SonicOS/X 7 About SonicOS and SonicOSX

Feature Support on NSv Series

SonicOS/X 7 on SonicWall NSv Series supports the majority of features supported on SonicWall physical firewalls, with only a few exceptions. These exceptions are generally those features that control an external device, such as a switch, wireless hardware, or cellular WWAN devices.

The table below lists the key SonicOS and SonicOSX features and whether they are supported or not supported on the NSv Series.

SonicOS/X 7 Feature Support on the NSv Series
Main Category Feature Category Feature Description Supported
Unified Policy Features Unified Security Policy Source/Destination IP, Port, Service, and User SPI Rule based on user Information Yes
Application Control Application Signature and Component control within a Security Rule Yes
CFS/Web Filtering Content Filtering Rules within a Security Rule Yes
Botnet Botnet control within a Security Rule Yes
Geo-IP / Country Country-based control within a Security Rule Yes
EndPoint Security Policy Endpoint Security with Capture Client based on Rules Yes
Rule Diagram Pictorial view of a Security Policy, NAT Policy or Route Policy to assist in finding real-time statistics Yes
Decryption Policy Rules to inspect SSL/TLS traffic Yes
DoS Policy Rules to inspect Denial of Service (DoS) and Distributed DoS (DDOS) attacks, such as flooding or Smurf Yes
Profile Objects Endpoint Security Yes
Bandwidth Management Yes
QoS Marking Yes
Content Filter Yes
Intrusion Prevention Yes
DHCP Option Yes
AWS VPN Yes
Action Profiles Security Profile Yes
DoS Profile Yes
Signature Objects Anti-Virus Signature Object Anti-Virus Signatures with more details on each signature Yes
Anti-Spyware Signature Object Anti-Spyware Signatures with more details on each signature Yes
Rule management Cloning Cloning of an existing security rule to create a new rule Yes
Shadow rule analysis Displays duplicate and shadowing rules within every policy Yes
In-cell editing Ability to perform selective cell editing on the security rule without opening the rule, reducing the number of clicks for the administrator Yes
Group editing Yes
Export of Rules Rules can be exported in CSV format Yes
Live Counters Capture live statistics for a security policy Yes
Managing views Used/Unused Rules Display the security rules which are being actively used or not being used Yes
Active/Inactive Rules Display the security rules which are enabled or disabled Yes
Section Policy Grouping Grouping of policies by sections to help manage thousands of security rules Yes
Customizable Grid/Layout Customizable and movable columns within Security Policy, NAT Policy, Route Policy, Decryption Policy, and DoS Policy pages Yes
Custom Grouping Grouping of policies by custom options like zone, tag, or other Yes
Decryption Features Decryption Support for TLSv1.3 TLS 1.3 enhanced security implemented in firewall management, SSL VPN and DPI Yes
Blocking Cipher Controls Block or unblock cipher control selectively Yes
Decryption Rule Monitoring Enhanced monitoring of Decryption Rules including Bandwidth, Connection Rate, Connection Usage Yes
Multi-Instance Features Multi-Instance Support Multiple virtual firewalls running on a single firewall No
Instance View View usage and other related statistics for each instance No
Per-Instance Separate Firmware Ability to run separate firmware on each instance and the root instance No
Instance Licensing from Root License the instances from the root instance and display the key for each instance No
SDWAN Features SDWAN Scalability Scalable tunnel interfaces for distributed enterprises Yes
SDWAN Usability Wizard Wizard to automatically configure an SDWAN Policy on the firewall Yes
API Features RESTful API Support Complete API support for configuring every section of the management interface Yes
HOME Page Features Dashboard Features Actionable Dashboard Dashboard with actionable alerts Yes
Device View Enhancements Displays the real-time status of the front panel interfaces and LEDs Yes
Top Traffic Summary Traffic distribution usage on the firewall with real-time updates and the most-used applications Yes
Top User Summary Summary of top users based on allowed or blocked sessions, by data sent and received Yes
Insights into Threats Real-time threat summary for the network, including virus, zero-day malware, spyware, vulnerabilities, risky applications Yes
Policy Overview Graphical view of used/unused and allowed/denied statistics for Security, NAT, Route, Decryption, and DoS Policies Yes
Objects Overview Graphical view of custom and default Address, Zone, Service, Schedules, Custom Match, Application, Country, URI, Website, and Web Category objects Yes
Profiles and Signatures Overview Graphical view of custom and default profiles and signatures for IPS, Security, DoS, Block Page, Gateway Anti-Virus, Anti-Spyware and others Yes
Zero-Day Attack Origin Analysis Displays location-based attack origin by countries Yes
Network Topology Topology View displaying hosts, access points connected in the network based on device name, MAC address and IP address Yes
Notification Center

Summary of threats, event logs, system alerts with actionable alerts and outstanding tasks for the administrator

Yes
Debugging and Diagnostic Features Packet Monitoring Enhancement Packet Monitor ability to find the related Security Rule, NAT Rule, Route Rule, Decryption Rule, and Signatures for Application, IPS, Anti-Virus, and Anti-Spyware Yes
System Logs Download Console logs can be downloaded from the web management interface without requiring connection to the Console port Yes
SSH Terminal SSH Terminal access within web management interface for troubleshooting Yes
System Diagnostics Enhanced system diagnostics for troubleshooting Yes
Policy Lookup Policy Lookup displays the rule that will be used for a particular type of traffic based on the math attributes Yes
Capture Threat Assessment (CTA 2.0) Template Customization Executive Template Executive Template for company executives with a summarized report containing Key Findings and Recommendations Yes
Report Customization Customizable Logo, Name, and Company Customization of logo, administrator name and company name Yes
Reporting Enhancements Key Findings Yes
Risky File Analysis Yes
Risky Application Summary Yes
Malware Analysis Yes
Glimpse of Threats Yes
Web Filtering Statistics Yes
Recommendations Yes
Comparison Statistics Industry Average Comparison with peer industry statistics Yes
All Organizations Average Comparison with global statistics Yes
Wireless Features Enhanced Access Point Snapshot Displays real-time statistics about access point network status and client associations No
Access Point Traffic Rate Real-Time bandwidth usage by access points No
WiFi Client Report Real-Time WiFi client report based on OS type, frequency, top client chart No
Real-Time WiFi Client Monitor Determines the host machine, OS type, frequency, access point information, data transfer No
Switch Features SonicWall Switch Support SonicWall Switch in standalone and daisy chain deployments No
Switch Network Overview SonicWall Switch views: physical view, list view, and VLAN view No
Bandwidth Usage per Switch Port Display SonicWall Switch bandwidth usage per port No
PoE Usage Display SonicWalll Switch PoE statistics including power usage No
Monitoring Features Risky Application Statistics Yes
AppFlow Monitoring Enhancements Yes
Management NSM Management No
API Driven Management Yes
ZeroTouch Registration and Provisioning Yes
CSC Simple Reporting No
General Features Global Search Search globally for parameters within the SonicOS/X configuration to determine the Objects or Policies in which the parameters are referenced Yes
Storage Device Configuration Configuration of storage modules including extended modules, and display module usage statistics No

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden