware or are known CnC points.Protocol abuse/anomalyIdentifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.Zero-day protectionProtects the network against zero-day attacks with constant updates against the latest exploit methods and techniques that cover thousands of individual exploits.Anti-evasion technologyExtensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected by utilizing evasion techniques in Layers 2-7.Threat PreventionFeature:Description:Gateway anti-malwareThe SonicWall RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and other malware in files of unlimited length and size across all ports and TCP streams.CloudAV malware protectionA continuously updated database of over 17 million threat signatures resides in the SonicWall cloud servers and is referenced to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of threats.Around-the-clock security updatesNew threat updates are automatically pushed to firewalls in the field with active security services, and take effect immediately without reboots or interruptions.Bi-directional raw TCP inspectionThe RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that they to sneak by outdated security systems that focus on securing a few well-known ports.Extensive protocol supportIdentifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and decodes payloads for malware inspection, even if they do not run on standard, well-known ports.Application Intelligence and ControlFeature:Description:Application controlControl applications, or individual application features, that are identified by the RFDPI engine against a continuously expanding database of over thousands of application signatures, to increase network security and enhance network productivity.Custom application identificationControl custom applications by creating signatures based on specific parameters or patterns unique to an application in its network communications, in order to gain further control over the network.Application bandwidth managementGranularly allocate and regulate available bandwidth for critical applications or application categories while inhibiting nonessential application traffic.Granular controlControl applications, or specific components of an application, based on schedules, user groups, exclusion lists and a range of actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix integration.Content content filteringEnforce acceptable use policies and block access to websites containing information or images that are objectionable or unproductive with Content Filtering Service.Enforced content filtering clientExtend policy enforcement to block internet content for Windows, Mac and Android devices located outside the firewall perimeter.Granular controlsBlock content using the predefined categories or any combination of categories. Filtering can be scheduled by time of day, such as during school or business hours, and applied to individual users or groups.Web cachingURL ratings are cached locally on the SonicWall firewall so that the response time for subsequent access to frequently visited sites is only a fraction of a second.Enforced Anti-Virus and protectionUtilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint protection to block, viruses entering network through laptops, thumb drives and other unprotected systems.Automated enforcement optionEnsure every computer accessing the network has the most recent version of anti-virus and anti-spyware signatures installed and active, eliminating the costs commonly associated with desktop anti-virus and anti-spyware management.Automated deployment and installation optionMachine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across the network, minimizing administrative overhead.Always on, automatic virus protectionFrequent anti-virus and anti-spyware updates are delivered transparently to all desktops and file servers to improve end user productivity and decrease security management.Spyware protectionPowerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on desktops and laptops before they transmit confidential data, providing greater desktop security and performance.
    SonicOS Feature Summary


    • Stateful packet inspection
    • Reassembly-Free Deep Packet Inspection
    • DDoS attack protection (UDP/ICMP/SYN flood)
    • IPv4/IPv6 support
    • Biometric authentication for remote access
    • DNS proxy
    • Threat API

    SSL/SSH decryption and inspection1

    • Deep packet inspection for TLS/SSL/SSH
    • Inclusion/exclusion of objects, groups or hostnames
    • SSL Control

    Capture advanced threat protection1

    • Cloud-based multi-engine analysis
    • Virtualized sandboxing
    • Hypervisor level analysis
    • Full system emulation
    • Broad file type examination
    • Automated and manual submission
    • Real-time threat intelligence updates
    • Auto-block capability

    Intrusion prevention1

    • Signature-based scanning
    • Automatic signature updates
    • offerirectional inspection engine
    • Granular IPS rule capability
    • GeoIP/Botnet filtering
    • Botnet filtering with dynamic list
    • Regular expression matching


    • Stream-based malware scanning
    • Gateway anti-virus
    • Gateway anti-spyware
    • Bi-directional inspection
    • No file size limitation
    • Cloud malware database

    Application identification1

    • Application control
    • Application traffic visualization
    • Application component blocking
    • Application bandwidth management
    • Custom application signature creation
    • Data leakage prevention
    • Application reporting over NetFlow/ IPFIX
    • User activity tracking (SSO)
    • Comprehensive application signature database

    Web content filtering1

    • URL filtering
    • Anti-proxy technology
    • Keyword blocking
    • Bandwidth manage CFS rating categories
    • Unified policy model with app control
    • Content Filtering Client


    • Auto-provision VPN
    • IPSec VPN for site-to-site connectivity
    • SSL VPN and IPSec client remote access
    • Redundant VPN gateway
    • Mobile Connect for iOS, Mac OS X, Windows, Chrome, Android and Kindle Fire
    • Route-based VPN (OSPF, RIP)


    • Granular QoS control
    • Bandwidth management
    • DPI for VoIP traffic
    • H.323 gatekeeper and SIP proxy support


    • MU-MIMO
    • Floor plan view
    • Topology view
    • Band steering
    • Beamforming
    • AirTime fairness
    • MiFi extender
    • Guest cyclic quota


    • PortShield
    • Jumbo frames
    • IPv6
    • Path MTU discovery
    • Enhanced logging
    • VLAN trunking
    • RSTP (Rapid Spanning Tree protocol)
    • Port mirroring
    • Layer-2 QoS
    • Port security
    • Dynamic routing (RIP/OSPF/BGP)
    • SonicWall wireless controller
    • Policy-based routing (ToS/metric and ECMP)
    • NAT
    • DHCP server
    • Bandwidth management
    • Link aggregation (static and dynamic)
    • Port redundancy
    • A/P high availability with state sync
    • A/A clustering
    • Inbound/outbound load balancing
    • L2 bridge, wire/virtual wire mode, tap mode
    • 3G/4G WAN failover
    • Asymmetric routing
    • Common Access Card (CAC) support

    Management and monitoring

    • Web GUI
    • Command line interface (CLI)
    • SNMPv2/v3
    • Centralized management and reporting
    • Logging
    • Netflow/IPFix exporting
    • Cloud-based configuration backup
    • BlueCoat Security Analytics Platform
    • Application and bandwidth visualization
    • IPv4 and IPv6 Management
    • Dell X-Series switch management including cascaded switches

    1Requires added subscription.

    Buy Now

Other Related Items: