You're currently on:
SonicWall TZ 205 UTM Firewall Appliance
- Pricing - Buy Now
- After Hours Deployment Service
- Features / Benefits
Small businesses, retail deployments, government organizations, remote sites and branch offices can benefit from the powerful security and business-class performance of the new SonicWall TZ 205. Unlike consumer grade products, this powerful Unified Threat Management (UTM) firewall combines the most effective intrusion prevention, anti-malware and content/URL filtering with the broadest, most secure mobile platform support for laptops, smartphones and tablets. By providing full deep packet inspection (DPI) at very high performance levels, it eliminates the tradeoff between comprehensive security and performance.
Features of SonicWall TZ 205
Tightly integrated, signature-based intrusion prevention scans packet payloads for vulnerabilities and exploits that target critical internal systems.
Automatic Signature Updates
SonicWall's Research Team continuously updates and deploys an extensive list of over 5,400 IPS signatures covering 52 attack categories. These signatures take immediate effect and do not require reboots or any other interruption in service.
Outbound Threat Prevention
The ability to inspect both inbound and outbound traffic ensures that the network will not unwittingly be used in Distributed Denial of Service attacks and will prevent any Command and Control Botnet communication.
Intra-Zone IPS Protection
Intrusion prevention can be deployed between internal security zones to protect sensitive servers and to prevent internal attacks.
IPSec VPN for Site-to-site Connectivity
High-performance IPSec VPN allows the firewall to connect remote branch offices to a central location.
SSL VPN or IPSec Client Remote Access
Utilize clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers, intranet sites and applications from a variety of platforms.
Redundant VPN Gateway
When using multiple WANs, a primary and secondary VPN can be configured to allow seamless automatic failover and failback of all VPN sessions.
The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel failure by seamlessly re-routing traffic between endpoints through alternate routes.
SonicWall Clean VPN™ both secures the integrity of VPN access and decontaminates malicious threats before they can enter the corporate network.
Gateway Threat Prevention
SonicWall's patented RFDPI engine scans all ports and protocols for viruses without file size or stream length limitation. SonicLabs Researchers constantly provide updated threat protection, providing faster response times and threat prevention.
Reassembly-Free Deep Packet (RFDPI)
Reassembly-Free Deep Packet Inspection keeps track of malware regardless of the order or inspection timing with which the packets arrive. This allows for extremely low latency while eliminating file and stream size limitations. This provides greater performance and security than outdated proxy designs which reassemble contents using sockets bolted to traditional anti-virus programs and are plagued with inefficiencies and the overhead of memory thrashing leading to high latency, low performance and size limitations.
Cloud Anti-Virus (AV)
Using the built-in RFDI engine, SonicWall can leverage the power of the cloud to provide the most comprehensive set of anti-malware signatures available, while minimizing latency or delay. The SonicWall Cloud Anti-Virus Service provides millions of additional malware signatures for inspection of executable files using the most up-todate information available.
RFDPI can be performed on both inbound and outbound connections to provide protection in all network traffic directions.
24x7 Signature Updates
SonicLabs Research Team team creates and updates signature databases that are propagated automatically to the firewalls in the field, with those signatures taking immediate effect without any reboot or service interruption required.
Firewall and Networking
Stateful Packet Inspection
All network traffic is inspected, analyzed and brought into compliance with firewall access policies.
DOS Attack Protection
SYN Flood protection provides defense against DOS attacks using both layer 3 SYN proxy and layer 2 SYN blacklisting technologies.
Can be deployed in traditional NAT and Layer 2 Bridge modes.
Create routes based on protocol to direct traffic to a preferred WAN connection with the ability to fail back to a secondary WAN in the event of an outage.
Supports Active/Passive failover to ensure increased reliability by protecting against hardware or software faults.
WAN Load Balancing
Load balance up to four WAN interfaces using Round Robin, Spillover or Percentage based methods.
WAN Acceleration decreases latency and increases transfer speeds between remote sites for even higher network efficiency gains.
Guarantee critical communications with 802.1p and DSCP tagging and remapping of VoIP traffic on the network.
DPI of VoIP Traffic
Predefined signatures detect and block VoIP specific threats.
H.323 Gatekeeper and SIP Proxy Support
Block spam calls by requiring that all incoming calls are authorized and authenticated by H.323 gatekeeper or SIP proxy.
Management and Monitoring
An intuitive web-based interface allows quick and convenient configuration in addition to management through SonicWall Global Management System (GMS®), or the CLI.
SNMP provides the ability to protectively monitor and respond to threats and alerts.
Centralized Policy Management
With SonicWall GMS, monitor, configure and report on multiple SonicWall appliances from a single intuitive interface and customize your security environment to suit your individual policies.
Application Intelligence and Control
Identify and control applications or individual components of an application based on RFDPI technology instead of relying on well-known ports and protocols.
Application Bandwidth Management
Allocate bandwidth to critical applications while throttling unproductive application traffic for an efficient and productive network
Custom Application Identification
Create and configure custom application identification based on traffic parameters or on patterns unique to an application in its network communications.
Application Traffic Analytics
Provides organizations with granular insight into application traffic, bandwidth utilization and security in addition to powerful troubleshooting and forensics capabilities. (TZ 215 only)
Application Signature Database
A continuously expanding database of over 3,500 application signatures ensures that administrators are able to control the usage of all the latest applications on their network at a category or individual level.
User Activity Tracking
User identification is seamlessly integrated with Microsoft® Active Directory and other authentication systems enabling tracking and reporting of individual user identification.
SonicWall TZ Series Comparison
*Available with Subscription Service
TZ 105 Series TZ 205 Series TZ 215 Series Firewall OverviewStateful Packet Inspection Firewall Throughput 200 Mbps 500 Mbps 500 MbpsIPS Throughput 60 Mbps 80 Mbps 110 MbpsGAV Throughput 40 Mbps 60 Mbps 70 MbpsVPN Throughput 75 Mbps 100 Mbps 110 MbpsFull DPI (UTM) 25 Mbps 40 Mbps 60 MbpsMaximum UTM/DPI Connections 8,000 12,000 32,000Unlimited File Size Protection HardwareDual Core ProcessorGigabit Ethernet802.11n SupportDual Band 802.11 a/b/g/n Support Security ServicesIntrusion Protection*Gateway Anti-Virus, Anti-Spyware and Cloud AV*Content and URL Filtering (CFS)*Enforced Client Anti-Virus and Anti-Spyware*Application Intelligence and Control*
- Compare Models
Need Help Choosing?
Call our Firewall Experts!
Use the chart below to compare and find the right TZ Firewall for you.
Deep Packet Inspection Firewall Stateful Packet Inspection Firewall Unlimited File Size Protection Protocols Scanned 50+ 50+ 50+ ICSA Firewall Certified
Gateway Anti-Virus, Anti-Spyware & IPS Application Firewall - - - Content Filtering Service (CFS) Edition ViewPoint Reporting Dynamic Support 24x7 Comprehensive Anti-Spam Service Enforced Client Anti-Virus & Anti-Spyware
Interfaces 5 FE, 1 USB 5 GbE, 1 USB 7 GbE, 2 USB Nodes Supported Unrestricted Unrestricted Unrestricted Included SonicOS Version Enhanced Enhanced Enhanced RAM 256 MB 256 MB 512 MB Flash Memory 32 MB 32 MB 32 MB Site-to-Site VPN Tunnels 5 10 20 Bundled GVC Licenses (Max) 0 (5) 2 (10) 2 (25) Bundled SSL VPN Licenses (Max) 1 (5) 1 (10) 2 (10)
Stateful Throughput 200 Mbps 500 Mbps 500 Mbps UTM Performance 25 Mbps 40 Mbps 60 Mbps Intrusion Prevention Throughput 60 Mbps 80 Mbps 110 Mbps Gateway Anti-Virus Throughput 40 Mbps 60 Mbps 70 Mbps Full DPI (UTM) 25 Mbps 40 Mbps 60 Mbps 3DES/AES VPN Throughput 75 Mbps 100 Mbps 130 Mbps Maximum UTM Connections 8000 12000 32000 Connections 8,000 12,000 48,000
Voice over IP (VoIP) Security Route-based VPN Dynamic Routing 802.11b/g Wireless LAN 802.11n Wireless LAN Layer 2 Wireless Bridging Hardware Failover - WAN Failover Automated Failover & Failback 3G Wireless/ Modem - With USB 3G Adapter/ Modem With USB 3G Adapter/ Modem Object-based Management Policy-based NAT Load Balancing PortShield Security Wireless Mgmt
Pricing - Buy Now