Overview
SonicWall Network Security virtual (NSv) firewall series brings industry leading next-generation firewall (NGFW) capabilities such as application intelligence and control, real-time monitoring, IPS, TLS/SSL decryption and inspection, advanced threat protection (ATP), VPN and network segmentation capabilities to protect your AWS environment. NSv virtual firewalls support the same security and networking features in SonicWall physical NGFW appliances including our patented Reassembly-Free Deep Packet Inspection (RFDPI) technology and award-winning Capture ATP sandbox with Real-Time Deep Memory Inspection (RTDMI) for advanced threat protection.
Centrally manage all your firewalls using the SonicWall Capture Security Center (CSC) to maintain consistent security policies across cloud and on-premises environments. The solution helps you implement security best practices and meet compliance standards.
Note: SonicWall supports most IPsec VPN data center and cloud solutions including models from Cisco, Fortinet, Palo Alto Networks, Sophos, Watchguard, Barracuda Networks, Check Point, Netgear, Zyxel, McAfee, Huawei, Forcepoint, Citrix Systems, Hewlett Packard, D-Link, OpenSwan, pfSense, Vyatta, plus best effort for any IPsec device that supports: IKEv1/2, AES 256/128, SHA1, MD5, and NAT-Traversal standards.
Highlights
- Next-generation security for public cloud infrastructure and resources; Gain complete visibility into your virtual environment for threat prevention; Implement proper security zoning and ensure appropriate placement of policies
- Defend against zero-day vulnerabilities with SonicWall Capture ATP; Prevent any service disruption in the virtual ecosystem; Gain centralized control and visibility with single-pane-of-glass management via the CSC; Increase agility and scalability without performance impact; Improve security governance, compliance and risk management
- Use Cases: Internet gateway for ingress/egress traffic protection; Lateral protection of east-west traffic; Site-to-Site VPN deployment; Secure end-to-end remote access; Multi-cloud secure connectivity
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
c5.large Recommended | $0.57 |
c5n.2xlarge | $1.54 |
c5n.large | $0.57 |
m5.xlarge | $0.72 |
m5n.xlarge | $0.72 |
m5n.2xlarge | $1.54 |
m5.2xlarge | $1.54 |
m5n.large | $0.57 |
m5.large | $0.57 |
c5n.xlarge | $0.72 |
Vendor refund policy
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Follow below guide for NSv 270/470/870 Configuring the NSv Virtual Firewall
- Make sure you have at least two elastic network interfaces installed. Also ensure both ENI are configured on different subnets.
- Launch URL [https://[NSv]https://[NSv DNS or IP]/ to access the admin web interface.
- On the appliance interface login page, type in the default credentials and then click Login. The default credentials are:
User: admin Password: [AWS instance ID]
You will need to change the password when you log in the first time. Full instructions for access are provided here: -
SonicOSX 7.0.0 https://www.sonicwall.com/techdocs/pdf/nsv-aws-getting-started-guide-payg-byol.pdfÂ
Resources
Vendor resources
Support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Standard contract
Customer reviews
Has supported cloud deployments with detailed controls and could improve identity integration
What is our primary use case?
My main use case for SonicWall NSv is cloud space, specifically for Azure , AWS , and GCP deployments.
I use SonicWall NSv to secure cloud infrastructure instead of relying on Azure barebone security or AWS security. This allows me to get more granular control with my security settings.
I also use it to protect our private data center. We have customers that utilize it in a similar manner to Azure infrastructure, but within our own environment.
What is most valuable?
SonicWall NSv offers the option for Classic or Policy Mode, which allows me to choose between the two. If I need more granular control, I would prefer to use Policy Mode. If it is a simple configuration with one network that does not require much complexity, then Classic Mode is perfect.
When I use Policy Mode for more granular configurations, I can address situations where that flexibility makes a difference, such as wanting to have one network or one zone over another. I am not limited to the global security service configuration and can have multiple different security policies.
SonicWall NSv has positively impacted my organization. One specific outcome I have noticed is the low cost of licensing and that it is a trusted security appliance.
The low cost and trusted security have led to measurable benefits such as cost savings, which allow us to invest in other technologies.
What needs improvement?
SonicWall NSv can be improved, particularly in the SAML implementation, which was introduced in 7.2 firmware. I have 7.3, and I am waiting on that first jumbo hotfix from SonicWall. There is a need to continue improving the SAML implementation.
For how long have I used the solution?
I have been using SonicWall NSv for about seven years.
What do I think about the stability of the solution?
SonicWall NSv is stable.
What do I think about the scalability of the solution?
With NSM, the Network Security Manager, SonicWall NSv is quite scalable. You can operate multiple different NSvs under one management plane.
How are customer service and support?
Customer support from SonicWall could see some improvement. With the number of items that SonicWall has going on at the moment, the wait line can be quite intrusive.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Before choosing SonicWall NSv, I evaluated other options such as FortiGate virtual servers. For our customers, it always comes down to cost, where their budget is, and whether they need to go with FortiGate or SonicWall. Along with the cost, it also factors in how granular they need to utilize it. If they know they need to have BGP, then I might forgo SonicWall.
What was our ROI?
I have seen a return on investment. The relevant metric includes the time saved in deployment, especially if you go with Classic Mode over Policy Mode. Not much has changed since the release of Gen 7.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is that licensing is fairly simple. I work with account managers at SonicWall, submit quotes with my distribution group, and the process is seamless.
Which other solutions did I evaluate?
I did not purchase SonicWall NSv through the AWS Marketplace . I bring my own license.
What other advice do I have?
Integration is something worth discussing.
SonicWall NSv integrates well with my existing systems. I have a built-in syslog system called ForVideo, and I can ingest all logs from SonicWall NSv appliance that I may not be able to get from a FortiGate.
My advice to others looking into using SonicWall NSv is that if deploying SonicWall NSv, I would really consider using Policy Mode over Classic Mode. I know it is quite a change going to that mode, but if you have to change to Policy Mode in the future, then you are looking at redeploying SonicWall NSv. If you deploy it from the start, you have that scalability to continue to grow.
I would rate this product a seven out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Excellent Advanced Threat Protection and Low Latency
Inspection of encrypted traffic
low latency
Strong visibility
patching issues
This drastically reduces infection risks, downtime, and potential data breaches.