`
UK Sales: 0330 1340 230

Latest News

09/05/2024
by Paul Heritage

Latest blogs and updates from SonicWall-Sales.com

Which options include SonicWall NSM

15/10/2025
by Paul Heritage

NSM (Network Security Manager) is now included with every Gen7/8 firewall with an active support subscription. Additional features are included in security/support bundles (like Advanced Protection Service Suite or Managed Protection Service Suite).

Buying Options SaaS Management SaaS Reporting
Hardware Only None None
HW + Support Included None
HW + APSS Included 7-days of SaaS Advanced Reporting
HW + MPSS Included 30-days of SaaS Advanced Reporting

If you want to add or increase the storage time you can purchase SaaS 7, 30, 90 or 365 Days of Advanced Reporting and Analytics.

SaaS Reporting

Managed Protection Security Suite (MPSS) & Firewall Best Practice Configurations

15/10/2025
by Paul Heritage

Firewalls need active management. With MPSS, SonicWall experts handle the management of your Generation 7 or 8 firewall, ensuring you always have the best firewall configuration to defend against cyber threats.

SonicWall’s Managed Protection Security Suite (MPSS) brings the expertise of our SonicSentry team to manage and monitor your firewalls, becoming an extension of your team to help you maximise your resources and achieve better security. For MSPs, partnering with us for firewall management can help you grow your business without adding headcount, while also freeing your team to focus on more customer service-oriented tasks.

Managed Protection Security Suite Datasheet

As a prerequisite, a minimum level of configuration is required and a document is available to help. I would advise anyone to set their firewall to best practices and include these amendments.

MSS Managed Firewall Best Practice Configurations

Gen 7 Pricing Increase - 15th October

25/09/2025
by Paul Heritage

Gen 7 pricing will be adjusted starting October 15, 2025, as we continue expanding our Gen 8 portfolio. While both Gen 7 and Gen 8 provide strong, modern capabilities, Gen 8 will be the platform for future innovations and extended lifecycle support.

Gen 8 models in stock

16/09/2025
by Paul Heritage

Many of the new Gen 8 models are in stock (currently limited), but we're getting more in every week.

Added some discounted products - see home page promotions

05/09/2025
by Paul Heritage

Added some discounted products - see home page promotions.

These mostly include some Essential renewal bundles, but also NSa 2700 offer.

Details here.

Migrating to the new Gen 8 models.

14/08/2025
by Paul Heritage

The SonicWall GEN8 TZ Series and GEN8 NSa Series firewalls introduce in-product migration capabilities that allow administrators to import configuration settings from supported legacy SonicWall firewalls. This greatly simplifies the upgrade process by eliminating the need for manual reconfiguration during hardware refresh or platform upgrade.

Settings Import Feature:

  • Export/Import settings
  • Devices must be entirely configured from scratch in a typical greenfield deployment (new setup). With GEN8 firewalls, you can import .exp configuration files from supported legacy devices, streamlining migration.
  • The GEN8 TZ and NSa firewalls support in-product migration from select current and previous generation SonicWall firewalls.
  • This feature is especially useful when upgrading from GEN6 or GEN7 models.

Key Benefits:

  • Reduces time spent on manual configuration
  • Maintains policy consistency across hardware generations
  • Simplifies deployments and rollback planning

Pre-Requisites: The following devices are supported as source firewalls from which settings can be exported and imported to GEN8 TZs and NSa models:

SonicOS 7 Device TZ80 TZ280 TZ380 TZ380W TZ480 TZ580 TZ680 NSa 2800 NSa 3800 NSa 4800 NSa 5800
TZ270 N Y Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ270W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ370 N Y* Y Y* Y* Y* Y* Y* Y* Y* Y*
TZ370W N Y* Y* Y Y* Y* Y* Y* Y* Y* Y*
TZ470 N Y Y Y* Y Y Y Y* Y* Y* Y*
TZ470W N Y* Y* Y Y* Y* Y* Y* Y* Y* Y*
TZ570 N Y Y Y* Y Y Y Y* Y* Y* Y*
TZ570P N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ570W N Y* Y* Y Y* Y* Y* Y* Y* Y* Y*
TZ670 N N Y N Y Y Y Y* Y* Y* Y*
NSA2700 N N N N N N N Y Y* Y* Y*
NSA3700 N N N N N N N Y* Y Y* Y*
NSA4700 N N N N N N N N Y* Y Y*
NSA5700 N N N N N N N N N Y Y
NSA6700 N N N N N N N N N N Y*


SonicOS 6/6.5 Device TZ80 TZ280 TZ380 TZ380W TZ480 TZ580 TZ680 NSa 2800 NSa 3800 NSa 4800 NSa 5800
SOHOW Y Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
SOHO250 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
SOHO250W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ300 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ300P N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ300W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ350 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ350W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ400 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ400W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ500 N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ500W N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ600 N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ600P N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
NSA2600 N N N N N N N Y* Y* Y* Y*
NSA2650 N N N N N N N Y# Y* Y* Y*
NSA3600 N N N N N N N Y* Y* Y* Y*
NSA3650 N N N N N N N N Y* Y* Y*
NSA4600 N N N N N N N N Y* Y* Y*
NSA4650 N N N N N N N N Y* Y* Y*
NSA5600 N N N N N N N N N Y* Y*
NSA5650 N N N N N N N N N Y* Y*
NSA6600 N N N N N N N N N N Y*
NSA6650 N N N N N N N N N N Y*
SM9200 N N N N N N N N N N N
NSA9250 N N N N N N N N N N N
SM9400 N N N N N N N N N N N
NSa9450 N N N N N N N N N N N
SM9600 N N N N N N N N N N N
NSa9650 N N N N N N N N N N N
SM9800 N N N N N N N N N N N
NSSP12400 N N N N N N N N N N N
NSSP12800 N N N N N N N N N N N


SonicOS 5 Device TZ280 TZ380 TZ380W TZ480 TZ580 TZ680 NSa 2800 NSa 3800 NSa 4800 NSa 5800
SOHO Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
Y
Supported
N
Unsupported
Y*
Supported but import will fail if VLAN or Tunnel Interfaces are present in the settings file.
Important: Please remove the VLAN or tunnel interface configuration for the settings import to succeed- Recommended. Alternatively, use the Existing Migration Tool to convert the settings and import them to the GEN8 firewalls.
Y#
In-Product Migration is Unsupported. Use Migration App via NSM to support settings Migration


EPSS Retirement Notice: Transition to APSS or MPSS

31/07/2025
by Paul Heritage

SonicWall will retire the Essential Protection Service Suite (EPSS) effective August 1, 2025.

In today’s threat landscape — where cyberattacks use automation, AI, and advanced evasion — customers need a simple, effective solution. To address this, we’re simplifying our service portfolio to make it easier to deliver the protection your customers expect.

As of August 1, SonicWall will offer a single subscription bundle: the Advanced Protection Service Suite (APSS) — delivering best-in-class threat prevention at a low total cost of ownership.

Partners in the Service Provider Program can also choose the Managed Protection Service Suite (MPSS), which adds the firewall management expertise of the SonicSentry NOC. MPSS is currently available in NOAM, with global availability coming soon.

We encourage you to begin transitioning your customers to APSS or MPSS, both of which include advanced security, support, and SaaS-based reporting and analytics.

MSS Managed Firewall Mandatory Configurations

18/07/2025
by Paul Heritage

Device > Settings > Administration > Login / Multiple Administrators > Login security

Device > Settings > AdministrationLogin / Multiple Administrators > Login security

Option

Best Practice Value

Default Value

Password must be changed every (days)

90

Disabled

Change password after (hours)

1

1

Bar repeated passwords for this many changes

4

Disabled

New password must contain 8 characters different from the old password

Enable

Disabled

Enforce a minimum password length of

12

8

Enforce password complexity

Alphanumeric and symbolic characters

None

Complexity Requirement - Upper Case Characters

2

0

Complexity Requirement - Lower Case Characters

2

0

Complexity Requirement - Number Characters

2

0

Complexity Requirement - Symbolic Characters

2

0

Log out the Admin after inactivity of (mins)

20

5

Admin/user lockout

Enable

Disabled

Local admin/user account lockout

Enable

Disabled

Device > Settings > Firmware and Settings

Option

Best Practice Value

Default Value

Cloud Backup

Enabled

Disabled

Device > Users > Settings > Authentication

Option

Best Practice Value

Default Value

Display user login info since last login

Enabled

Disabled

Device > AppFlow > Flow Reporting > Settings

Option

Best Practice Value

Default Value

Enable AppFlow To Local Collector

Enabled

Disabled

Device > Log > Settings

Option

Best Practice Value

Default Value

Logging Level

Inform

Warning

Alert Level

Error

Alert

Device > Log > Name Resolution

Option

Best Practice Value

Default Value

Name Resolution Method

DNS

None

Network > SSLVPN > Server Settings

Option

Best Practice Value

Default Value

Inactivity Timeout (minutes)

60

10

Mouse Inactivity Check

Enabled

Disabled

Network > Firewall > Advanced > Settings

Option

Best Practice Value

Default Value

Enable Stealth Mode

Enabled

Disabled

Randomize IP ID

Enabled

Disabled

Decrement IP TTL for forwarded traffic

Enabled

Disabled

Never generate ICMP Time-Exceeded packets

Enabled

Disabled

Network > Firewall > Advanced > Connections

Option

Best Practice Value

Default Value

Enable Control Plane Flood Protection

Enabled

Disabled

Network > Firewall > Flood Protection > TCP > Layer 3 SYN Flood Protection - SYN Proxy

Option

Best Practice Value

Default Value

SYN Flood Protection Mode

Proxy WAN client connections when attack is suspected

Watch and report possible SYN floods

Network > Firewall > Flood Protection > UDP

Option

Best Practice Value

Default Value

Default UDP Connection Timeout

60

30

Enable UDP Flood Protection

Enabled

Disabled

UDP Flood Attack Threshold

5000

1000

Network > Firewall > Flood Protection > ICMP

Option

Best Practice Value

Default Value

Enable ICMP Flood Protection

Enabled

Disabled

Network > VoIP > Settings

Option

Best Practice Value

Default Value

Enable consistent NAT

Enabled

Disabled

Policy > Security Services > Gateway Anti-Virus

Option

Best Practice Value

Default Value

Enable Gateway Anti-Virus

Enabled

Disabled

PROTOCOLS - FTP Inbound & Outbound Inspection

Enabled

Disabled

PROTOCOLS - HTTP Inbound & Outbound Inspection

Enabled

Disabled

PROTOCOLS - IMAP Inbound Inspection

Enabled

Disabled

PROTOCOLS - POP3 Inbound Inspection

Enabled

Disabled

PROTOCOLS - SMTP Inbound & Outbound Inspection

Enabled

Disabled

PROTOCOLS - TCP STREAM Inbound & Outbound Inspection

Enabled

Disabled

Policy > Security Services > Anti-Spyware

Option

Best Practice Value

Default Value

Enable Anti-Spyware

Enabled

Disabled

SIGNATURE GROUPS - High Priority Spyware PREVENT & DETECT ALL

Enabled

Disabled

SIGNATURE GROUPS - Medium Priority Spyware PREVENT & DETECT ALL

Enabled

Disabled

SIGNATURE GROUPS - Low Priority Spyware PREVENT & DETECT ALL

Enabled

Disabled

PROTOCOLS - Enable Inbound Instpection for:

  • HTTP
  • FTP
  • IMAP
  • SMTP
  • POP3

Enabled

Disabled

Enable Inspection of Outbound Spyware Communication

Enabled

Disabled

Policy > Security Services > Intrusion Prevention

Option

Best Practice Value

Default Value

Enable IPS

Enabled

Disabled

Signature Groups - High Priority Attackes PREVENT & DETECT ALL

Enabled

Disabled

Signature Groups - Medium Priority Attackes PREVENT & DETECT ALL

Enabled

Disabled

Policy > Capture ATP > Settings > Basic

Option

Best Practice Value

Default Value

Enable Capture ATP

Enabled

Disabled

File types for Capture ATP analysis:

  • Executables (PE, Mach-O, and DMG)
  • PDF
  • Office 97-2003(.doc , .xls ,etc.)
  • Office (.docx , .xlsx ,etc.)
  • Archives (.jar, .apk, .rar, .bz2, .bzip2, .7z, .xz, .gz, and .zip)

Enabled

Disabled

Policy > Security Services > Geo-IP Filter

Option

Best Practice Value

Default Value

Block connections to/from countries selected in the Countries tabs

Enabled

Disabled

Enable Logging

Enabled

Disabled

Block all Unknown countries

Enabled

Disabled

Countries:

  • Afghanistan
  • Algeria
  • Azerbaijan
  • Bangladesh
  • Belarus
  • Bosnia and Herzegovina
  • Brazil
  • Burundi
  • Central African Republic
  • China
  • Comoros
  • Congo, The Democratic Republic
  • Cuba
  • Eritrea
  • Guatemala
  • Guinea
  • Guinea-Bissau
  • Haiti
  • India
  • Iran, Islamic Republic of
  • Iraq
  • Korea, Democratic People's Repu
  • Lebanon
  • Mali
  • Moldova, Republic of
  • Montenegro
  • Myanmar
  • Nicaragua
  • Niger
  • Pakistan
  • Russian Federation
  • Saudi Arabia
  • Somalia
  • Sudan
  • Syrian Arab Republic
  • Tajikistan
  • Tunisia
  • Turkey
  • Turkmenistan
  • Ukraine
  • Venezuela
  • Vietnam
  • Yemen
  • Zimbabwe

Blocked

Allowed

Policy > Security Services > Botnet Fiter

Option

Best Practice Value

Default Value

Block connections to/from Botnet Command and Control Servers

Enabled

Disabled

Enable Logging

Enabled

Disabled

Policy > Security Services > App Control

Option

Best Practice Value

Default Value

Enable App Control

Enabled

Disabled

Enable Logging for All Apps

Enabled

Disabled

Policy > Security Services > App Control > Signatures

Option

Best Practice Value

Default Value

Categories:

  • APP-UPDATE
  • BROWSING-PRIVACY
  • FILETYPE-DETECTION
  • IM
  • INFRASTRUCTURE
  • MISC-APPS
  • MOBILE-APPS
  • MULTIMEDIA
  • PROTOCOLS
  • VoIP-APPS
  • WEB-BROWSER
  • WEB-CONFERENCING

No Logging

Categories:

  • GAMING
  • MINERS
  • P2P

Log & Block

No Logging or Blocking

Objects > Match Objects > URI Lists

Option

Best Practice Value

Default Value

CFS Global Allow List

  • sonicwall.com

Created

N/A

CFS Global Block List

  • malware[.]com
  • 123movies[.]to
  • phishlabs[.]com
  • isthatphish[.]com
  • onion[.]ws
  • emotet[.]in

Created

N/A

Objects > Profile Objects > Content Filter > CFS Default Profile > Settings > URI List

Option

Best Practice Value

Default Value

CFS Global Allow List

Specified under Allowed URI List

N/A

CFS Global Block List

Specified under Forbidden URI List

N/A

Objects > Profile Objects > Content Filter > CFS Default Profile > Settings > Category

Option

Best Practice Value

Default Value

Categories:

  • Alcohol/Tobacco
  • Gambling
  • Weapons
  • Drugs/Illegal Drugs

Allowed

Blocked

Categories:

  • Pay to Surf Sites

Blocked

Allowed

Objects > Profile Objects > Content Filter > CFS Default Profile > Settings > Reputation

Option

Best Practice Value

Default Value

Enable Reputation

Enabled

Disabled

Reputation Action

CFS Default Reputation Object

N/A

Objects > Profile Objects > Content Filter > CFS Default Profile > Advanced

Option

Best Practice Value

Default Value

Enable HTTPS Content Filtering

Enabled

Disabled

Enable Google Force Safe Search

Enabled

Disabled

Enable Bing Force Safe Search

Enabled

Disabled

Policy > Rules and Policies > Content Filter Rules > CFS Default Policy

Option

Best Practice Value

Default Value

Source Zone

ALL

LAN


Threat Actors Modify and Re-Create Commercial Software to Steal Users’ Information.

25/06/2025
by Paul Heritage

In collaboration with Microsoft Threat Intelligence (MSTIC), SonicWall has identified a deceptive campaign to distribute a hacked and modified version of SonicWall’s SSL VPN NetExtender application that closely resembles the official SonicWall NetExtender software. NetExtender enables remote users to securely connect and run applications on the company network. Users can upload and download files, access network drives, and use other resources as if they were on the local network. Security solutions from SonicWall (GAV: Fake-NetExtender [Trojan]) and Microsoft (TrojanSpy:Win32/SilentRoute.A) will flag the installer as malicious and enable proactive defenses.

The website impersonating the legitimate NetExtender is hosting a Trojanized version of SonicWall’s actual NetExtender version 10.3.2.27 (the latest release version), digitally signed by “CITYLIGHT MEDIA PRIVATE LIMITED.”



The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server.

Technical Details

The threat actor modified the following component files, which are part of the NetExtender installer, to execute the application and send configuration information to a remote server:

  • NeService.exe (Modified file; digital signature is invalid)
  • NetExtender.exe (Modified file; no digital signature)



Modifications to NeService.exe

This file is the SonicWall NetExtender Windows service used by the NetExtender application. It contains a function used to validate the digital certificates of NetExtender components. Upon successful validation, the program continues to execute; otherwise, it displays a validation failure message and exits.




In the malicious installer, this file is patched at all locations where the function results are evaluated. The patch bypasses the check, allowing execution to continue regardless of validation results.




Modifications to NetExtender.exe

Additional code was added to send VPN configuration information to a remote server with the IP address 132.196.198.163 over port 8080. Once the VPN configuration details are entered and the “Connect” button is clicked, the malicious code performs its own validation before sending the data to the remote server. Stolen configuration information includes the username, password, domain, and more.



Mitigation

SonicWall and Microsoft have acted quickly to take down the impersonating websites and have had the installer’s digital certificate revoked.

It is strongly recommended that users download SonicWall applications only from trusted sources: sonicwall.com or mysonicwall.com.

SonicWall Capture ATP with RTDMI™ detects the malicious installer, and SonicWall Managed Security Services identifies and blocks it as:

  • GAV: Fake-NetExtender (Trojan)

Microsoft Defender Antivirus detects this as:

  • "SilentRoute" Trojan ("TrojanSpy:Win32/SilentRoute.A")

IOCs

Sha256:

  • d883c067f060e0f9643667d83ff7bc55a218151df600b18991b50a4ead513364 : Malicious NetExtender Installer
  • 71110e641b60022f23f17ca6ded64d985579e2774d72bcff3fdbb3412cb91efd : Malicious NEService.exe
  • e30793412d9aaa49ffe0dbaaf834b6ef6600541abea418b274290447ca2e168b: Malicious NetExtender.exe

Network:

  • 132.196.198.163

DNS vs URL Filtering

30/05/2025
by Paul Heritage

DNS vs URL Filtering - What’s the Difference and Why it Matters.

Cyberattacks often begin with a single click. That’s why content filtering is more critical than ever in today’s digital landscape. But not all filtering technologies are the same and understanding the difference between DNS and URL filtering can help your organization build a smarter, layered security strategy for web access.

What is DNS Filtering?

DNS filtering works at the Domain Name System (DNS) level. This is the same system that translates a website (like linkedin.com) into the IP address your device uses to connect.

When DNS filtering is enabled, requests for malicious, risk, or non-compliant domains are blocked before a full connection is established.

Benefits of DNS Filtering:

  • Fast and lightweight – stops threats before a page even loads
  • Great for remote/hybrid work – protection travels with users
  • Broad protection – blocks entire domains known for hosting malware, phishing, or botnets

What is URL Filtering?

URL filtering goes deeper. It analyzes the full web address (URL), including the specific page, folder, or file path, after DNS resolution.

This allows organizations to enforce more granular web access policies and send the entire URL for more in-depth evaluation.

Benefits of URL Filtering:

  • Granular control – Send specific pages for further risk-based evaluation (e.g., example.com/ sports/basketball)
  • Advanced Threat Protection – Stops users from accessing compromised subpages or dangerous downloads on otherwise “safe” domains

Why You Need Both

DNS filtering is your first line of defense by keeping users from even reaching known bad destinations. URL filtering is your second layer which analyzes deeper content on the fly to catch what DNS filtering didn’t.

Together they give you:

  • Comprehensive threat coverage to prevent data loss and breaches
  • Flexible policy-based controls based on user groups • A layered security approach that’s secures web access wherever your users are
FEATURE DNS FILTERING URL FILTERING
Layer Network (DNS)
Application (HTTP/S)
Granularity
Domain-wide
Path-specific (URLs, subpages, files)
Speed
Fast, blocks early
Slightly slower, more detailed
Use Cases
Stop known threats early
Enforce deeper inspection
Best For
Lightweight, broad protection
Granular content filtering and policy enforcement

NSa 2800 and NSa 3800 next-generation firewalls

10/05/2025
by Paul Heritage

The NSa 2800 and NSa 3800 are the next models due to be available in stock. These will replace the NSa 2700 and NSa 3700 respectively.


What is SonicWall NSa 2800 / NSa 3800?

The SonicWall NSa 2800 and NSa 3800 are high-performance next-generation firewalls (NGFWs) designed for medium to large enterprises, delivering best-in-class security efficacy, scalable performance, and simplified management at a low TCO. Built to handle high-speed encrypted traffic and advanced threat protection, these firewalls provide intrusion prevention, anti-malware, content filtering, and application control without compromising performance. With enterprise-grade security, secure SD-WAN, and cloud-based management, the NSa 2800 and NSa 3800 ensure seamless protection across distributed environments, reducing operational complexity and security costs. Get industry-leading security and efficiency while optimizing your cybersecurity investment.

Key Features:

  • Cloud / Centralized Management (NSM) included
  • Multiple licensing models
  • Better TCO
  • Best-in-class Threat Protection Throughput
  • Zero-touch Provisioning and Simplified Management
  • Zero-Trust Edge Support

Hardware, Deployment, Licensing & Support

How many ports are on the NSa2800 and NSa3800?

SonicWall NSa2800 has 16 x 1G Copper / Ethernet Interfaces and 3 x 10G SFP+ Interfaces, a total of 19 ports, along with a dedicated Management port and a Console port.

SonicWall NSa3800 has 24 x 1G Copper/Ethernet Interfaces and10 x 10 SFP+ Interfaces, a total of 34 ports, and a dedicated Management port and Console port.

Does NSa 2800/3800 have support for Redundant Power Supply?

Yes, both NSa2800 and NSa3800 support an optional Redundant power supply.

Do NSa2800 and NSa3800 support Cellular dongles?

Yes, SonicWall NSa2800 and NSa3800 support USB Cellular dongles – USB Type-A

Does the SonicWall Express App support SonicWall NSa2800 and NSa3800?

Yes, the SonicExpress mobile application supports the new SonicWall NSa2800 and NSa3800.

What are the new licensing options available with NSa2800 and NSa3800?

NSa2800 and NSa3800 can be purchased with three licensing tiers/bundles: EPSS- Essential Protection Service Suite, Advanced Protection Service Suite-APSS, and Managed Protection Service Suite-MPSS.

Both NSa2800 and NSa3800 can be purchased as hardware-only SKUs. Unlike the SonicWall TZ80, no subscription is necessary for them to function. However, we highly recommend licensing security services.

SonicWall NSa2800 and NSa3800 now include Centralized Management with every Support SKU, giving you seamless centralized configuration, change management, and zero-touch deployment—all at no extra cost! Simplify security, reduce IT overhead, and gain enterprise-level visibility with ease.

The following table provides detailed features for each of the service subscription licenses.

Feature

Hardware only

EPSS

APSS

MPSS

24x7 Support

Optional+

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Centralized Management & Orchestration

Included with Support License

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Layer 4/7 Stateful Firewall

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Application Control

Optional+

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Intrusion Detection & Prevention

Optional+

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Content & Reputation-based Filtering

Optional+

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Capture ATP Sandboxing

Optional+

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

DNS Filtering -Advanced

Optional+

Optional+

Checkmark with solid fill

Checkmark with solid fill

Basic Reporting

Optional+

Checkmark with solid fill

Checkmark with solid fill

Checkmark with solid fill

Advanced Reporting and Analytics

Optional+

Optional+

7-Day (Expandible to 30, 90, 365 days)

30-Day (Expandible to 90, 365 days)

24x7 Managed Firewall & Enhanced Support

Checkmark with solid fill

Embedded Firewall Warranty by

Up to $100K

Up to $100K

Up to $200K

Table:1

+ Optional SKUs are available as add-ons or A-la-Carte for specific features/functions.

Settings Migration

Is a migration tool available for NSa2800 and NSa3800?

No, it is not required. The SonicWall NSa2800 and NSa3800 support migrating in-product / on-box settings from:

Export the settings/ EXP file from NSa2600/NSa2700 to NSa2800

Export the settings/ EXP file from NSa3600/NSa3650/NSa3700 to NSa 3800

With the introduction of NSM 3.0, we have a migration application on NSM that supports converting EXP/settings files from NSa2600/NSa2650 onto NSa2800.

Which models are supported for on-box migration experience on NSa2800 and NSa3800?

NSa2800 supports in-product / on-box migration experience from NSa2600 and NSa2700 firewall models running the latest software versions like 6.5.4.13-105n/above and 7.0.1-5145/above

What configurations are not supported during the migration?

Interfaces like U1, VLAN, WLAN, and Tunnel are not supported during the migration. We recommend performing export/import for simple settings migration cases for bulk settings migration assistance, such as address objects, address groups, service objects, service groups, access rules, NAT Policies, and Route Policies. An error is displayed for all unsupported migrations.

Note: The above-listed limitations will not apply when migrating settings from a NSa2700 to NSa2800 and a NSa3700 to NSa3800.

Cloud Management, Reporting and Analytics

Which version of NSM can manage NSa2800 and NSa3800?

NSM version 3.0 and above can manage the NSa2800 and NSa3800 firewalls.

Do I need to pay for Cloud / Centralized management separately?

The support SKU or the EPSS, the APSS or MPSS license bundle includes cloud management at no additional cost. The APSS and MPSS bundles also include advanced reporting and analytics. Please refer to Table 1 for more details.

What cloud management services are included in each of the bundles?

NSa2800 and NSa3800 Support SKU include Support and Cloud Management with 7-day alerting. 7-day alerting refers to firewall UP/DOWN event reporting.

EPSS includes selective security services with 7 days of Basic Reporting.

APSS includes all the security services with Advanced cloud reporting and analytics for 7 days of data.

MPSS includes all security services, firewall-managed services, and 30 days of Advanced cloud reporting and analytics.

Are the flex packages available for cloud reporting?

We offer flex packages to add 30/90/365 days of Advanced Analytics and Reporting.

What is new in NSM 3.0?

NSM 3.0 brings in exciting new features. Please refer to the NSM 3.0 FAQ for more details:https://www.sonicwall.com/support/knowledge-base/250425105502713

Orderability & Activation

Is subscription mandatory for NSa2800 and NSa3800 to operate?

No, SonicWall NSa2800 and NSa3800 will operate as designed, even without any active service on the firewall, though this is not recommended.

What licenses besides EPSS, APSS, and MPSS hardware bundles are available?

Renewal SKUs for EPSS, APSS, MPSS, and flex SKUs for NSM Advanced reporting and analytics are available.


Customer Loyalty & Technology Migration Programs

Are NSa2800 and NSa3800 part of the Customer Loyalty Program?

Yes, buyers can use Secure Upgrade Plus to upgrade from their legacy firewalls to NSa2800/NSa3800 and qualify for special offers.

Are NSa2800 and NSa3800 of the SonicProtect Subscription Program?

Businesses can leverage SonicProtect Subscription on the 2600/3600 firewalls and upgrade to NSa2800/NSa3800 to enable cost protection and lock prices on multi-year APSS services.

Is 3&Free available for NSa2800 and NSa3800?

Yes, buyers can leverage the 3&Free promotional program with Cloud Secure Edge (CSE).

Gen 6/6.5 renewal price rises - effective 1st May

10/02/2025
by Paul Heritage

Raised Gen 6/6.5 renewal pricing: Announced 10th February, effective 1st May. 20% price increase on Gen 6/6.5 renewal SKUs. Please note that this is just a notification and will not be effective until May.

Gen 6 firewalls were launched in 2013 and Gen 6.5 firewalls launched in 2017 and are both approaching the end of support. Price adjustments are necessary for these appliances due to inflationary, logistical, and operational costs associated with maintaining legacy products.

Beat the increase and buy renewals before 1st May, or upgrade to a new Gen 7.

Subscriptions

Upgrades