Security and Filtering. We bought this device for security and to filter traffic on our network -- these features are working fine.
I think these are the most important features for anyone who is interested in UTM.
Security and Filtering. We bought this device for security and to filter traffic on our network -- these features are working fine.
I think these are the most important features for anyone who is interested in UTM.
Security and Filtering.
Firmware. Sometimes the integrated certificates get expired and you need to contact support to get these certificates updated on your device -- to let all the services work properly.
Three to four years.
I didn't encounter any issues with stability.
I don't know because we are not using >30% resources of this device.
Good.
This is our first time choosing a UTM.
Complex in Configuring DUAL WAN and VPN Connections because of Routing Config.
If you need DUAL WAN and VPN Config, you need a network professional to set it up.
It's expensive but has worth.
Fortinet, Dreytek.
Our primary use case is as a corporate firewall, and to provide security for the network while allowing connectivity between multiple sites. We also use it as a VPN gateway for multiple users via SSL.
Our old firewall was running as HA (High Availability) on two different but identical rack mounted servers. Moving to SonicWall allowed the company to move to one unit, yet accommodate more connections because it had sixteen ports and handled fail-over better than the old firewall solution.
Compact 1u, 1/4 depth size. 16 x 10/100/1000 Mbps ports, fibre ready. Management interface that is relatively simple to figure out.
I feel that the SSL VPN client software needs a lot of improvement.
We are a reseller who provides products for our customer.
The most valuable features are flexibility, ease of setup, and it's a good product cost-wise.
There are a few areas that need improvement including the VPN, user management, and reporting.
It's a stable solution, we have not had any issues.
There are no issues with scaling this solution. It's a scalable product.
Technical support is excellent.
The initial setup is definitely user-friendly, it's easy.
It only takes an hour to deploy, which includes the configuration.
The pricing is good and we are satisfied with the cost of this solution. They provide good value for the price.
I would recommend this solution. The support is good, the product is good, it's easy to deploy and it can be done manually with no assistance from support.
Other than the hardware related issues that can be experienced, it's a good solution.
I would rate this solution a ten out of ten.
I am using the SonicWall NSA as a perimeter firewall to control the traffic flowing in and out of my system. It is also a wireless gateway, it used for traffic shaping, mapping, and publishing certain web tables on the internet.
The scalability is something that should be improved.
I have been using the SonicWall NSA firewall for five years.
This is a stable product.
This solution is not scalable. We have approximately 2,000 users.
The technical support is very good.
We also use the Cyberoam 320AI.
The initial setup is straightforward. It took seven or eight days to complete the installation.
The vendor's team completed the initial deployment for us.
We have a team of three engineers who manage the firewalls.
UTM boxes are now obsolete and next-generation firewalls are the things that need to be put into place. Within the next three months, we are going to upgrade to a next-generation firewall.
For an enterprise, I think that I can recommend a SonicWall next-generation firewall. This is a discussion that we are already having with them. For small segments, such as a small office or home office environment, SonicWall is perfect.
I would rate this solution a seven out of ten.
Since we have a strict SLA of 99.98% up-time on our network per year, (including maintenance), resilience is our main concern. It is a good thing that our very own NSA 4600 has high availability/stateful firewall capabilities.
We have had zero downtime since the deployment of NSA 4600 (HA).
I'm not quite impressed with their new logging interface.
I've been using SonicWall NGFWs for almost five years now. We started using the NSA 4600 (HA) in March.
There were no stability issues at all!
There were no scalability issues at all!
I would give technical support a rating of seven out of 10. Their follow up is good. However, if the agent who is handling the case is not around, your support case will not progress. Hopefully, they can improve this.
SonicWall NGFW has always provided the protection and uptime that we have needed. We never thought of switching to other vendors.
I've been with SonicWall since my internship. Although we have a complex setup (Site-to-site VPN, SSL VPN, Bunch of NAT, custom Zones and Firewall policies), the initial setup for a new site has always been straightforward for us. This was due to the available knowledge base documents throughout the internet.
SonicWall's Next Generation Firewall itself, I believe, is not expensive for the features and the protection it offers. Though the licensing is the big problem, especially for those companies with flat budgets for IT. My advice would be for everyone to avail themselves of at least three years of licensing to save tons of money.
We never had the chance to evaluate other options. But lots of my friends are bugging me to take a look at Sophos XG firewalls.
Ask for a demo unit first before buying this.