Check the latest blogs and updates from SonicWall-Sales.com
SonicWall Announce New Gen7 TZ270, TZ370 & TZ470 Series
The latest SonicWall TZ series, are the first desktop form factor next generation firewalls (NGFW) with 10 or 5 Gigabit Ethernet interfaces. The series consist of a wide range of products to suit a variety of use cases.
Designed for small, mid-sized organizations and distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated security effectiveness with best-in-class price performance. These NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, realtime breach detection and prevention.
New full Gen7 firewall range datasheet: SonicWall TZ270 TZ370 TZ470 TZ570 TZ670 Gen7 TZ Series Datasheet
Popular SonicWall Firewall Configurations
This article lists all the popular SonicWall configurations that are common in most firewall deployments.
- Configuring LAN Interface
- Configuring the WAN (X1) connection
- Configuring other interfaces (X2, X3 or DMZ etc)
- Port forwarding to a server behind SONICWALL
- Configuring remote VPN connections (GroupVPN, GVC, SSL-VPN, L2TP, etc.)
- Site to Site VPN and Route Based VPN configuration
- Configuring Wireless
- Connect via Console
- Resetting the SonicWall and Uploading firmware
- Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.)
- Configuring user authentication
- Configuring High Availability
- Installing GMS/Analyzer
Configuring LAN Interface
Configuring SonicWall DHCP server settings
Configuring the WAN (X1) Interface
- How to configure the WAN / X1 Interface with PPPoE Connection?
- How to configure the WAN / X1 Interface with Dynamic / DHCP IP address?
- How to configure the WAN / X1 Interface with Static IP address?
- How to configure the WAN / X1 Interface with L2TP Connection ?
- How to configure the WAN / X1 Interface with PPTP Connection?
- How to change the MTU size?
- WWAN/3G/4G Mode
Configuring other interfaces (X2, X3 or DMZ etc)
- Configuring the DMZ / OPT Interface in NAT Mode
- How to Configure an interface as Secondary WAN port in SonicOS
- Configuring VLAN's with the SonicWall appliances with Cisco L2 Switch
Upgrading to latest Firmware
- Procedure to upgrade the SonicWall firmware Image with Current Preferences
- Registering the SonicWall UTM Appliance with MySonicWall.com
- How to download the latest SonicOS Firmware Version?
Port forwarding to a server behind SonicWall
- How to Enable Port Forwarding and Allow Access to a Server Through the SonicWall
- How to Open ports on the Firewall using the Configuration Wizard
- How to Enable Port Forwarding and Allow Access to a Server Through the SonicWall via the CLI
Configuring remote VPN connections. (GroupVPN, GVC, SSL-VPN, L2TP, etc.)
- How to Configure WAN GroupVPN to connect using Global VPN Client?
- How to setup SSL-VPN feature (NetExtender Access)
- How to create Bookmarks for specific users for the SSL VPN service
- Configuring L2TP Server
- How to configure the WAN / X1 Interface with L2TP Connection?
Site to Site VPN and Route Based VPN configuration
- Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites)
- Configuring Site to Site VPN when a Site has Dynamic WAN IP address (Aggressive Mode)
- How to configure numbered Tunnel Interface VPN (Route-Based VPN)
- How to configure NAT over VPN in a site to site VPN with overlapping networks
- How to configure WGS (Wireless Guest Services) in SonicWall TZ devices with built-in Wireless
- How to configure WEP Encryption in SonicWall TZ devices with built-in Wireless?
- How to configure WPA Encryption in SonicWall TZ devices with built-in Wireless?
- With SonicPoints
- How to manage SonicPoint Access Points and upgrade SonicPoint firmware
- How to configure Wireless with SonicPoint using WPA encryption
- How to configure Wireless with SonicPoint using WEP encryptionVirtual Access Points (VAP)
- Configuring a Virtual Access Point (VAP) Profile for Wireless Corporate Users using SonicPoints
Resetting the SonicWall, Diagnostic Files and Uploading firmware
- How To Put the SonicWall into Safe Mode
- How to Upgrade SonicOS Firmware
- Understanding and resolving preferences corruption after an attempted "downgrade" of firmware
- Can Settings be Exported/Imported from one SonicWall to Another? (Support Matrix)
Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.) and configuring user authentication
- Using custom Content Filter policies to block Internet access to a specific group (CFS + ULA + local groups)
- Integration of LDAP and multiple/Custom CFS policies for different user groups (ULA + CFS + LDAP)
- Using Multiple Custom content Filter policies with LDAP and SSO to restrict Internet access (CFS + LDAP + SSO)
- Upgrade from CFS 3.0 App Rules Mode to CFS 4.0
- Upgrade from CFS 3.0 Zones and Users Mode to CFS 4.0
- Content Filtering Service (CFS) 4.0 Overview - SonicOS 6.2.6 and above
Configuring user authentication
- How to configure IAS RADIUS Authentication
- Integration of LDAP and multiple/Custom CFS policies for different user groups - ULA + CFS + LDAP
- Configuring Single Sign-On
Configuring High Availability
- How to Configure High Availability (HA)
- Stateful and Non-Stateful High Availability Prerequisites
- Tips for High Availability (HA) setup
- How to Backup/restore the configuration and data from Analyzer (Windows)
- How do I install a fresh instance of Analyzer?
- How to install GMS/Analyzer Software on a Windows System
Upgrade your firewall to the latest firmware
To keep your security appliance updated against known threats you need review and update your current software and firmware. This week SonicWall announced an update to fix a potential issue with SSLVPN.
Please read the attached link and download & apply firmware as detailed.
Supported SonicWall & 3rd Party SFP / SFP+ modules that can be used with SonicWall firewalls
SonicWall have just updated the list of support SFP and SFP+ modules that work with SonicWall firewalls - including the new Gen7.
SonicWall Product Comparison
Official SonicWall page for comparing the different model groups.
TZ Entry-Level Firewall Compare: https://www.sonicwall.com/tz-entry-level-firewall-series-products-compare-2/
Mid-Range Firewall Comparison: https://www.sonicwall.com/mid-range-products-compare/
‘3 & Free’ Promotion: How to Upgrade Your SonicWall Firewall for Free
What is the SonicWall ‘3 & Free’ Promotion?
The limited-time SonicWall ‘3 & Free’ promotion is the easy, cost-effective way for customers to upgrade to the very latest SonicWall next-generation firewall appliance for free.
Through Oct. 31, 2020, eligible customers may receive a complimentary NSa 2650, TZ350 or SOHO 250 appliance by purchasing a bundle that includes a three-year subscription of the SonicWall Advanced Gateway Security Suite from their authorized SonicWall SecureFirst partner.
This security suite includes everything you need to stay protected against today’s modern attacks, including advanced malware, ransomware, encrypted threats, viruses, spyware, zero-day exploits and more. This complete service includes:
- Capture Advanced Threat Protection (ATP) sandbox
- Gateway Anti-Virus and Anti-Spyware
- Intrusion Prevention Service
- Application Control
- Content Filtering Service
- 24×7 Support
SonicWall’s exclusive security subscription service also includes SonicWall Real-Time Deep Memory Inspection (RTDMI). A patent-pending technology, RTDMI™ enables Capture ATP to detect and block malware that does not exhibit any malicious behavior or hides weaponry via encryption. This protects your organization from zero-day attacks, malicious PDFs and Microsoft Office files.
How to configure SSL VPN on SonicWall
SL VPN license ultimately allows users who are working or operating remotely to connect to internal networks and resources safely and securely through the SonicWall.
Setup of SSL VPN is through the software solutions; SonicWall SSL VPN client, NetExtender, and the SonicWall mobile connect client.
Configuring SSL VPN on the 7.X SonicOS
For the address ranges within SSL VPN IP v4, you first need to create your address object.
An administrator will need to log in to your UI firewall management and choose object from the menu.
Look for match objects and addresses, and then click add.
A second window will appear where you can then include the identified range for SSL VPN.
You then need to configure the SSL VPN by navigating to within the server settings to network SSL VPN and opting for SSL VPN status on zones.
From here, you can change SSL VPN access by switching to enable or disable (note, green indicates an active status).
Within the SSL VPN server settings, you then have the option to select domain and SSL VPN port.
(Note: the port option will be required if you connect using the NetExtender and mobile connect methods. The domain will be necessary for the user to gain
access to the networks and log in.)
From the client settings – SSL VPN Network, choose default device profile and set the SSL VPN for zone IP v4 and set the address object generated previously as the Network address IP v4.
The tab across the top of the window labelled client routes allows you to manage what levels of network access remote users can be permitted via their connection.
The last tab, client settings, allows administrators to input suffix, WINS, and DNS information and control the caching passwords, behaviour of NetExtender clients, and usernames.
Change create client connection profile to enable and save all changes.
Adding additional SSL VPN users
NetExtender users can authenticate SonicWall for local users, or if they’re listed within a known group, this can be done through LDAP.
To add local users, you need to be within local users and groups, which can be found within, device and users. You can now add new users by simply clicking add.
Moving to the tab labelled groups, click SSL VPN services, and move this across to member of, section.
Moving across to VPN access, you can now add all relevant areas that the user will need access to.
Again, make sure to click save before closing the window.
For the zones of SSL VPN, it’s important to check access rule information.
To do this you need to access, access rules by following policy – rules and policies, then choose SSL VPN – LAN rules. If a user requires access to other zones to obtain resources, this can all be managed in this area by verifying and adding additional access rules as you go.
Configuring SSL VPN for the 6.5 SonicOS
Similar to the SonicOS 7.x, administrators will need to log in to the management platform of SonicWall and within the navigation menu choose manage and then address objects.
From here, click add.
A second window will appear where you now have the option to add your range for SSL VPN.
To configure these settings, click on SSL VPN on the settings page and go to WAN, changing it from red to green to show it is now active.
Now all SSL VPN configurations will be enabled on this particular zone.
You can then set the domain and ports for SSL VPN as you require.
Move across to client settings where, as administrator, you can configure the range of client addresses and NetExtender settings.
For the default device profile, click on configure.
Here you can set the network address v4 IP as your address object from before and set the zone v4 IP as SSL VPN.
The tab labelled client routes will allow administrators to manage the level of access users have to networks.
It’s essential to set the VPN appropriately as all users will be able to see the routes but may not necessarily be authorised to access all network resources.
In the settings, administrators should also enter all required DNS and WINS data and create client profile connections by enabling this action.
Adding additional users
To add new users, click on users and local users and groups. Within groups, click add SSL VPN services to move the field to member of.
Moving to VPN access, you can then add all the relevant IP addresses and objects identified to the users requirements, in terms of access via NetExtender.
Note: Client routes and VPN access must match for users to have authority to access network resources.
Remember to click save, to save all changes before closing.
SSL VPN zones access rule details
Within access rules, you can access SSL VPN LAN rules with drop-lists available.
Access rules allow access to intended end devices through SSL VPN IPs which are also required for the firewalls to understand that such traffic is allowed through.
You can also test all connections and configurations by installing the SonicWall NetExtender.
Two final points to note:
Remember, within the user’s section of the menu toolbar, you must add in however many users that will have login credentials. Each user then must become a member of SSL VPN services group and have xo subnet added to VPN access within the allow list.
In-network interfaces make sure to click on configure on the WAN interface and tick the HTTPS box beside the user login – this helps to minimise login failed attempts occurring when users access SSL VPN via a web portal.
For further information on a SonicWall VPN licence and more call 0330 1340 230, today.
Setting up SSL VPN
SonicWall's security appliance features SSL VPN, providing secure remote access to networks using the NetExtender client.
Below, we outline the steps required to help configure the SonicWall SSL VPN setup, allowing you to run applications securely across your company's network.
Remote users will use NetExtender to access your networks and anything contained within these, i.e., documents, shared files, etc.
Typically users access NetExtender either by clicking on the NetExtender button found when logging in to the virtual office web portal or by launching the NetExtender as a standalone client (once installed, it will remain as a shortcut or within the Start menu making it easy to access after that).
How to setup SSL VPN for SonicOS 7.X
When setting up SonicWall SSL VPN on the latest 7.X firmware, the following instructions should help.
1. With the server settings, look for SSL VPN, Network.
2. Choose SSL VPN status on zones
3. You can choose whether you want and need to disable or enable access to SSL VPN (moving it to a green status means it is active).
4. You then need to move to the server SSL VPN settings. Here choose the port SSL VPN and the desired domain and configure within client settings SSL VPN, Network.
5. With the client settings, SSL VPN, you're able to configure the NetExtender client settings and the client address range information, i.e., which IP's you will provide for those connecting clients and where users can log in from.
6. For the default profile of the device, click on configure.
7. Change the Network IP v4 Address to the address range you inputted in point 5 and set the Zone IP V4 as SSL VPN.
8. Within client routes, you can now control network access for all users, deciding on what can and can't be accessed across the network.
9. The last tab, client settings, is where you can input Suffix, WINS, and DNS information, all while managing usernames, caching passwords, etc.
10. You must enable the create client profile connection for the NetExtender to make a connection and record the server name for the SSL VPN and domain name too.
11. To configure the SSL VPN virtual office's functionality and appearance, you need to use the SSL VPN portal settings page.
12. All SSL VPN users must be part of a user group or SSL VPN services member. To check this and change as appropriate within; device - users – local users and groups.
13. Moving across to VPN access at the top of the screen, you can choose one or more networks from the list, clicking the arrow button to move them directly across to the access list. If you need to change or remove a user's access rights, select the network from the access list and click on the arrow pointing left.
14. Finally, within policy, rules and access rules, set the SSL VPN to LAN rules. And if a user requires access to other zones, you can add and verify these via the access rules page.
SSL VPN setup for SonicOS 6.5
1. Select the SonicWall application and click on manage – SSL VPN settings.
2. To configure these client settings, you need to be on the SSL VPN client settings page where you can input the address range for the client, NetExtender information, and where the users will be able to log in.
3. Within the settings tab, make sure to select both network address IP V4 and Zone IP.
4. To allow the right level of access for users, administrators will need to set this within SSL VPN – client routes page.
5. To configure client settings for the NetExtender, the create client profile connection must be enabled.
6. For the virtual office portal's appearance and functionality, these elements must be configured within SSL VPN – portal settings.
7. Administrators will need to manage users and groups of users through users – local users and moving each member to the appropriate services group. When configuring local users, navigate to manage and system setup – local users and groups, you can then add SSL VPN services. To set local and LDAP user groups, you must edit SSL
VPN services and add the specified user group within the member's tab.
8. Within VPN access, you will see what users can access what networks. You can also add more networks to the access list as required. Of course, these can also be removed by carrying out the same procedure in reverse..
9. Note the new SSL VPN areas within firewall – access rules.
10. SSL VPN zones will auto-create firewall access rules; however, these can be modified, allowing access to only those users that have been configured.
11. Administrators should follow manage – network – interfaces, and within the WAN interface, administrators must ensure HTTPS is enabled.
Both of these SonicWall SSL VPN setup procedures can be tested via users through the SonicWall's public IP – always recommended.
Protecting your business during a global crisis
COVID19 has had a dramatic effect on the world. With companies changing the way they operate and work and teams are looking at different ways to communicate and access information.
A business’s focus during this time is on how they will continue to operate. And in all instances, people ultimately need access to the tools and information to help them get the job done.
To help keep businesses running and operating as smoothly as possible, we take a look at some of the best practices for businesses and why they're so important when protecting the business from a global health crisis.
A firewall approach to a global health crisis
During the Coronavirus pandemic, each country has taken its own approach to protect its people.
Countries like Japan have almost used the technological concept of firewalls and built their own manmade firewall around their cities. They were restricting travel, placing quarantine restrictions on areas, and limiting the volume of people coming in and out of the country.
Japan's focus was to create a firewall that blocked the Coronavirus's inflow, just like a firewall blocks malware accessing its networks and spreading.
However, as Japan found out, firewalls have to be robust, with no room for error or indeed holes in the system.
So, what can businesses of all shapes and sizes do to protect their online networks further?
Protecting business during the global crisis
1. Make sure you have a robust business continuity plan
Your business continuity plan is not just a nice to have; it's a must-have. It should be a plan covering everything from adverse weather conditions to cyber-attacks, global pandemics, and more! It's advisable that these plans are checked and played out (to some extent) annually and should account for all business areas, including infrastructure, technology, communication, etc.
2. Securely expand remote working
Remote working is not a new concept; however, having your entire workforce working remotely is unique! The problem that most businesses have come across when expanding their remote working capabilities is that they don't have enough VPN (a virtual private network) licences to accommodate everyone.
This can be a risky place to be in, not only because your employees no longer have access to information and applications needed to do their jobs, but you also run the risk of employees trying to access networks via non-secure connections.
Businesses need to look at scalable, secure remote access solutions that can easily cope with an increase in users should the need ever arise.
3. Watch out for fear-based cyber attacks
Fear-based cyber campaigns are common among cybercriminals, and organisations must ensure that they have high or increased email security levels in place to help mitigate these cyber fear attacks.
Office 365 security, cloud application security, and endpoint protection solutions should all be implemented to prevent phishing attacks compromising networks.
4. Look after your endpoints
With more people working remotely, businesses must look at proactive endpoint protection that prevents attacks before, during, and after their execution.
Why cybersecurity matters now more than ever
We have an increased dependency on digital infrastructures. Today the internet and its many communication channels have become the only method (at times) for social/human interaction.
With more work from home policies coming into effect than ever before, workforces have been confined to social media posts, video calls, chat programmes, etc.
With this in mind, a cyberattack now, of any sort, on an organisation's network or across a family's devices would be devastating. Not only because of what the attack could cost you financially but because of what it can do to our mental well-being as all communication is lost.
Fear. As we've mentioned previously, cybercriminals are renowned for exploiting human weakness and thrive in the knowledge that people will, unfortunately, make more mistakes in times of global crisis. We need to be careful whom we trust with our data online.
For example, a recent cyber-attack occurred, which centred on a map that seemed to display Coronavirus statistics. However, Malware was concealed in this download, which then ran a malicious application on the computer and allowed hackers to access passwords and more.
Staying safe online
It's important to remember some best practice points when working from home or when looking at increasing your level of security online:
- Make sure you have a long, complex router password
- Check all firewalls are active on your router
- Don't reuse passwords across the internet
- Use only reliable VPN when accessing anything online
- Don't click links within emails that you're unsure of
- Be careful whom you give your details to
- Be sure to check the source of all URLs and ensure all apps and programmes you download are the original versions
- Update your system software and applications regularly.
Software for business protection
SonicWall-Sales firewalls help to provide the critical security business solutions that organisations need, now.
Also, providing remote connectivity, cloud application security, and endpoint protection, make sure to call the team to find out how SonicWall can help keep your business safe now and during a global crisis.
How your SonicWall Firewall can protect you against even the worst cyber attacks
Most people who are using some form of device connected online will have had, or fallen victim to a data breach, where their personal information has been compromised.
2020 has put the world in an uncompromising position as offices close and remote working and working from home becomes the norm.
Unfortunately, with this, there is also an increase in the risk of cyber-attacks and, most definitely, data security breaches.
Below, we take a look at those 2019 cyber-attacks that, while not the biggest, had the most considerable impact, and just what measures you can put in place to prevent them from happening again.
Cyber Attacks we must learn from
With the gaming sector bigger than Hollywood and the music industry combined, it fast became a high-profile cyber target. And in 2019, the popular game, Fortnite, suffered a large-scale cyber-attack.
Hackers took their opportunity when a vulnerability was found in the games login systems. At this stage, hackers were able to impersonate actual players, view game details, chats, and purchase currency, which could then be moved to their own accounts.
Of course, this issue was quickly rectified; however, the volume of people affected and impacted by the hack is huge.
Georgia Institute of Technology
Unfortunately, Georgia Tech found a vulnerability in its web application a little too late. It was reported that cybercriminals gained access to a personnel database containing 1.3 million individuals, both students, and staff, personal data.
An awful breach in 2019 that resulted in the loss of a considerable volume of medical data – Quest Diagnostics was identified as being the biggest single breach in this category, with 11.9 million patients affected.
The data stolen included patients' credit card details, medical information, and personal identity information – all adding to the cybercriminals armour ready for blackmail and identity theft purposes.
Toyota faced a serious hacking attack in April 2019, when 3.1 million customers and employees had their personal information stolen. Names, birth dates, and more were all taken when hackers gained access to Toyota's internal computer systems.
How could we forget about Facebook with all of the daily media reports! As a social networking platform, Facebook is constantly under review, and when not one, but two breaches related to privacy were detected in 2019, we fast saw Facebook users (approx. 2 million) have their personal information exposed.
The silver lining is that these particular vulnerabilities weren't uncovered by cybercriminals but rather researchers looking for security flaws.
First American experienced a big blunder when they found out in April that 885 million customer records were available on their website for simply anyone to steal. With information dating back to 2003, records included customer's social security numbers, driving licence details, financial data, and more!
A malware attack that was widely distributed throughout 2019, Magecart affected an estimated 18,000 web hosts! This piece of malware hijacked the online cart systems that people use when making an online purchase—stealing people's financial details throughout the process.
Choice Hotels fell victim to ransomware back in August 2019 when approximately 700,000 customer records were accessed. A ransom note placed over the server demanded Choice to pay in Bitcoins for the stolen data's safe return.
Australian company Canva was targeted in May by cybercriminals who claimed they had accessed over 139 million users' details, which they were planning on selling on the dark web!
The failure to patch a known vulnerability, in a timely fashion, can have severe consequences. Not only this, but unsecured databases that are left exposed online are also a significant problem.
Learning from our experiences, we understand that data breaches and cyber-attacks can come in various forms.
We also know that, unfortunately, cyber-attacks aren't going anywhere fast, which means for businesses and individuals, we need to look to increase and take charge of our cybersecurity now.
Ideally, taking a layered and robust approach to cybersecurity is required today, as is real-time cyber-attack detection and robust prevention platforms, like the
SonicWall Firewall systems.
Best practice for tackling cybercrime includes:
- Scaling your cybersecurity throughout all networks (wired, wireless, and mobile).
- Using firewalls to fight against advanced cyberattacks.
- Put in place cybersecurity layering measures with sandboxing, ideally opting for SonicWall Security.
- Implement robust email controls to prevent phishing attempts.
- Plan your network data.
And most importantly…
- Assess your business's cyber strategy and the landscape that you operate in – continuously.
According to research by IBM, the cost of an average data breach can be up to $3.92 million with FireEye reporting that just under half of all businesses are prepared to face a cyber-attack or data breach.
Businesses must protect their data now more than ever. Let SonicWall help you.
Call 0330 1340 230.
SonicExpress Mobile Application
TZ570 and TZ670 Series firewall customers now have a new way to ease and enhance their onboarding experience.
For most of us, mobile devices are becoming the go-to means for getting work done in a digitally connected world. By 2023, the number of mobile device users will increase to 7.33 billion — and by 2025, 72% of those accessing applications and the web will do so with smartphones alone.
Network admins are also utilizing mobile devices to get work done: These devices allow them to extend their presence, enabling faster responses and easier network configuration and setup.
As part of our commitment to anytime, anywhere cybersecurity, SonicWall is launching the SonicExpress mobile app. The SonicExpress mobile app greatly simplifies firewall onboarding: device registration, initial setup, basic configuration, and monitoring for 7th generation SonicWall firewalls, including the recently launched TZ670 and TZ570 series. Designed for the Apple and Android platforms, the SonicExpress app is now available for download from the Apple App Store and the Google Play Store.
Onboarding as easy as 1, 2, 3
The typical onboarding process involves appliance registration and several other steps that must be completed in order to get a new firewall ready for configuration and use. With SonicExpress, the onboarding experience of a new firewall involves just three simple steps:
- Launch the SonicExpress App on a mobile device
- Connect a mobile device USB cable to the new firewall
- Finish setup
Designed with intuitive interfaces, the SonicExpress app guides the user through device registration and initial setup in less than a minute.
Simplified initial firewall setup
Zero-touch deployments require firewalls to connect to the internet using a DHCP address on the WAN interface. However, in certain deployments, WAN interfaces are assigned static IP addresses or configured over a PPPoE interface. For closed network deployments, there is typically no internet connectivity for the firewall being set up. The app helps with these and other initial setup configurations by connecting the firewall using the USB interface.
The SonicWall Express Setup Guide walks users through the process of getting their firewall registered and set up for specific deployment use cases. Alternately, users can choose to register the firewall without going through the entire setup process by simply scanning a QR code.
Monitoring your firewall
The SonicExpress app allows users to monitor firewalls for threat alerts, resource utilization and system status via an intuitive dashboard. It offers the flexibility of being able to check the health of your network from anywhere and the convenience of being able to make easy, quick changes necessary to ensure the security posture of your network.
There’s more coming
This is just the initial release of the app — we’ll be adding more features in future releases, including firmware management and advanced configuration capabilities similar to those available on the web management interface.
SonicWall announces new technology
Today, SonicWall announce the following new technology that simplifies proven security for newly extended distributed enterprises, governments and MSSPs; expand breakthrough economics to high-security environments; maximize investments by delivering proven, future-proof security; and make security administration easier and more accessible to more organizations.
- New SonicOS 7.0 simplifies the security experience with an all-new user interface and experience (UI/UX), which is smartly organized, includes intelligent device dashboards, re-designed topologies, SonicExpress mobile app support, and simplified policy creation and management.
- New SonicOSX 7.0 lets governments and enterprises scale faster, protect more and maintain control. The enhanced OS simplifies complex policy, audit and management controls — all while delivering the fresh, modern and easy-to-use UI/UX available on the new SonicOS 7.0 offering.
- New SonicWall Network Security Manager (NSM) 2.0 helps organizations re-gain visibility for sprawling, mass-scale environments. Optimize, control, monitor and manage tens of thousands of network security devices, including firewalls, managed switches and access points. A cloud-native management platform, NSM is designed for speed, scalability and reliability across the largest distributed enterprises.
- New SonicWall NSsp 15700 high-end firewalls, with multiple 100/40/10 GbE interfaces, TLS 1.3 support and compute-cluster-like processing capacity, help enterprises, governments, data centers and MSSPs get more from their investments as resource utilization and connection requirements grow with the explosion of connected devices and users.
- New SonicWall TZ570 and TZ670 next-generation firewalls are the first desktop firewall form factor to offer multi-gigabit (5/10G) interfaces for connectivity with SonicWall Switches or other networking devices in SD-Branch deployments — all with more than three times the threat performance and TLS 1.3 support.
- New SonicWall NSv 270, 470 and 870 virtual firewalls simplify protection of private and public cloud assets with scalable, virtual and cost-effective security.
- New SonicWall SonicExpress allows administrations to manage security on the go. Complete the most common management tasks, including firewall registration, setup, configuration and monitoring, and easily onboard new firewalls within minutes with three easy steps: register, connect and manage.
- New SonicWall CSa 1000 stops advanced cyberattacks that target large networks via an all-new on-premise appliance. CSa includes access to RTDMITM, which provides network-based protection against the future of side-channel attacks such as Meltdown, Spectre, Foreshadow, PortSmash, Spoiler, MDS and TPM-Fail.
For the full announcement, please read the press release, explore additional details on the SonicWall blog and see the new line of NSsp firewalls, TZ firewalls, NSv firewalls, NSM 2.0 and CSa 1000. SonicWall’s commitment has always been to help protect you, your business and your brand in the new business normal. Today, it’s never been easier to realize true cybersecurity by breaking free from the constraints of the past.