Appliance
Max Protection
Reporting

SonicWall TZ270 Tradeup with 3 YR APSS and CSE for 1 YR SIA - Basic (10 Users) and 1 YR SPA - Advanced (3 Users)

SKU: 03-SSC-2996
£1,372.13
£1,059.56
*

Small to Medium Size Business
  1. Save space and money with an integrated gateway security solution with firewalling, switching and wireless capabilities
  2. Reduce complexity and get the business running without relying on IT personnel with easy onboarding using SonicExpress App and Zero-Touch Deployment, and easy management through a single pane of glass
  3. Attain business continuity by providing failover to cellular connectivity
  4. Protect network from attacks with a comprehensive security solution that incorporates VPN, IPS, CFS, AV and much more
  5. Boost employee productivity by blocking unauthorized access with traffic segmentation and access policies
Distributed Enterprise with SD-Branches
  1. Enhance customer experience and adapt to the changing business needs by enabling next-gen branch connectivity with SD-Branch
  2. Drive business growth by investing in next-gen appliances with multi-gigabit and advanced security features, to future-proof against the changing network and security landscape
  3. Secure networks from the most advanced attacks with advanced security features and automatically block threats on decrypted traffic using protocols such as TLS 1.3
  4. Leverage end-to-end network security with seamless integration of SonicWave access points, SonicWall Switches and Capture Client
  5. Ensure seamless communication as stores talk to HQ via easy VPN connectivity which allows IT administrators to create a hub and spoke configuration for the safe transport of data between all locations
  6. Improve business efficiency, performance and reduce costs by leveraging Gen 7 TZ's hardware and software enhancements, plus features such SD-WAN technology
  7. Scale quickly and effortlessly with SonicExpress App and Zero-Touch Deployment
  8. Ensure business continuity by providing failover to cellular connectivity
  9. Maintain compliance with security features, and leverage built-in and expandable storage to store logs for audit purposes
Diagram - SD Branch
General
Operating system SonicOS 7.0
Interfaces 8x1GbE, 2 USB 3.0, 1 Console
Wireless support 2x2 802.11ac Wave 2 (TZ270W only)
Power over Ethernet (PoE) support N/A
Storage expansion slot (Bottom) Optional up to 256GB
Management Network Security Manager, CLI, SSH, Web UI, GMS, REST APIs
Redundant power supply N/A
Single Sign-On (SSO) Users 1000
VLAN interfaces 64
Access points supported (maximum) 16
 
Firewall/VPN Performance
Firewall inspection throughput 2.0 Gbps
Threat Prevention throughput 750 Mbps
Application inspection throughput 1.0 Gbps
IPS throughput 1.0 Gbps
Anti-malware inspection throughput 750 Mbps
TLS/SSL decryption and inspection throughput (DPI SSL) 300 Mbps
IPSec VPN throughput 750 Mbps
Connections per second 6000
Maximum connections (SPI) 750 000
Maximum connections (DPI) 150 000
Default/Maximum connections (DPI SSL) 25 000
VPN
Site-to-site VPN tunnels 50
IPSec VPN clients (maximum) 5 (200)
SSL VPN licenses (maximum) 1 (50)
Encryption/authentication DES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B Cryptography
Key exchange Diffie Hellman Groups 1, 2, 5, 14v
Route-based VPN RIP, OSPF, BGP
Certificate support Verisign, Thawte, Cybertrust, RSA Keon, Entrust and Microsoft CA for SonicWall-toSonicWall VPN, SCEP
VPN features Dead Peer Detection, DHCP Over VPN, IPSec NAT Traversal, Redundant VPN Gateway, Route-based VPN
Global VPN client platforms supported Microsoft® Windows 10
NetExtender Microsoft® Windows 10, Linux
Mobile Connect Apple® iOS, Mac OS X, Google® Android™, Kindle Fire, Chrome OS, Microsoft® Windows 10
 
Security Services (with subscription to EPSS or APSS)
Deep Packet Inspection services Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, DPI SS
Content Filtering Service (CFS) HTTP URL, HTTPS IP, keyword and content scanning, Comprehensive filtering based on file types such as ActiveX, Java, Cookies for privacy, allow/forbid lists
Comprehensive Anti-Spam Service Supported
Application Visualization Yes
Application Control Yes
Capture Advanced Threat Protection Yes
DNS Security Yes
 
Networking
IP address assignment Static, (DHCP, PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP relay
NAT modes 1:1, 1:many, many:1, many:many, flexible NAT (overlapping IPs), PAT, transparent mode
Routing protocols BGP4, OSPF, RIPv1/v2, static routes, policy-based routing
QoS Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1e (WMM)
Authentication LDAP (multiple domains), XAUTH/RADIUS, SSO, Novell, internal user database, Terminal Services, Citrix, Common Access Card (CAC)
Local user database 150
VoIP Full H.323v1-5, SIP
Standards TCP/IP, UDP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
Certifications FIPS 140-2 (with Suite B) Level 2, UC APL, VPNC, IPv6 (Phase 2), ICSA Network Firewall, ICSA Anti-virus
Certifications pending FIPS 140-2 (with Suite B) Level 2, IPv6 (Phase 2), ICSA Network Firewall, ICSA Anti-virus, Common Criteria NDPP (Firewall and IPS)
 
Hardware
Form factor Desktop
Power supply 36W External
Maximum power consumption (W) 16.84 (TZ270), 18.91 (TZ270W)
Input power 100 - 240 VAC, 50-60 Hz, 3A
Total heat dissipation 57.42 (TZ270), 64.48 (TZ270W)
Dimensions 3.5 x 13.5 x 19 (cm)
1.8 x 5.3 x 7.5 (in)
Weight 0.82 kg / 1.81 lbs (TZ270), 0.85 kg / 1.87 lbs (TZ270W)
WEEE weight 1.18 kg / 2.6 lbs (TZ270), 1.24 kg / 2.73 lbs (TZ270W)
Shipping weight 1.41 kg / 3.11 lbs (TZ270), 1.47 kg / 3.25 lbs (TZ270W)
MTBF (years) 51.1 (TZ270), 27.1 (TZ270W)
Environment (Operating/Storage) 32°-105° F (0°-40° C)/-40° to 158° F (-40° to 70° C)
Humidity 5-95% non-condensing
 
Regulatory
Major regulatory compliance (wired models) FCC ClassB, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSI
Major regulatory compliance (wireless models) FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE, REACH, ANATEL6
Advanced Protection Service Suite
Complete network security, content filtering, application control, CaptureATP, gateway anti-virus, anti-spam, 24x7 support, cloud management and reporting in a single integrated package.

The SonicOS architecture is at the core of SonicWall physical and virtual firewalls including the TZ, NSa, NSv and NSsp Series. SonicOS leverages our patented, single-pass, lowlatency, Reassembly-Free Deep Packet Inspection® (RFDPI) and patent-pending Real-Time Deep Memory Inspection™ (RTDMI) technologies to deliver industry-validated high security effectiveness, SD-WAN, real-time visualization, high-speed virtual private networking (VPN) and other robust security features.

Through a combination of cloud-based and on-box technologies we deliver protection to our firewalls that’s been validated by independent third party testing for its extremely high security effectiveness. Unknown threats are sent to SonicWall’s cloud-based Capture Advanced Threat Protection (ATP) multiengine sandbox for analysis. Enhancing Capture ATP is our RTDMI™ technology. The RTDMI engine detects and blocks malware and zero-day threats by inspecting directly in memory. RTDMI technology is precise, minimizes false positives, and identifies and mitigates sophisticated attacks where the malware’s weaponry is exposed for less than 100 nanoseconds.

At a Glance
  1. Complete network security solution
    All service licences included.
  2. Capture ATP
    Multi-engine network sandbox to prevent zero-day threats. See Capture Advanced Threat Protection Service (CATPS).
  3. Gateway anti-virus and anti-spyware protection
    Including DPI-SSL and RFDPI.
  4. Cutting-edge IPS technology
    Protects against worms, trojans, software vulnerabilities and other intrusions by scanning all network traffic for malicious or anomalous patterns.
  5. Application intelligence and control
    Set of granular, application-specific policies providing application classification and policy enforcement to help administrators control and manage both business and non-business related applications.
  6. Content filtering
    Enforce internet use policies and control internal access to inappropriate, unproductive and potentially illegal web content with comprehensive content filtering. See Content Filtering Service (CFS).
  7. Network Topology View
    Display hosts, access-points in the network based on device name, mac address and IP Address.
  8. 24x7 support with firmware updates and hardware replacement
    Including firmware updates and hardware replacement protects your business and your SonicWall investment.
  9. Management and reporting
    Manage and view reports on firewalls via cloud through Network Security Manager tile of Capture Security Center. See Capture Security Centre (CSC).
Remote Configuration & Setup

When you purchase a new firewall, SonicWall support does not cover initial configuration.  We can help you fill this gap by offering the optional add-on, “Remote Configuration & Support” when you purchase any of SonicWall TZ and NSa firewalls or from the Secure Mobile Access product sets. 

Our experienced technicians will guide you through the installation and configuration process during an initial telephone consultation, regardless of your level of experience or skill.  All we require is access to the appliance over the internet and a contact phone number for your on-site engineer. The service is for a maximum of 2 hours - additional time can be purchased by prior agreement.

 

The Process

  1. Remember to tick the “REMOTE CONFIGURATION?” checkbox (above) before adding the device to the basket.  Once you’ve completed the purchase, we will contact you to book a scheduled telephone appointment with one of our engineers*.
  2. You will need to ensure that the appliance is available remotely on HTTPS.**
  3. Our engineer will contact you during the scheduled appointment (please provide a valid telephone number) to guide you through the installation and configuration process.
  4. Our service is tailored for any skill level so if you require additional support (or for more advanced configuration assistance), you can request an additional appointment.
  5. Once we are satisfied that your appliance is up and running, we will provide details of the network configuration, including setup and login details for your records.
  6. You can also expect a post-installation health check to ensure that your appliance is functioning at optimum levels.
  7. If you already have your network configuration planned out, we will implement it accordingly. If you do not have these details, we can advise on best practices, network setups, ranges and policies to ensure the most secure and flexible configuration. Full details will be provided at the end of the process.

 

* For multiple appliances, you will need to book a session for each installation.

** Although we can advise you on how to enable this, it is your responsibility to perform the required gateway/router changes. You may need to contact your connectivity provider. By default, the device is available on HTTPS. 

 

*
*
*