SonicOS 7 NSv Getting Started Guide for AWS

Table of Contents

Feature Support Information

The AWS VPC does not support Layer 2 functionality. Therefore, the NSv interface to VPCs is restricted to the layer 3 network level and higher.

The Feature Support List table shows key SonicOS features and whether or not they are supported or unsupported in deployments of the NSv. The SonicWall NSv has nearly all the features and functionality of a SonicWall NSa hardware virtual machine running SonicOS 7 firmware.

For more information about supported features, refer to the SonicOS 7 NSv administration guide. This and other documents for the SonicWall NSv are available by selecting NSv as the Product at: https://www.sonicwall.com/support/technical-documentation.

The Feature Support List of NSv table shows the key SonicOS 7 features.

Feature Support List
Functional CategoryFeature AreaFeature
Unified Security Policy Unified Policy combining Layer 4 to Layer 3 Rules Source/Destination IP/Port/Service
  Application based Control
  CFS/Web Filtering
  Botnet
  Geo-IP/country
  Single Pass Security
  Services enforcement
  Decryption Policy
  DoS Policy
  EndPoint Security Policy
  Rule Diagram
Profile Based Objects
  Endpoint Security
  Bandwidth Management
  QoS Marking
  Content Filter
  Intrusion Prevention
  DHCP Option
  AWS VPN
Action Profiles
  Security Profile
  DoS Profile
 Signature Objects
  AntiVirus Signature Object
  AntiSpyware Signature Object
  Rule Management
  Cloning
  Shadow rule analysis
  In-cell editing
  Group editing
  Export of Rules
  LiveCounters
 Managing Views
  Used/unused rules
  Active/inactive rules
  Sections
  Customizable Grid/Layout
  Custom Grouping
TLS 1.3Supporting TLS 1.3 with enhanced security 
SDWANSDWAN Scalability 
 SDWAN Usability Wizard 
APIAPI Driven Management 
 Full API Support 
DashboardEnhanced Home Page 
  Actionable Dashboard
  Enhanced Device View
  Top Traffic and User summary
  Insights to threats
  Policy/Object Overview
  Profiles and Signatures Overview
  Zero-Day Attack Origin Analysis
 Notification Center 
DebuggingEnhanced Packet Monitoring 
 UI based System Logs Download 
 SSH Terminal on UI 
 System Diagnostic Utility Tools 
 Policy Lookup 
Capture Threat Assessment (CTA 2.0)Executive Template 
 Customizable Logo/Name/Company 
 Industry and Global Average Statistics 
 Risky File Analysis 
 Risky Application Summary 
 Malware Analysis 
 Glimpse of Threats 
MonitoringRisky Application Summary 
 Enhanced AppFlow Monitoring 
ManagementCSC Simple Reporting 
 ZeroTouch Registration and Provisioning 
GeneralSonicCoreX and SonicOS Containerization 
 Data Encryption using AES-256 
 Enhanced Online Help