SonicWall TZ350 and TZ350 Wireless
The SonicWall TZ series enables small to mid-size organizations and distributed enterprises to realize the benefits of an integrated security solution that checks all the boxes.
The SonicWall TZ350 series offer an all-in-one solution that protects networks from advanced attacks. These UTM firewalls combine high-speed intrusion prevention, anti-malware and content/URL filtering plus broad secure mobile access support for laptops, smartphones and tablets along with optional integrated 802.11ac wireless.
Superior threat prevention and performance
Our vision for securing networks in today’s continually-evolving cyber threat landscape is automated, realtime threat detection and prevention. Through a combination of cloud-based and on-box technologies we deliver protection to our firewalls that’s been validated by independent third-party testing for its extremely high security effectiveness.
Easy deployment, setup and ongoing management
SonicWall makes it easy to configure and manage TZ series firewalls no matter where you deploy them. Centralized management, reporting, licensing and analytics are handled through our cloud-based Capture Security Center which offers the ultimate in visibility, agility and capacity to centrally govern the entire SonicWall security ecosystem from a single pane of glass.
Protect your small business or branch location from intrusion, malware and ransomware with an easy-to-use, integrated security solution
The SonicWall TZ series enables small to mid-size organizations and distributed enterprises realize the benefits of an integrated security solution that checks all the boxes. Combining high-speed threat prevention and software-defined wide area networking (SD-WAN) technology with an extensive range of networking and wireless features plus simplified deployment and centralized management, the TZ series provides a unified security solution at a low total cost of ownership.
Flexible, integrated security solution
The foundation of the TZ series is SonicOS, SonicWall’s feature-rich operating system. Firewalls supporting the latest SonicOS 7.0 OS, features new modern-look UI/UX, advanced security, networking and simplified policy management capabilities.
SonicOS further includes a powerful set of capabilities that provides organizations with the flexibility to tune these Unified Threat Management (UTM) firewalls to their specific network requirements. For example, creating a secure high-speed wireless network is simplified through a built-in wireless controller which supports IEEE 802.11 standards or by adding our SonicWave 802.11ac Wave 2 access points. To reduce the cost and complexity of connecting high-speed wireless access points and other Power over Ethernet (PoE)-enabled devices such as IP cameras, phones and printers, the TZ300P, TZ600P and TZ570P provide PoE/PoE+ power.
Easy deployment, setup and ongoing management
SonicWall makes it easy to configure and manage TZ series firewalls and SonicWave 802.11ac Wave 2 access points no matter where you deploy them. Centralized management, reporting, licensing and analytics are handled through our cloud-based Capture Security Center which offers the ultimate in visibility, agility and capacity to centrally govern the entire SonicWall security ecosystem from a single pane of glass
A key component of the Capture Security Center is Zero-Touch Deployment. This cloud-based feature simplifies and speeds the deployment and provisioning of SonicWall firewalls at remote and branch office locations. The process requires minimal user intervention, and is fully automated to operationalize firewalls at scale in just a few steps. This significantly reduces the time, cost and complexity associated with installation and configuration, while security and connectivity occurs instantly and automatically. Together, the simplified deployment and setup along with the ease of management enable organizations to lower their total cost of ownership and realize a high return on investment.
Centralized Management and Reporting
For highly regulated organizations wanting to achieve a fully coordinated security governance, compliance and risk management strategy, SonicWall provides administrators a unified, secure and extensible platform to manage SonicWall firewalls and their network. Enterprises can easily consolidate the management of security appliances, reduce administrative and troubleshooting complexities, and govern all operational aspects of the security infrastructure. In addition, enterprises meet the firewall’s change management requirements through workflow automation which provides the agility and confidence to deploy the right firewall policies at the right time. SonicWall management and reporting solutions provide a coherent way to manage network security by business processes and service levels, dramatically simplifying lifecycle management of your overall security environments compared to managing on a device-by-device basis.
Advanced Threat Protection
At the center of SonicWall’s automated, real-time breach prevention are two advanced malware detection technologies; Capture Advanced Threat Protection (Capture ATP) and Capture Security appliance (CSa).
Capture ATP is a cloud-based multiengine sandbox platform, which includes Real-Time Deep Memory Inspection (RTDMI), virtualized sandboxing, full system emulation and hypervisor level analysis technology. CSa is an on premises device that features RTDMI.
Both solutions extend advanced threat protection to detect and prevent zero-day threats. In the case of Capture ATP, when files are identified as malicious, they are blocked, and a hash is immediately created within the Capture ATP database for all customers to leverage to block follow-on attacks.
For complete endpoint protection, the SonicWall Capture Client combines next generation antivirus technology with SonicWall’s cloud-based multi-engine sandbox with optional integration with SonicWall firewalls.
Integrated Security and Power for Your PoE-enabled Devices
Provide power to your PoE-enabled devices without the cost and complexity of a Power over Ethernet switch or injector. TZ300P, TZ600P and TZ570P firewalls integrate IEEE 802.3at technology to power PoE and PoE+ devices such as wireless access points, cameras, IP phones and more. The firewall scans all traffic coming from and going to each device using deep packet inspection technology and then removes harmful threats such as malware and intrusions, even over encrypted connections.
|Reassembly-Free Deep Packet Inspection (RFDPI)
|This high-performance, proprietary and patented inspection engine performs stream-based, bi-directional traffic analysis, without proxying or buffering, to uncover intrusion attempts and malware and to identify application traffic regardless of port.
|Scans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not used to distribute malware and does not become a launch platform for attacks in case an infected machine is brought inside.
|Proxy-less and non-buffering inspection technology provides ultra-low latency performance for DPI of millions of simultaneous network streams without introducing file and stream size limitations, and can be applied on common protocols as well as raw TCP streams.
|Highly parallel and scalable
|The unique design of the RFDPI engine works with the multi-core architecture to provide high DPI throughput and extremely high new session establishment rates to deal with traffic spikes in demanding networks.
|A single-pass DPI architecture simultaneously scans for malware, intrusions and application identification, drastically reducing DPI latency and ensuring that all threat information is correlated in a single architecture.
|Firewall and networking
|An alternative to more expensive technologies such as MPLS, Secure SD-WAN enables distributed enterprise organizations to build, operate and manage secure, high-performance networks across remote sites for the purpose of sharing data, applications and services using readily-available, low-cost public internet services.
|Allows the firewall to receive and leverage any and all proprietary, original equipment manufacturer and thirdparty intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised credentials, ransomware and advanced persistent threats.
|Stateful packet inspection
|All network traffic is inspected, analyzed and brought into compliance with firewall access policies.
|SonicWall TZ500 and TZ600 models support high availability with Active/Standby with state synchronization. SonicWall TZ300 and TZ400 models support high availability without Active/Standby synchronization. There is no high availability on SonicWall SOHO models.
|DDoS/DoS attack protection
|SYN flood protection provides a defense against DoS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting technologies. Additionally, it protects against DoS/DDoS through UDP/ICMP flood protection and connection rate limiting.
|Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With SonicOS, the hardware will support filtering and wire mode implementations.
|Flexible deployment options
|The TZ series can be deployed in traditional NAT, Layer 2 bridge, wire and network tap modes.
|WAN load balancing
|Load-balances multiple WAN interfaces using Round Robin, Spillover or Percentage methods.
|Advanced quality of service (QoS)
|Guarantees critical communications with 802.1p, DSCP tagging, and remapping of VoIP traffic on the network.
|H.323 gatekeeper and SIP proxy support
|Blocks spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy.
|Single and cascaded Dell N-Series and X-Series switch management
|Manage security settings of additional ports, including Portshield, HA, PoE and PoE+, under a single pane of glass using the firewall management dashboard for Dell’s N-Series and X-Series network switch (not available with SOHO model).
|Supports mobile device authentication such as fingerprint recognition that cannot be easily duplicated or shared to securely authenticate the user identity for network access.
|Open authentication and social login
|Enable guest users to use their credentials from social networking services such as Facebook, Twitter, or Google+ to sign in and access the Internet and other guest services through a host’s wireless, LAN or DMZ zones using passthrough authentication.
|Wireless Network Security
|Available as an integrated option on SonicWall TZ300 through TZ500, IEEE 802.11ac wireless technology can deliver up to 1.3 Gbps of wireless throughput with greater range and reliability. Optional 802.11 a/b/g/n is available on SonicWall SOHO models.
|Management and reporting
|Cloud-based and on-premises management
|Configuration and management of SonicWall appliances is available via the cloud through the SonicWall Capture Security Center and on-premises using SonicWall Global Management System (GMS).
|Powerful single device management
|An intuitive web-based interface allows quick and convenient configuration, in addition to a comprehensive command-line interface and support for SNMPv2/3.
|IPFIX/NetFlow application flow reporting
|Exports application traffic analytics and usage data through IPFIX or NetFlow protocols for real-time and historical monitoring and reporting with tools that support IPFIX and NetFlow with extensions.
|Virtual Private Networking
|Simplifies and reduces complex distributed firewall deployment down to a trivial effort by automating the initial site-to-site VPN gateway provisioning between SonicWall firewalls while security and connectivity occurs instantly and automatically.
|IPSec VPN for site-to-site connectivity
|High-performance IPSec VPN allows the TZ series to act as a VPN concentrator for thousands of other large sites, branch offices or home offices.
|SSL VPN or IPSec client remote access
|Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers, intranet sites and applications from a variety of platforms.
|Redundant VPN gateway
|When using multiple WANs, a primary and secondary VPN can be configured to allow seamless, automatic failover and failback of all VPN sessions.
|The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel failure, by seamlessly re-routing traffic between endpoints through alternate routes.
|User activity tracking
|User identification and activity are made available through seamless AD/LDAP/Citrix1/Terminal Services1 SSO integration combined with extensive information obtained through DPI.
|GeoIP country traffic identification
|Identifies and controls network traffic going to or coming from specific countries to either protect against attacks from known or suspected origins of threat activity, or to investigate suspicious traffic originating from the network. Provides the ability to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP address. Eliminates unwanted filtering of IP addresses due to misclassification.
|Regular expression DPI filtering
|Prevents data leakage by identifying and controlling content crossing the network through regular expression matching. Provides the ability to create custom country and Botnet lists to override an incorrect country or Botnet tag associated with an IP address.
|Capture Advance Threat Protection
|The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation, and hypervisor level analysis technology, executes suspicious code and analyzes behavior, providing comprehensive visibility to malicious activity.
|Real-Time Deep Memory Inspection (RTDMI)
|This patent-pending cloud-based technology detects and blocks malware that does not exhibit any malicious behavior and hides its weaponry via encryption. By forcing malware to reveal its weaponry into memory, the RTDMI engine proactively detects and blocks mass-market, zero-day threats and unknown malware.
|Block until verdict
|To prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the gateway until a verdict is determined.
|Broad file type and size analysis
|Supports analysis of a broad range of file types, either individually or as a group, including executable programs (PE), DLL, PDFs, MS Office documents, archives, JAR, and APK plus multiple operating systems including Windows, Android, Mac OS X and multi-browser environments.
|Rapid deployment of signatures
|When a file is identified as malicious, a signature is immediately deployed to firewalls with SonicWall Capture ATP subscriptions and Gateway Anti-Virus and IPS signature databases and the URL, IP and domain reputation databases within 48 hours.
|Capture Client is a unified client platform that delivers multiple endpoint protection capabilities, including advanced malware protection and support for visibility into encrypted traffic. It leverages layered protection technologies, comprehensive reporting and endpoint protection enforcement.
|Encrypted threat prevention
|TLS/SSL decryption and inspection
|Decrypts and inspects TLS/SSL encrypted traffic on the fly, without proxying, for malware, intrusions and data leakage, and applies application, URL and content control policies in order to protect against threats hidden in encrypted traffic. Included with security subscriptions for all TZ series models except SOHO. Sold as a separate license on SOHO.
|Deep packet inspection of SSH (DPI-SSH) decrypts and inspect data traversing over SSH tunnel to prevent attacks that leverage SSH.
|Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.
|Automatic signature updates
|The SonicWall Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures that covers more than 50 attack categories. The new updates take immediate effect without any reboot or service interruption required.
|Intra-zone IPS protection
|Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing threats from propagating across the zone boundaries.
|Botnet command and control (CnC) detection and blocking
|Identifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are identified as propagating malware or are known CnC points.
|Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
|Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques that cover thousands of individual exploits.
|Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected by utilizing evasion techniques in Layers 2-7.
|The RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and other malware in files of unlimited length and size across all ports and TCP streams.
|Capture Cloud malware protection
|A continuously updated database of tens of millions of threat signatures resides in the SonicWall cloud servers and is referenced to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of threats.
|Around-the-clock security updates
|New threat updates are automatically pushed to firewalls in the field with active security services, and take effect immediately without reboots or interruptions.
|Bi-directional raw TCP inspection
|The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that they to sneak by outdated security systems that focus on securing a few well-known ports.
|Extensive protocol support
|Identifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and decodes payloads for malware inspection, even if they do not run on standard, well-known ports.
|Application intelligence and control
|Control applications, or individual application features, that are identified by the RFDPI engine against a continuously expanding database of over thousands of application signatures, to increase network security and enhance network productivity.
|Custom application identification
|Control custom applications by creating signatures based on specific parameters or patterns unique to an application in its network communications, in order to gain further control over the network.
|Application bandwidth management
|Granularly allocate and regulate available bandwidth for critical applications or application categories while inhibiting nonessential application traffic.
|Control applications, or specific components of an application, based on schedules, user groups, exclusion lists and a range of actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix integration.
|Inside/outside content filtering
|Enforce acceptable use policies and block access to HTTP/HTTPS websites containing information or images that are objectionable or unproductive with Content Filtering Service and Content Filtering Client.
|Enforced Content Filtering Client
|Extend policy enforcement to block internet content for Windows, Mac OS, Android and Chrome devices located outside the firewall perimeter.
|Block content using the predefined categories or any combination of categories. Filtering can be scheduled by time of day, such as during school or business hours, and applied to individual users or groups.
|URL ratings are cached locally on the SonicWall firewall so that the response time for subsequent access to frequently visited sites is only a fraction of a second.
|Enforced anti-virus and anti-spyware
|Utilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint protection to block, viruses entering network through laptops, thumb drives and other unprotected systems.
|Automated enforcement option
|Ensure every computer accessing the network has the appropriate antivirus software and/or DPI-SSL certificate installed and active, eliminating the costs commonly associated with desktop antivirus management.
|Automated deployment and installation option
|Machine-by-machine deployment and installation of antivirus and anti-spyware clients is automatic across the network, minimizing administrative overhead.
|Capture Client uses a static artificial intelligence (AI) engine to determine threats before they can execute and roll back to a previous uninfected state.
|Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on desktops and laptops before they transmit confidential data, providing greater desktop security and performance.