About SonicOS 7.1
Feature Support on NSv Series
SonicOS 7.1 on SonicWall NSv Series supports the majority of features supported on SonicWall physical firewalls, with only a few exceptions. These exceptions are generally those features that control an external device, such as a switch, wireless hardware, or cellular WWAN devices.
The table below lists the key SonicOS and SonicOS features and whether they are supported or not supported on the NSv Series.
Main Category | Feature Category | Feature | Description | Supported |
---|---|---|---|---|
Unified Policy Features | Unified Security Policy | Source/Destination IP, Port, Service, and User | SPI Rule based on user Information | Yes |
Application Control | Application Signature and Component control within a Security Rule | Yes | ||
CFS/Web Filtering | Content Filtering Rules within a Security Rule | Yes | ||
Botnet | Botnet control within a Security Rule | Yes | ||
Geo-IP / Country | Country-based control within a Security Rule | Yes | ||
EndPoint Security Policy | Endpoint Security with Capture Client based on Rules | Yes | ||
Rule Diagram | Pictorial view of a Security Policy, NAT Policy or Route Policy to assist in finding real-time statistics | Yes | ||
Decryption Policy | Rules to inspect SSL/TLS traffic | Yes | ||
DoS Policy | Rules to inspect Denial of Service (DoS) and Distributed DoS (DDOS) attacks, such as flooding or Smurf | Yes | ||
Profile Objects | Endpoint Security | Yes | ||
Bandwidth Management | Yes | |||
QoS Marking | Yes | |||
Content Filter | Yes | |||
Intrusion Prevention | Yes | |||
DHCP Option | Yes | |||
AWS VPN | Yes | |||
Action Profiles | Security Profile | Yes | ||
DoS Profile | Yes | |||
Signature Objects | Anti-Virus Signature Object | Anti-Virus Signatures with more details on each signature | Yes | |
Anti-Spyware Signature Object | Anti-Spyware Signatures with more details on each signature | Yes | ||
Rule management | Cloning | Cloning of an existing security rule to create a new rule | Yes | |
Shadow rule analysis | Displays duplicate and shadowing rules within every policy | Yes | ||
In-cell editing | Ability to perform selective cell editing on the security rule without opening the rule, reducing the number of clicks for the administrator | Yes | ||
Group editing | Yes | |||
Export of Rules | Rules can be exported in CSV format | Yes | ||
Live Counters | Capture live statistics for a security policy | Yes | ||
Managing views | Used/Unused Rules | Display the security rules which are being actively used or not being used | Yes | |
Active/Inactive Rules | Display the security rules which are enabled or disabled | Yes | ||
Section Policy Grouping | Grouping of policies by sections to help manage thousands of security rules | Yes | ||
Customizable Grid/Layout | Customizable and movable columns within Security Policy, NAT Policy, Route Policy, Decryption Policy, and DoS Policy pages | Yes | ||
Custom Grouping | Grouping of policies by custom options like zone, tag, or other | Yes | ||
Decryption Features | Decryption Support for TLSv1.3 | TLS 1.3 enhanced security implemented in firewall management, SSL VPN and DPI | Yes | |
Blocking Cipher Controls | Block or unblock cipher control selectively | Yes | ||
Decryption Rule Monitoring | Enhanced monitoring of Decryption Rules including Bandwidth, Connection Rate, Connection Usage | Yes | ||
Multi-Instance Features | Multi-Instance Support | Multiple virtual firewalls running on a single firewall | No | |
Instance View | View usage and other related statistics for each instance | No | ||
Per-Instance Separate Firmware | Ability to run separate firmware on each instance and the root instance | No | ||
Instance Licensing from Root | License the instances from the root instance and display the key for each instance | No | ||
SDWAN Features | SDWAN Scalability | Scalable tunnel interfaces for distributed enterprises | Yes | |
SDWAN Usability Wizard | Wizard to automatically configure an SDWAN Policy on the firewall | Yes | ||
API Features | RESTful API Support | Complete API support for configuring every section of the management interface | Yes | |
HOME Page Features | Dashboard Features | Actionable Dashboard | Dashboard with actionable alerts | Yes |
Device View Enhancements | Displays the real-time status of the front panel interfaces and LEDs | Yes | ||
Top Traffic Summary | Traffic distribution usage on the firewall with real-time updates and the most-used applications | Yes | ||
Top User Summary | Summary of top users based on allowed or blocked sessions, by data sent and received | Yes | ||
Insights into Threats | Real-time threat summary for the network, including virus, zero-day malware, spyware, vulnerabilities, risky applications | Yes | ||
Policy Overview | Graphical view of used/unused and allowed/denied statistics for Security, NAT, Route, Decryption, and DoS Policies | Yes | ||
Objects Overview | Graphical view of custom and default Address, Zone, Service, Schedules, Custom Match, Application, Country, URI, Website, and Web Category objects | Yes | ||
Profiles and Signatures Overview | Graphical view of custom and default profiles and signatures for IPS, Security, DoS, Block Page, Gateway Anti-Virus, Anti-Spyware and others | Yes | ||
Zero-Day Attack Origin Analysis | Displays location-based attack origin by countries | Yes | ||
Network Topology | Topology View displaying hosts, access points connected in the network based on device name, MAC address and IP address | Yes | ||
Notification Center |
Summary of threats, event logs, system alerts with actionable alerts and outstanding tasks for the administrator |
Yes | ||
Debugging and Diagnostic Features | Packet Monitoring Enhancement | Packet Monitor ability to find the related Security Rule, NAT Rule, Route Rule, Decryption Rule, and Signatures for Application, IPS, Anti-Virus, and Anti-Spyware | Yes | |
System Logs Download | Console logs can be downloaded from the web management interface without requiring connection to the Console port | Yes | ||
SSH Terminal | SSH Terminal access within web management interface for troubleshooting | Yes | ||
System Diagnostics | Enhanced system diagnostics for troubleshooting | Yes | ||
Policy Lookup | Policy Lookup displays the rule that will be used for a particular type of traffic based on the math attributes | Yes | ||
Capture Threat Assessment (CTA 2.0) | Template Customization | Executive Template | Executive Template for company executives with a summarized report containing Key Findings and Recommendations | Yes |
Report Customization | Customizable Logo, Name, and Company | Customization of logo, administrator name and company name | Yes | |
Reporting Enhancements | Key Findings | Yes | ||
Risky File Analysis | Yes | |||
Risky Application Summary | Yes | |||
Malware Analysis | Yes | |||
Glimpse of Threats | Yes | |||
Web Filtering Statistics | Yes | |||
Recommendations | Yes | |||
Comparison Statistics | Industry Average | Comparison with peer industry statistics | Yes | |
All Organizations Average | Comparison with global statistics | Yes | ||
Wireless Features | Enhanced Access Point Snapshot | Displays real-time statistics about access point network status and client associations | No | |
Access Point Traffic Rate | Real-Time bandwidth usage by access points | No | ||
WiFi Client Report | Real-Time WiFi client report based on OS type, frequency, top client chart | No | ||
Real-Time WiFi Client Monitor | Determines the host machine, OS type, frequency, access point information, data transfer | No | ||
Switch Features | SonicWall Switch Support | SonicWall Switch in standalone and daisy chain deployments | No | |
Switch Network Overview | SonicWall Switch views: physical view, list view, and VLAN view | No | ||
Bandwidth Usage per Switch Port | Display SonicWall Switch bandwidth usage per port | No | ||
PoE Usage | Display SonicWalll Switch PoE statistics including power usage | No | ||
Monitoring Features | Risky Application Statistics | Yes | ||
AppFlow Monitoring Enhancements | Yes | |||
Management | NSM Management | No | ||
API Driven Management | Yes | |||
ZeroTouch Registration and Provisioning | Yes | |||
CSC Simple Reporting | No | |||
General Features | Global Search | Search globally for parameters within the SonicOS configuration to determine the Objects or Policies in which the parameters are referenced | Yes | |
Storage Device Configuration | Configuration of storage modules including extended modules, and display module usage statistics | No |
Was This Article Helpful?
Help us to improve our support portal