Call us
+44 (0)20 8830 6820

SonicWall TZ670 Secure Upgrade Plus - Advanced Edition

Only for Upgrades: TZ670 hardware with APSS, including - Capture Advanced Threat Protection, Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, Application Firewall Service, Content Filtering Services, Comprehensive Anti-Spam, NSM Essential with Management & 7-Day Reporting and 24x7 Support.
SKU: 02-SSC-5685
£3,617.54
£2,745.71

See configuration tab below.

*

The SonicWall TZ670 series, is the first desktop-form factor next-generation firewall (NGFW) with 10 Gigabit Ethernet interfaces.

Designed for mid-sized organizations and distributed enterprise with SD-Branch locations, the TZ670 delivers industry-validated security effectiveness with best-in-class priceperformance. TZ670 NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, realtime breach detection and prevention.

Highlights
  1. 10 GbE interfaces in a desktop form factor
  2. SD-Branch ready
  3. Secure SD-WAN capability
  4. SonicExpress mobile App onboarding
  5. Zero-Touch Deployment
  6. Single-pane-of-glass-management through cloud or firewall
  7. SonicWall Switch, SonicWave Access Point and Capture Client integration
  8. Built-in and expandable storage
  9. Redundant power
  10. High port density
  11. Cellular failover
  12. SonicOS 7.0
  13. Groundbreaking performance
  14. High connection count
  15. Fast DPI performance
  16. Low TCO
Upgrade

This product code is for upgrades only. Contact us to ensure that your current device is eligible for this upgrade price.

SonicWall TZ570 and TZ670 Launch Video:

The TZ670 is highly scalable, with high port density of 10 ports. It features both in-built and an expandable storage of up to 256GB, that enables various features including logging, reporting, caching, firmware backup and more. An optional second power supply provides added redundancy in case of failure.

Deployment of TZ670 is further simplified by Zero-Touch Deployment, with the ability to simultaneously roll out these devices across multiple locations with minimal IT support. Built on next-gen hardware, it integrates firewalling and switching capabilities, plus provides singlepane-of-glass management for SonicWall Switches and SonicWave Access Points. It allows tight integration with Capture Client for seamless endpoint security.

Small to Medium Size Business
  1. Save space and money with an integrated gateway security solution with firewalling, switching and wireless capabilities
  2. Reduce complexity and get the business running without relying on IT personnel with easy onboarding using SonicExpress App and Zero-Touch Deployment, and easy management through a single pane of glass
  3. Attain business continuity by providing failover to cellular connectivity
  4. Protect network from attacks with a comprehensive security solution that incorporates VPN, IPS, CFS, AV and much more
  5. Boost employee productivity by blocking unauthorized access with traffic segmentation and access policies
Distributed Enterprise with SD-Branches
  1. Enhance customer experience and adapt to the changing business needs by enabling next-gen branch connectivity with SD-Branch
  2. Drive business growth by investing in next-gen appliances with multi-gigabit and advanced security features, to future-proof against the changing network and security landscape
  3. Secure networks from the most advanced attacks with advanced security features and automatically block threats on decrypted traffic using protocols such as TLS 1.3
  4. Leverage end-to-end network security with seamless integration of SonicWave access points, SonicWall Switches and Capture Client
  5. Ensure seamless communication as stores talk to HQ via easy VPN connectivity which allows IT administrators to create a hub and spoke configuration for the safe transport of data between all locations
  6. Improve business efficiency, performance and reduce costs by leveraging Gen 7 TZ's hardware and software enhancements, plus features such SD-WAN technology
  7. Scale quickly and effortlessly with SonicExpress App and Zero-Touch Deployment
  8. Ensure business continuity by providing failover to cellular connectivity
  9. Maintain compliance with security features, and leverage built-in and expandable storage to store logs for audit purposes
Diagram - SD Branch
General
Operating systemSonicOS 7.0
Interfaces8x1GbE, 2x10GbE, 2 USB 3.0, 1 Console
ExpansionStorage Expansion Slot (Up to 256GB, with 32 GB included)
ManagementNetwork Security Manager, CLI, SSH, Web UI, GMS, REST APIs
Single Sign-On (SSO) Users2500
VLAN interfaces256
Access points supported (maximum)32
Firewall/VPN Performance
Firewall inspection throughput5.0 Gbps
Threat Prevention throughput2.5 Gbps
Application inspection throughput3.0 Gbps
IPS throughput3.0 Gbps
Anti-malware inspection throughput2.5 Gbps
TLS/SSL decryption and inspection throughput (DPI SSL)800 Mbps
VPN throughput2.1 Gbps
Connections per second25000
Maximum connections (SPI)1 500 000
Maximum connections (DPI)500 000
Default/Maximum connections (DPI SSL)30 000
VPN
Site-to-site VPN tunnels250
IPSec VPN clients (maximum)10 (500)
SSL VPN licenses (maximum)2 (250)
Encryption/authenticationDES, 3DES, AES (128, 192, 256-bit)/MD5, SHA-1, Suite B Cryptography
Key exchangeDiffie Hellman Groups 1, 2, 5, 14v
Route-based VPNRIP, OSPF, BGP
Certificate supportVerisign, Thawte, Cybertrust, RSA Keon, Entrust and Microsoft CA for SonicWall-toSonicWall VPN, SCEP
VPN featuresDead Peer Detection, DHCP Over VPN, IPSec NAT Traversal, Redundant VPN Gateway, Route-based VPN
Global VPN client platforms supportedMicrosoft® Windows 10
NetExtenderMicrosoft® Windows 10, Linux
Mobile ConnectApple® iOS, Mac OS X, Google® Android™, Kindle Fire, Chrome OS, Microsoft® Windows 10
Security Services
Deep Packet Inspection servicesGateway Anti-Virus, Anti-Spyware, Intrusion Prevention, DPI SSL
Content Filtering Service (CFS)HTTP URL, HTTPS IP, keyword and content scanning, Comprehensive filtering based on file types such as ActiveX, Java, Cookies for privacy, allow/forbid lists
Comprehensive Anti-Spam ServiceYes
Application VisualizationYes
Application ControlYes
Capture Advanced Threat ProtectionYes
DNS SecurityYes
Networking
IP address assignmentStatic, (DHCP, PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP relay
NAT modes1:1, 1:many, many:1, many:many, flexible NAT (overlapping IPs), PAT, transparent mode
Routing protocolsBGP4, OSPF, RIPv1/v2, static routes, policy-based routing
QoSBandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1e (WMM)
AuthenticationLDAP (multiple domains), XAUTH/RADIUS, SSO, Novell, internal user database, Terminal Services, Citrix, Common Access Card (CAC)
Local user database250
VoIPFull H.323v1-5, SIP
StandardsTCP/IP, UDP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
CertificationsFIPS 140-2 (with Suite B) Level 2, UC APL, VPNC, IPv6 (Phase 2), ICSA Network Firewall, ICSA Anti-virus
Certifications pendingFIPS 140-2 (with Suite B) Level 2, IPv6 (Phase 2), ICSA Network Firewall, ICSA Anti-virus, Common Criteria NDPP (Firewall and IPS)
Hardware
Form factorDesktop
Power supply60W
Maximum power consumption (W)13.1
Input power100 to 240 VAC, 50-60 Hz
Total heat dissipation55.1 BTU
Dimensions3.5 x 15 x 22.5 cm
1.38 x 5.91 x 8.85 in
Weight0.97 kg / 2.14 lbs
WEEE weight1.42 kg / 3.13 lbs
Shipping weight1.93 kg / 4.25 lbs
MTBF (years)43.9
Environment (Operating/Storage)32°-105° F (0°-40° C)/-40° to 158° F (-40° to 70° C)
Humidity5-95% non-condensing
Regulatory
Major regulatory complianceFCC Class B, FCC , ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL/cUL, TUV/ GS, CB, Mexico DGN notice by UL, WEEE, REACH, BSMI, KCC/MSIP, ANATEL
Capture Advanced Threat Protection Service (CATPS)
For effective zero-day threat protection, organizations need solutions that include malware-analysis technologies and can detect evasive advanced threats and malware — today and tomorrow.

To protect customers against the increasing dangers of zero-day threats, SonicWall Capture Advanced Threat Protection Service — a cloud-based service available with SonicWall firewalls — detects and and can block advanced threats at the gateway until verdict. This service is the only advanced threat-detection offering that combines multi-layer sandboxing, including full system emulation and virtualization techniques, to analyze suspicious code behavior. This powerful combination detects more threats than single-engine sandbox solutions, which are compute environment specific and susceptible to evasion.

Key Benefits
  • High security effectiveness against unknown threats
  • Near real-time signature deployment protects from follow on attacks
  • Reduced total cost of ownership
  • Block files at the gateway until verdict
  • Multiple engines process files in parallel for rapid verdicts
  • SonicWall's RTDMI engine blocks unknown mass-market malware utilizing real-time memory-based inspection techniques

The solution scans traffic and extracts suspicious code for analysis, but unlike other gateway solutions, analyzes a broad range of file sizes and types (including executable programs, DLL, PDFs, MS Office documents, archives, JAR and APK). Global threat intelligence infrastructure rapidly deploys remediation signatures for newly identified threats to all SonicWall network security appliances, thus preventing further infiltration. Customers benefit from high-security effectiveness, fast response times and reduced total cost of ownership.

The SonicWall Capture reporting page displays daily at a glance results. Colored bars on the report indicate days where malware was discovered. Administrators have the ability to click on individual daily results and apply filters to quickly see malicious files with results.

Features
Multi-engine advanced threat analysis

SonicWall Capture Service extends firewall threat protection to detect and prevent zero-day attacks. The firewall inspects traffic, and detects and blocks intrusions and known malware. Suspicious files are sent to the SonicWall Capture cloud service for analysis. The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation and hypervisorlevel analysis technology, executes suspicious code and analyzes behavior, provides comprehensive visibility to malicious activity while resisting evasion tactics and maximizing zero-day threat detection.

Broad file type analysis

The service supports analysis of a broad range of file sizes and types, including executable programs (PE), DLL, PDFs, MS Office documents, archives, JAR and APK, plus multiple operating systems including Windows and Android. Administrators can customize protection by selecting or excluding files to be sent to the cloud for analysis by file type, file size, sender, recipient or protocol. In addition, administrators can manually submit files to the cloud service for analysis.

Blocks until verdict

To prevent potentially malicious files from entering the network, files sent to the cloud service for analysis can be held at the gateway until a verdict is determined.

Rapid deployment of remediation signatures

When a file is identified as malicious, a signature is immediately available to firewalls with SonicWall Capture subscriptions to prevent followon attacks. In addition, the malware is submitted to the SonicWall Capture Labs threat research team for further analysis and inclusion with threat information into the Gateway Anti-Virus and IPS signature databases. Additionally, it is sent to URL, IP and domain reputation databases within 48 hours.

Reporting and alerts

The SonicWall Capture Service provides an at-a-glance threat analysis dashboard and reports, which detail the analysis results for files sent to the service. including source, destination and a summary plus details of malware action once detonated. Firewall log alerts provide notification of suspicious files sent to the SonicWall Capture Service, and file analysis verdict.

Advanced Protection Service Suite
Complete network security, content filtering, application control, CaptureATP, gateway anti-virus, anti-spam, 24x7 support, cloud management and reporting in a single integrated package.

The SonicOS architecture is at the core of SonicWall physical and virtual firewalls including the TZ, NSa, NSv and NSsp Series. SonicOS leverages our patented, single-pass, lowlatency, Reassembly-Free Deep Packet Inspection® (RFDPI) and patent-pending Real-Time Deep Memory Inspection™ (RTDMI) technologies to deliver industry-validated high security effectiveness, SD-WAN, real-time visualization, high-speed virtual private networking (VPN) and other robust security features.

Through a combination of cloud-based and on-box technologies we deliver protection to our firewalls that’s been validated by independent third party testing for its extremely high security effectiveness. Unknown threats are sent to SonicWall’s cloud-based Capture Advanced Threat Protection (ATP) multiengine sandbox for analysis. Enhancing Capture ATP is our RTDMI™ technology. The RTDMI engine detects and blocks malware and zero-day threats by inspecting directly in memory. RTDMI technology is precise, minimizes false positives, and identifies and mitigates sophisticated attacks where the malware’s weaponry is exposed for less than 100 nanoseconds.

At a Glance
  1. Complete network security solution
    All service licences included.
  2. Capture ATP
    Multi-engine network sandbox to prevent zero-day threats. See Capture Advanced Threat Protection Service (CATPS).
  3. Gateway anti-virus and anti-spyware protection
    Including DPI-SSL and RFDPI.
  4. Cutting-edge IPS technology
    Protects against worms, trojans, software vulnerabilities and other intrusions by scanning all network traffic for malicious or anomalous patterns.
  5. Application intelligence and control
    Set of granular, application-specific policies providing application classification and policy enforcement to help administrators control and manage both business and non-business related applications.
  6. Content filtering
    Enforce internet use policies and control internal access to inappropriate, unproductive and potentially illegal web content with comprehensive content filtering. See Content Filtering Service (CFS).
  7. Network Topology View
    Display hosts, access-points in the network based on device name, mac address and IP Address.
  8. 24x7 support with firmware updates and hardware replacement
    Including firmware updates and hardware replacement protects your business and your SonicWall investment.
  9. Management and reporting
    Manage and view reports on firewalls via cloud through Network Security Manager tile of Capture Security Center. See Capture Security Centre (CSC).
Content Filtering Service (CFS) enforces internet use policies that block computers located behind the firewall, from accessing inappropriate and unproductive websites over a LAN, wireless LAN (WLAN), or VPN.

Educational institutions, businesses and government agencies assume substantial risks when they provide students and employees IT-issued computers that can be used to access the Internet, even when the device is behind the firewall perimeter where organizational web use policies are enforced. This is particularly true when those connections are used to access sites containing information or images that are inappropriate, dangerous or even illegal. These sites may also be infected with malware that can be inadvertently downloaded and then used to steal confidential information.

Schools, in particular, have a responsibility to protect students from inappropriate and harmful web content. For businesses and government agencies, providing employees with uncontrolled web access can result in non-productive web surfing, creating tremendous losses in productivity, not to mention the potential for legal liability.

Benefits
  • Best in-class protection
  • Granular content filtering controls
  • Dynamically updated rating architecture
  • Application traffic analytics
  • Easy-to-use web-based management
  • High-performance web caching and rating architecture
  • IP-based HTTPS content filtering
  • Scalable, cost-effective solution
  • Content Filtering Client for roaming devices

CFS running on SonicWall Unified Threat Management and next generation firewalls (NGFWs) is a powerful protection and productivity solution that delivers unequaled content filtering enforcement for educational institutions, businesses, libraries and government agencies. Using SonicWall CFS, organizations have control over the websites students and employees can access using their IT-issued computer behind the firewall.
SonicWall CFS compares requested websites against a massive database in the cloud containing millions of rated URLs, IP addresses and websites. CFS provides administrators with the tools to create and apply policies that allow or deny access to sites based on individual or group identity, or by time of day, for over 56 pre-defined categories. CFS also dynamically caches website ratings locally on the SonicWall firewall for nearinstantaneous response times.

For laptops that are used outside the firewall perimeter, the SonicWall Content Filtering Client addresses safety, security and productivity concerns by extending the controls to block harmful and unproductive web content. The client is automatically deployed and provisioned through a SonicWall firewall. In addition to providing IT administrators the tools to control web-based access for roaming devices, the Content Filtering Client can be configured to automatically switch enforcement to the internal policy once the device reconnects to the network firewall. The client is managed and monitored using a powerful policy and reporting engine in the cloud that is accessed seamlessly from the firewall interface. In the event an outdated client attempts to connect to the internal network to access the Internet, the connection is denied and the user receives a message with steps for remediation.

Features

Granular content filtering allows the administrator to block or apply bandwidth management to all predefined categories or any combination of categories. Administrators can apply User Level Authentication (ULA) and Single Sign-On (SSO) to enforce username and password logon. CFS can block potentially harmful content such as Java™, ActiveX®, and Cookies, as well as schedule filtering by time of day, such as during school or business hours. CFS also enhances performance by filtering out IM, MP3s, streaming media, freeware and other files that drain bandwidth.

Dynamically updated rating architecture cross-references all requested websites against a highly accurate database categorizing millions of URLs, IP addresses and domains. The SonicWall firewall receives ratings in real time, and then compares each rating to the local policy setting. The appliance will then either allow or deny the request based on the administrator’s locally configured policy.

Application traffic analytics suite includes SonicWall Global Management System (GMS®) and SonicWall Analyzer, each of which provides real-time and historic analysis of data transmitted through the firewall, including websites blocked and visited by user.

Easy-to-use web-based management enables flexible policy configuration and complete control over Internet usage. Administrators can enforce multiple custom policies for individual users, groups or specific category types. Local
URL filtering controls can allow or deny specific domains or hosts. To block objectionable and unproductive material more effectively, administrators can also create or customize filtering lists.

High-performance web caching and rating architecture allows administrators to block sites easily and automatically by category. URL ratings are cached locally on the SonicWall firewall, so that response time for subsequent access of frequently visited sites is only a fraction of a second.

IP-based HTTPS content filtering allows administrators to control user access to websites over encrypted HTTPS. HTTPS filtering is based on the categorical rating of websites containing information or images that are objectionable or unproductive such as violence, hate, online banking, shopping and others.

Scalable, cost-effective solution controls content filtering from the SonicWall firewall, eliminating the need for additional hardware or deployment expenditures on a separate dedicated filtering server.

24×7: Around the clock support, including weekends and holidays, for business-critical environments

Customer Success Manager: Provides enterprise environments with a dedicated trusted advisor. Your Customer Success Manager (CSM) acts on your behalf and works with your staff to help minimize unplanned downtime, optimize IT processes, provide operational reports to drive efficiencies and is your single point of accountability for a seamless support experience.

Focused Technical Support (FTS): Provides a named engineering resource to support your enterprise account. Your FTS will know and understand your environment, policies and IT objectives to bring you fast technical resolution when you need support.

SonicWall provides telephone and Web-based support, unlimited software/firmware updates and upgrades, and hardware replacement (RMA) for units with an active support agreement or covered under the warranty support period. See the Product Warranty section below for more information on SonicWall product warranties. In addition, SonicWall products include one (1) year of hardware warranty or the hardware duration provided under local law. Hardware warranty is separate from warranty support and is specific to the replacement of defective hardware. It does not include telephone, email or web-based support or software/firmware updates and upgrades.

SonicWall warranty and support agreements provide technical assistance during standard coverage hours, typically 24×7. A SonicWall technical specialist will work remotely with you to diagnose and identify software and hardware not performing to documented specifications. Support also includes general assistance regarding use and implementation on a limited basis. SonicWall’s warranty and support offerings do not include step-by-step installation or configuration of products or services. If you need installation or configuration assistance, SonicWall will refer you to a certified value-added reseller or offer you one of our Professional Services.

Warranty and support agreements provide for replacement of failing hardware returned to a SonicWall factory. The replacement product may be new, or like-new. In the event of product obsolescence, SonicWall reserves the right to replace failing product with a product of like or better features and functionality.

Contact SonicWall Customer Support Center if you think you have a hardware problem. The support specialist will log your case and determine with you whether a replacement unit is required. If so, you will be provided with a Returned Material Authorization (RMA) number for your reference. SonicWall will ship you a replacement unit via pre-paid, next business day airfreight to the address that you specify. Routine RMA orders are filled on the day that they are received if the RMA is processed before 12:00 p.m. PST (1:00 p.m. GMT in Europe). You may be asked to provide a credit card number or billing authorization to secure the return of the defective unit to SonicWall. In Europe, an RMA Purchase Order form can be used instead of a credit card. In certain regions or countries, RMA Services are facilitated via certified SonicWall resellers or partners.

SonicWall will automatically transfer the registration information and subscription services to the replacement unit. The replacement unit will include instructions for returning the defective unit to SonicWall. Shipping is paid by SonicWall. Please make sure that the RMA number is included with your shipment and that you return the defective unit to SonicWall within 30 days. After 30 days you will be billed the retail price of the new unit.

In addition to being extremely reliable, SonicWall products are recognized for being easy to install, configure and manage. SonicWall’s Limited Software Warranty enhances these features with:

Limited Software Warranty for All Non-E-Class Products

Software/Firmware Updates 90 days of software and firmware updates.

Support Tools Access to SonicWall’s electronic support tools.

Note: SonicWall E-Class appliances are not eligible for Limited Software Warranty

SonicWall requires continuous coverage for support agreements. Appliances with an expired warranty or support agreement are considered to be “out of support compliance.” Support Services Reinstatement provides the opportunity to bring these appliances back into compliance and up to date. Generally, new agreements are retroactively activated to the expiration date of the most recent support agreement.

Customers with appliances that have an expired support agreement who purchase SonicWall Support Services Reinstatement and a new one-, two- or three-year support agreement receive a full 12/24/36 months of support from date of activation. Also included in SonicWall Support Services Reinstatement is a single firmware update, allowing you access to the most current firmware features.

SonicWall will provide telephone and web-based support (via email) for active security services regardless of the appliance upon which the subscription is activated. Support for security services requires an active support contract for the appliance on which the service is running.

Support and updates/upgrades for SonicWall Global Management System (GMS) require a valid GMS support agreement, regardless of the appliance(s) that GMS is used to manage.

Generation 1, 2, 3 and 4 SonicWall appliances are not eligible to be registered.

8 a.m. – 5 p.m. local time is defined as follows: In North America: 8 a.m. – 5 p.m. Mountain Standard Time (MST). In Latin America: 8 a.m. – 5 p.m. Local Standard Time in the country where the product is deployed. In Europe, Middle East and Africa: 9 a.m. – 6 p.m. GMT +1 In Asia Pacific: 8 a.m. – 5 p.m. Local Standard Time in the country where the product is deployed. In Japan: 5 p.m. – 2 a.m. UTC/GMT

Virtualization is a technique for hiding the physical characteristics of computing resources from the way in which other systems, applications or end users interact with those resources. It is able to make a single physical resource, such as a server, operating system, application or storage device, appear to function as multiple logical devices. It can also make multiple physical resources such as storage devices or servers appear as a single logical resource.

As a result, virtualization enables IT departments to increase the utilization of resources, increase high availability, and simplify back-up, systems administration and recovery procedures. It also allows IT departments to be more responsive to the dynamic needs of the business. Examples of virtualization technologies include VMware ESX® Server, Citrix/XenServer® and Microsoft® Windows Server® 2008 Hyper-V®.

Our products leverage the binary compatibility offered through virtualization technologies, which provide complete transparency to the operating systems and applications deployed. As a result, for all casework received where SonicWall® software products are being used in a virtual environment, we will assume that the problem is common to both native and virtual operating environments, and we will only require the customer to recreate the problem in a native environment if and when there is reason to believe that the problem is unique to the virtual environment itself.

From a purely functional perspective, our products will operate in exactly the same way as in a native environment, however we can make no guarantees with respect to performance or scalability in a virtualization environment running multiple virtual instances. Configuration aspects such as CPU, memory availability, I/O subsystem and network infrastructure can all influence such a deployment, and should be given careful consideration to ensure the virtual layer has the necessary resources available to provide a satisfactory user experience.

We are committed to providing products which work on the latest platforms and technologies available in the industry today. We work closely with technology vendors to ensure earliest possible compatibility with our solutions. We provide full details of all systems requirements, together with platform and third-party product versions supported with our products, in the Release Notes published for each product. These include operating system versions, service pack levels, mail clients or server versions, database versions, browsers and other related technology that we support, and at the version level that our products have been formally tested and certified to run against.

The support of future platform versions, new service packs and other related technologies will be taken into consideration and addressed during the regular product maintenance and release cycles of our products. This provides ongoing upward compatibility of our products as used in customer environments. It should be noted, therefore, that there could be a delay between the availability of the latest platform technology release or service patch, and the product version certified to operate with our products. Please contact Support should you have any questions with regards to the current support status of any product and a particular related platform, patch or third-party product support not explicitly documented in our release notes.

For more information about the latest third-party platforms and versions we support, please review the System Requirements section of the release notes for your product or search our Knowledge Base on the Support Portal. Please note that while we do not directly or officially support third-party software, we work closely with many providers to ensure that our customers receive the best possible service at all times.

When a service request is created by the SonicWall Technical Assistance Center (TAC), a priority is assigned to the service request based on the problem type. Priorities and corresponding response targets are defined as follows:

SeverityDefinitionTarget Response Time
SEV-1Customer’s production system is severely impacted or completely down. System operations of a mission critical applications are down. Requires support access to available customer resources on site 24x7 until resolution or a suitable workaround to restore function is implemented.1 hour
SEV-2The production system is functioning with limited capabilities. The production system is unstable, with periodic interruptions.4 hours
SEV-3Isolated errors in a production, test bed or development environment, with full system operation. Issues related to configuration, performance or suspected defects that cannot wait. Also, clarification of documentation. Product/ Feature Enhancement requests1 business day
Remote Configuration & Setup

When you purchase a new firewall, SonicWall support does not cover initial configuration.  We can help you fill this gap by offering the optional add-on, “Remote Configuration & Support” when you purchase any of SonicWall TZ and NSa firewalls or from the Secure Mobile Access product sets.

Our experienced technicians will guide you through the installation and configuration process during an initial telephone consultation, regardless of your level of experience or skill.  All we require is access to the appliance over the internet and a contact phone number for your on-site engineer. The service is for a maximum of 2 hours - additional time can be purchased by prior agreement.

The Process

  1. Remember to tick the “REMOTE CONFIGURATION?” checkbox (above) before adding the device to the basket.  Once you’ve completed the purchase, we will contact you to book a scheduled telephone appointment with one of our engineers*.
  2. You will need to ensure that the appliance is available remotely on HTTPS.**
  3. Our engineer will contact you during the scheduled appointment (please provide a valid telephone number) to guide you through the installation and configuration process.
  4. Our service is tailored for any skill level so if you require additional support (or for more advanced configuration assistance), you can request an additional appointment.
  5. Once we are satisfied that your appliance is up and running, we will provide details of the network configuration, including setup and login details for your records.
  6. You can also expect a post-installation health check to ensure that your appliance is functioning at optimum levels.
  7. If you already have your network configuration planned out, we will implement it accordingly. If you do not have these details, we can advise on best practices, network setups, ranges and policies to ensure the most secure and flexible configuration. Full details will be provided at the end of the process.

* For multiple appliances, you will need to book a session for each installation.

** Although we can advise you on how to enable this, it is your responsibility to perform the required gateway/router changes. You may need to contact your connectivity provider. By default, the device is available on HTTPS. 

 

*
*
*
back to top