1
Have a requirement?
Chat with us
1
Have a requirement?
Chat with us
SonicWall SOHO Series Firewalls
Pioneers in the industry, we offer SonicWall Soho Series Firewall Platform, Sonicwall Firewall (SOHO Series 250) and Firewall Appliances from India.
Interested in this product?
Get Best Quote
Model Name/Number | SOHO Series |
Brand | SonicWall |
Usage/Application | Small and home office |
Form Factor | Desktop |
Operating System | Sonicos |
Interfaces | 5x1GbE,1 USB,1 Console |
Management | CLI,SSH,Web UI,Capture Security Center,GMS,REST APIs |
Single Sign-On (SSO) Users | 250 |
VLAN Interfaces | 25 |
Maximum Access Points Supported | 2 |
Firewall Throughput | 300 Mbps |
Anti Malware Throughput | 150 Mbps |
IPS Throughput | 200 Mbps |
Maximum Connections | 10,000 |
New Connections Per Second | 1,800 |
Site To Site VPN Tunnels | 10 |
Encryption | DES,3DES,AES (128,192,256-bit),MD5,SHA-1,Suite B Cryptography |
Key Exchange | Diffie Hellman Groups 1,2,5,14v |
Mobile Connect | Apple iOS,Mac OS X,Google Android,Kindle Fire,Chrome,Windows 8.1 (Embedded) |
IP Address Assignment | Static,(DHCP,PPPoE,L2TP and PPTP client),Internal DHCP server,DHCP relay |
Authentication | LDAP (multiple domains),XAUTH/RADIUS,SSO,Novell,internal user database |
Local User Database | 150 |
VoIP | Full H.323v1-5,SIP |
Dimensions | 3.6 x 14.1 x 19 cm |
Weight | 0.34 kg |
The SonicWall SOHO series deliver the same business-class protection large organizations require at a more affordable price point. Add optional 802.11n wireless to provide employees, customers and guests with secure wireless connectivity.
View Complete Details
Yes, I am interested!
Interested in this product?
Get Best Quote
Model Name/Number | SOHO 250 Series |
Brand | SonicWall |
Usage/Application | For wired and wireless small and home office |
Form Factor | Desktop |
Firewall Throughput | 600 Mbps |
Anti Malware Throughput | 200 Mbps |
IPS Throughput | 250 Mbps |
Maximum Connections | 50,000 |
New Connections Per Sec | 3,000 |
Operating System | SonicOS |
Interfaces | 5x1GbE, 1 USB, 1 Console |
Management | CLI, SSH, Web UI, Capture Security Center, GMS, REST APIs |
Single Sign On (SSO) Users | 250 |
VLAN Interfaces | 25 |
Max Access Points Supported | 2 |
Route Based VPN | RIP, OSPF, BGP |
IP Address Assignment | Static, (DHCP, PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP relay |
Authentication | LDAP (multiple domains), XAUTH/RADIUS, SSO, Novell, internal user database |
Local User Database | 150 |
VoIP | Full H.323v1-5, SIP |
Power Consumption | 9.2 W / 13.8 W |
Power Supply | 100-240 VAC, 50-60 Hz, 1 A |
Dimensions | 3.5 x 13.4 x 19 cm |
Weight | 0.73 kg / 0.84 kg |
Botnet command and control (CnC) detection and blocking
Identifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are identified as propagating malware or are known CnC points.
Protocol abuse/anomaly
Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
Zero-day protection
Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques that cover thousands of individual exploits.
Anti-evasion technology
Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected by utilizing evasion techniques in Layers 2-7.
View Complete Details
Yes, I am interested!
Interested in this product?
Get Best Quote
Model Name/Number | TZ670 |
Brand | SonicWall |
Usage/Application | Firewall |
Form Factor | Desktop |
Maximum connections | 50,000 |
IPS Throughput | 250 Mbps |
Firewall Throughput | 600 Mbps |
Anti Malware Throughput | 200 Mbps |
New Connections Per Sec | 3,000 |
Botnet command and control (CnC) detection and blocking
Identifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are identified as propagating malware or are known CnC points.
Protocol abuse/anomaly
Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
Zero-day protection
Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques that cover thousands of individual exploits.
Anti-evasion technology
Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected by utilizing evasion techniques in Layers 2-7.
View Complete Details
Yes, I am interested!
Tell us what you need, and we’ll help you get quotes
Tell us what you
need
need
Receive seller
details
details
Seal the deal
Pay with IndiaMART