What needs improvement with SonicWall NSV?

Julia Miller - PeerSpot reviewer
  • 0
  • 2
PeerSpot user

5 Answers

RajeshKumar20 - PeerSpot reviewer
Real User
Top 5
Nov 2, 2023

SonicWall NSV's initial setup is complicated and requires good knowledge.

Search for a product comparison
Real User
Top 5
Jun 14, 2023

SonicWall NSV's SSL VPN could increase its number of users to 100-plus users. I have still not checked if SonicWall NSV will support SSL VPN for 100-plus users.

Top 5
Feb 1, 2023

It has been brought to our attention by a few customers that they are dissatisfied with the fact that our virtualized service is only offered as a subscription option on the cloud. However, it is worth noting that many other similar services are also offered through a subscription model on the cloud and not through perpetual licensing. It is unclear why these customers would have an issue with this subscription service when so many others are utilizing similar methods.

Real User
Oct 13, 2021

The hardware box renewal appliances GUI became extremely slow after the release of SonicOS 7. When I compare SonicWall to its competitors, I notice that there are some functions that I cannot perform with the SonicWall appliance. For example, when I assign a user base bandwidth management, I enable the ULA (User Level Authentication), but I need a different solution and must enable browser-based authentication. SonicWall requires certain features such as the authentication agent and user-based routing. There are limitations to bandwidth management. When used in the education sector, there are some difficulties. They require bandwidth management, an authentication agent, and SSL VPNs. Google Chrome is not supported, which is why the ULA occasionally fails to function. The authentication page does not appear. The earlier model is TZ SOHO, they now have a startup with TZ270. We have some offices that have 10 users, as well as a limited amount of users that require a small device such as TZ SOHO, and not the TZ270. We are having some difficulties with the SOHO 250 model, regarding the throughput, but when I use the TZ270 it works well. I decided to replace it with TZ270. When I enable the ULA, the Sophos core usage increases dramatically. Everything works fine when I use the IP-based policy. In general, when it comes to IP-based configuration, everything is fine; everything works great. In terms of user-based policies and Gen 7, we have several problems with the ULA, and the page does not appear. We are unable to log in when the page does not appear, even when we have entered the correct credentials. SonicWall, as well as other competitors, have SD-WAN, however, SonicWall features are different. The web filter component, the application component, and the firewall access rules, for example, are all different in the SonicWall Appliance. When creating firewall access rules in Sophos and Fortinet, I just define the source, destination, and user, as well as a web filter, an application filter, and user bandwidth management on a single line. I only follow one rule and have never had a problem. Everything is contained in a single rule only when I create it. I can assign web filter policies, application filter policies, and I can apply all security services in a single rule.

Real User
Aug 27, 2020

With eight branches, we are not a very big customer and find that the pricing is a little bit expensive. We are a large community bank that has been around for 100 years, but we only have eight branches. That said, the pricing is still much better than it was with Cisco. I would like to see the reporting opened up and have several more opportunities for automatic reports. I have experience with building custom reports that I can use, but I don't have that kind of time anymore. Having more canned reports, which is what Firepower gave us, would be very beneficial.

Find out what your peers are saying about SonicWall, Microsoft, Fortinet and others in Firewalls. Updated: December 2023.
746,723 professionals have used our research since 2012.
A firewall is a device used for network security. It monitors network traffic (both incoming and outgoing) and then, based on a set of security rules, either permits or blocks data packets.
Download Firewalls ReportRead more