Call us
+44 (0)20 8830 6820

SonicWall TZ570P Secure Upgrade Plus - Advanced Edition

Only for Upgrades: TZ570P hardware (including PoE) with APSS, including - Capture Advanced Threat Protection, Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, Application Firewall Service, Content Filtering Services, Comprehensive Anti-Spam, NSM Essential with Management & 7-Day Reporting and 24x7 Support.
SKU: 02-SSC-5693
£3,069.09
£2,329.44

See configuration tab below.

*

The SonicWall TZ570 series, is the first desktop-form factor next-generation firewall (NGFW) with 5 Gigabit Ethernet interfaces.

Designed for mid-sized organizations and distributed enterprise with SDBranch locations, the TZ570 series delivers industry-validated security effectiveness with best-in-class priceperformance. TZ570 NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, realtime breach detection and prevention.

Highlights
  1. 5 GbE interfaces in a desktop form factor
  2. SD-Branch ready
  3. Secure SD-WAN capability
  4. SonicExpress mobile App onboarding
  5. Zero-Touch Deployment
  6. Single-pane-of-glass-management through cloud or firewall
  7. SonicWall Switch, SonicWave Access Point and Capture Client integration
  8. Built-in and expandable storage
  9. Redundant power
  10. High port density
  11. Cellular failover
  12. SonicOS 7.0
  13. Groundbreaking performance
  14. High connection count
  15. Fast DPI performance
  16. Low TCO
Upgrade

This product code is for upgrades only. Contact us to ensure that your current device is eligible for this upgrade price.

SonicWall TZ570 and TZ670 Launch Video:

The TZ570 is highly scalable, with high port density of 10 ports. It features both in-built and an expandable storage of up to 256GB, that enables various features including logging, reporting, caching, firmware backup and more. An optional second power supply provides added redundancy in case of failure.

Deployment of TZ570 is further simplified by Zero-Touch Deployment, with the ability to simultaneously roll out these devices across multiple locations with minimal IT support. Built on next-gen hardware, it integrates firewalling, switching and wireless capabilities, plus provides single-pane-of-glass management for SonicWall Switches and SonicWave Access Points. It allows tight integration with Capture Client for seamless endpoint security.

Diagram - Retail or small office diagram
Small to Medium Size Business
  1. Save space and money with an integrated gateway security solution with firewalling, switching and wireless capabilities
  2. Reduce complexity and get the business running without relying on IT personnel with easy onboarding using SonicExpress App and Zero-Touch Deployment, and easy management through a single pane of glass
  3. Attain business continuity by providing failover to cellular connectivity
  4. Protect network from attacks with a comprehensive security solution that incorporates VPN, IPS, CFS, AV and much more
  5. Leverage high port density to power on multiple PoE devices such as IP phones and IP cameras
  6. Boost employee productivity by blocking unauthorized access with traffic segmentation and access policies
Distributed Enterprise with SD-Branches
  1. Enhance customer experience and adapt to the changing business needs by enabling next-gen branch connectivity with SD-Branch
  2. Drive business growth by investing in next-gen appliances with multi-gigabit and advanced security features, to future-proof against the changing network and security landscape
  3. Secure networks from the most advanced attacks with advanced security features and automatically block threats on decrypted traffic using protocols such as TLS 1.3
  4. Leverage end-to-end network security with seamless integration of SonicWave access points, SonicWall Switches and Capture Client
  5. Ensure seamless communication as stores talk to HQ via easy VPN connectivity which allows IT administrators to create a hub and spoke configuration for the safe transport of data between all locations
  6. Improve business efficiency, performance and reduce costs by leveraging TZ570’s hardware and software enhancements, plus features such SD-WAN technology
  7. Scale quickly and effortlessly with SonicExpress App and Zero-Touch Deployment
  8. Ensure business continuity by providing failover to cellular connectivity
  9. Maintain compliance with security features, and leverage built-in and expandable storage to store logs for audit purposes
Diagram - SD Branch
General
Operating systemSonicOS 7.0
Interfaces8x1GbE, 2x5GbE, 2 USB 3.0, 1 Console
Power over Ethernet (PoE) support5 PoE or 3 PoE+
ExpansionStorage Expansion Slot (Up to 256GB, Rear)
ManagementNetwork Security Manager, CLI, SSH, Web UI, GMS, REST APIs
Single Sign-On (SSO) Users2500
VLAN interfaces256
Access points supported (maximum)32
Firewall/VPN Performance
Firewall inspection throughput4.0 Gbps
Threat Prevention throughput2.0 Gbps
Application inspection throughput2.5 Gbps
IPS throughput2.5 Gbps
Anti-malware inspection throughput2.0 Gbps
TLS/SSL decryption and inspection throughput (DPI SSL)750 Mbps
VPN throughput1.8 Gbps
Connections per second16000
Maximum connections (SPI)1 250 000
Maximum connections (DPI)400 000
Default/Maximum connections (DPI SSL)30 000
VPN
Site-to-site VPN tunnels200
IPSec VPN clients (maximum)10 (500)
SSL VPN licenses (maximum)2 (200)
Encryption/authenticationDES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B Cryptography
Key exchangeDiffie Hellman Groups 1, 2, 5, 14v
Route-based VPNRIP, OSPF, BGP
Certificate supportVerisign, Thawte, Cybertrust, RSA Keon, Entrust and Microsoft CA for SonicWall-toSonicWall VPN, SCEP
VPN featuresDead Peer Detection, DHCP Over VPN, IPSec NAT Traversal, Redundant VPN Gateway, Route-based VPN
Global VPN client platforms supportedMicrosoft® Windows 10
NetExtenderMicrosoft® Windows 10, Linux
Mobile ConnectApple® iOS, Mac OS X, Google® Android™, Kindle Fire, Chrome OS, Microsoft® Windows 10
Security Services
Deep Packet Inspection servicesGateway Anti-Virus, Anti-Spyware, Intrusion Prevention, DPI SS
Content Filtering Service (CFS)HTTP URL, HTTPS IP, keyword and content scanning, Comprehensive filtering based on file types such as ActiveX, Java, Cookies for privacy, allow/forbid lists
Comprehensive Anti-Spam ServiceSupported
Application VisualizationYes
Application ControlYes
Capture Advanced Threat ProtectionYes
DNS SecurityYes
Networking
IP address assignmentStatic, (DHCP, PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP relay
NAT modes1:1, 1:many, many:1, many:many, flexible NAT (overlapping IPs), PAT, transparent mode
Routing protocolsBGP4, OSPF, RIPv1/v2, static routes, policy-based routing
QoSBandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1e (WMM)
AuthenticationLDAP (multiple domains), XAUTH/RADIUS, SSO, Novell, internal user database, Terminal Services, Citrix, Common Access Card (CAC)
Local user database250
VoIPFull H.323v1-5, SIP
StandardsTCP/IP, UDP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
CertificationsFIPS 140-2 (with Suite B) Level 2, UC APL, VPNC, IPv6 (Phase 2), ICSA Network Firewall, ICSA Anti-virus
Certifications pendingFIPS 140-2 (with Suite B) Level 2, IPv6 (Phase 2), ICSA Network Firewall, ICSA Anti-virus, Common Criteria NDPP (Firewall and IPS)
Hardware
Form factorDesktop
Power supply180W
Maximum power consumption (W)108.75
Input power100-240 VAC, 50-60 Hz
Total heat dissipation370.84
Dimensions3.5 x 15 x 22.5 cm
1.38 x 5.91 x 8.85 in
Weight0.99 kg / 2.18 lbs
WEEE weight1.57 kg / 3.46 lbs
Shipping weight2.08 kg / 4.58 lbs
MTBF (years)31.7
Environment (Operating/Storage)32°-105° F (0°-40° C)/-40° to 158° F (-40° to 70° C)
Humidity5-95% non-condensing
Regulatory
Major regulatory compliance (wired models)FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, UL/ cUL, TUV/ GS, CB, Mexico DGN notice by UL, WEEE, REACH, BSMI, KCC/MSIP, ANATEL
Advanced Protection Service Suite
Complete network security, content filtering, application control, CaptureATP, gateway anti-virus, anti-spam, 24x7 support, cloud management and reporting in a single integrated package.

The SonicOS architecture is at the core of SonicWall physical and virtual firewalls including the TZ, NSa, NSv and NSsp Series. SonicOS leverages our patented, single-pass, lowlatency, Reassembly-Free Deep Packet Inspection® (RFDPI) and patent-pending Real-Time Deep Memory Inspection™ (RTDMI) technologies to deliver industry-validated high security effectiveness, SD-WAN, real-time visualization, high-speed virtual private networking (VPN) and other robust security features.

Through a combination of cloud-based and on-box technologies we deliver protection to our firewalls that’s been validated by independent third party testing for its extremely high security effectiveness. Unknown threats are sent to SonicWall’s cloud-based Capture Advanced Threat Protection (ATP) multiengine sandbox for analysis. Enhancing Capture ATP is our RTDMI™ technology. The RTDMI engine detects and blocks malware and zero-day threats by inspecting directly in memory. RTDMI technology is precise, minimizes false positives, and identifies and mitigates sophisticated attacks where the malware’s weaponry is exposed for less than 100 nanoseconds.

At a Glance
  1. Complete network security solution
    All service licences included.
  2. Capture ATP
    Multi-engine network sandbox to prevent zero-day threats. See Capture Advanced Threat Protection Service (CATPS).
  3. Gateway anti-virus and anti-spyware protection
    Including DPI-SSL and RFDPI.
  4. Cutting-edge IPS technology
    Protects against worms, trojans, software vulnerabilities and other intrusions by scanning all network traffic for malicious or anomalous patterns.
  5. Application intelligence and control
    Set of granular, application-specific policies providing application classification and policy enforcement to help administrators control and manage both business and non-business related applications.
  6. Content filtering
    Enforce internet use policies and control internal access to inappropriate, unproductive and potentially illegal web content with comprehensive content filtering. See Content Filtering Service (CFS).
  7. Network Topology View
    Display hosts, access-points in the network based on device name, mac address and IP Address.
  8. 24x7 support with firmware updates and hardware replacement
    Including firmware updates and hardware replacement protects your business and your SonicWall investment.
  9. Management and reporting
    Manage and view reports on firewalls via cloud through Network Security Manager tile of Capture Security Center. See Capture Security Centre (CSC).

24×7: Around the clock support, including weekends and holidays, for business-critical environments

Customer Success Manager: Provides enterprise environments with a dedicated trusted advisor. Your Customer Success Manager (CSM) acts on your behalf and works with your staff to help minimize unplanned downtime, optimize IT processes, provide operational reports to drive efficiencies and is your single point of accountability for a seamless support experience.

Focused Technical Support (FTS): Provides a named engineering resource to support your enterprise account. Your FTS will know and understand your environment, policies and IT objectives to bring you fast technical resolution when you need support.

SonicWall provides telephone and Web-based support, unlimited software/firmware updates and upgrades, and hardware replacement (RMA) for units with an active support agreement or covered under the warranty support period. See the Product Warranty section below for more information on SonicWall product warranties. In addition, SonicWall products include one (1) year of hardware warranty or the hardware duration provided under local law. Hardware warranty is separate from warranty support and is specific to the replacement of defective hardware. It does not include telephone, email or web-based support or software/firmware updates and upgrades.

SonicWall warranty and support agreements provide technical assistance during standard coverage hours, typically 24×7. A SonicWall technical specialist will work remotely with you to diagnose and identify software and hardware not performing to documented specifications. Support also includes general assistance regarding use and implementation on a limited basis. SonicWall’s warranty and support offerings do not include step-by-step installation or configuration of products or services. If you need installation or configuration assistance, SonicWall will refer you to a certified value-added reseller or offer you one of our Professional Services.

Warranty and support agreements provide for replacement of failing hardware returned to a SonicWall factory. The replacement product may be new, or like-new. In the event of product obsolescence, SonicWall reserves the right to replace failing product with a product of like or better features and functionality.

Contact SonicWall Customer Support Center if you think you have a hardware problem. The support specialist will log your case and determine with you whether a replacement unit is required. If so, you will be provided with a Returned Material Authorization (RMA) number for your reference. SonicWall will ship you a replacement unit via pre-paid, next business day airfreight to the address that you specify. Routine RMA orders are filled on the day that they are received if the RMA is processed before 12:00 p.m. PST (1:00 p.m. GMT in Europe). You may be asked to provide a credit card number or billing authorization to secure the return of the defective unit to SonicWall. In Europe, an RMA Purchase Order form can be used instead of a credit card. In certain regions or countries, RMA Services are facilitated via certified SonicWall resellers or partners.

SonicWall will automatically transfer the registration information and subscription services to the replacement unit. The replacement unit will include instructions for returning the defective unit to SonicWall. Shipping is paid by SonicWall. Please make sure that the RMA number is included with your shipment and that you return the defective unit to SonicWall within 30 days. After 30 days you will be billed the retail price of the new unit.

In addition to being extremely reliable, SonicWall products are recognized for being easy to install, configure and manage. SonicWall’s Limited Software Warranty enhances these features with:

Limited Software Warranty for All Non-E-Class Products

Software/Firmware Updates 90 days of software and firmware updates.

Support Tools Access to SonicWall’s electronic support tools.

Note: SonicWall E-Class appliances are not eligible for Limited Software Warranty

SonicWall requires continuous coverage for support agreements. Appliances with an expired warranty or support agreement are considered to be “out of support compliance.” Support Services Reinstatement provides the opportunity to bring these appliances back into compliance and up to date. Generally, new agreements are retroactively activated to the expiration date of the most recent support agreement.

Customers with appliances that have an expired support agreement who purchase SonicWall Support Services Reinstatement and a new one-, two- or three-year support agreement receive a full 12/24/36 months of support from date of activation. Also included in SonicWall Support Services Reinstatement is a single firmware update, allowing you access to the most current firmware features.

SonicWall will provide telephone and web-based support (via email) for active security services regardless of the appliance upon which the subscription is activated. Support for security services requires an active support contract for the appliance on which the service is running.

Support and updates/upgrades for SonicWall Global Management System (GMS) require a valid GMS support agreement, regardless of the appliance(s) that GMS is used to manage.

Generation 1, 2, 3 and 4 SonicWall appliances are not eligible to be registered.

8 a.m. – 5 p.m. local time is defined as follows: In North America: 8 a.m. – 5 p.m. Mountain Standard Time (MST). In Latin America: 8 a.m. – 5 p.m. Local Standard Time in the country where the product is deployed. In Europe, Middle East and Africa: 9 a.m. – 6 p.m. GMT +1 In Asia Pacific: 8 a.m. – 5 p.m. Local Standard Time in the country where the product is deployed. In Japan: 5 p.m. – 2 a.m. UTC/GMT

Virtualization is a technique for hiding the physical characteristics of computing resources from the way in which other systems, applications or end users interact with those resources. It is able to make a single physical resource, such as a server, operating system, application or storage device, appear to function as multiple logical devices. It can also make multiple physical resources such as storage devices or servers appear as a single logical resource.

As a result, virtualization enables IT departments to increase the utilization of resources, increase high availability, and simplify back-up, systems administration and recovery procedures. It also allows IT departments to be more responsive to the dynamic needs of the business. Examples of virtualization technologies include VMware ESX® Server, Citrix/XenServer® and Microsoft® Windows Server® 2008 Hyper-V®.

Our products leverage the binary compatibility offered through virtualization technologies, which provide complete transparency to the operating systems and applications deployed. As a result, for all casework received where SonicWall® software products are being used in a virtual environment, we will assume that the problem is common to both native and virtual operating environments, and we will only require the customer to recreate the problem in a native environment if and when there is reason to believe that the problem is unique to the virtual environment itself.

From a purely functional perspective, our products will operate in exactly the same way as in a native environment, however we can make no guarantees with respect to performance or scalability in a virtualization environment running multiple virtual instances. Configuration aspects such as CPU, memory availability, I/O subsystem and network infrastructure can all influence such a deployment, and should be given careful consideration to ensure the virtual layer has the necessary resources available to provide a satisfactory user experience.

We are committed to providing products which work on the latest platforms and technologies available in the industry today. We work closely with technology vendors to ensure earliest possible compatibility with our solutions. We provide full details of all systems requirements, together with platform and third-party product versions supported with our products, in the Release Notes published for each product. These include operating system versions, service pack levels, mail clients or server versions, database versions, browsers and other related technology that we support, and at the version level that our products have been formally tested and certified to run against.

The support of future platform versions, new service packs and other related technologies will be taken into consideration and addressed during the regular product maintenance and release cycles of our products. This provides ongoing upward compatibility of our products as used in customer environments. It should be noted, therefore, that there could be a delay between the availability of the latest platform technology release or service patch, and the product version certified to operate with our products. Please contact Support should you have any questions with regards to the current support status of any product and a particular related platform, patch or third-party product support not explicitly documented in our release notes.

For more information about the latest third-party platforms and versions we support, please review the System Requirements section of the release notes for your product or search our Knowledge Base on the Support Portal. Please note that while we do not directly or officially support third-party software, we work closely with many providers to ensure that our customers receive the best possible service at all times.

When a service request is created by the SonicWall Technical Assistance Center (TAC), a priority is assigned to the service request based on the problem type. Priorities and corresponding response targets are defined as follows:

SeverityDefinitionTarget Response Time
SEV-1Customer’s production system is severely impacted or completely down. System operations of a mission critical applications are down. Requires support access to available customer resources on site 24x7 until resolution or a suitable workaround to restore function is implemented.1 hour
SEV-2The production system is functioning with limited capabilities. The production system is unstable, with periodic interruptions.4 hours
SEV-3Isolated errors in a production, test bed or development environment, with full system operation. Issues related to configuration, performance or suspected defects that cannot wait. Also, clarification of documentation. Product/ Feature Enhancement requests1 business day
Remote Configuration & Setup

When you purchase a new firewall, SonicWall support does not cover initial configuration.  We can help you fill this gap by offering the optional add-on, “Remote Configuration & Support” when you purchase any of SonicWall TZ and NSa firewalls or from the Secure Mobile Access product sets.

Our experienced technicians will guide you through the installation and configuration process during an initial telephone consultation, regardless of your level of experience or skill.  All we require is access to the appliance over the internet and a contact phone number for your on-site engineer. The service is for a maximum of 2 hours - additional time can be purchased by prior agreement.

The Process

  1. Remember to tick the “REMOTE CONFIGURATION?” checkbox (above) before adding the device to the basket.  Once you’ve completed the purchase, we will contact you to book a scheduled telephone appointment with one of our engineers*.
  2. You will need to ensure that the appliance is available remotely on HTTPS.**
  3. Our engineer will contact you during the scheduled appointment (please provide a valid telephone number) to guide you through the installation and configuration process.
  4. Our service is tailored for any skill level so if you require additional support (or for more advanced configuration assistance), you can request an additional appointment.
  5. Once we are satisfied that your appliance is up and running, we will provide details of the network configuration, including setup and login details for your records.
  6. You can also expect a post-installation health check to ensure that your appliance is functioning at optimum levels.
  7. If you already have your network configuration planned out, we will implement it accordingly. If you do not have these details, we can advise on best practices, network setups, ranges and policies to ensure the most secure and flexible configuration. Full details will be provided at the end of the process.

* For multiple appliances, you will need to book a session for each installation.

** Although we can advise you on how to enable this, it is your responsibility to perform the required gateway/router changes. You may need to contact your connectivity provider. By default, the device is available on HTTPS. 

 

*
*
*
back to top