Overview
SonicWall Network Security virtual (NSv) firewall series brings industry leading next-generation firewall (NGFW) capabilities such as application intelligence and control, real-time monitoring, IPS, TLS/SSL decryption and inspection, advanced threat protection (ATP), VPN and network segmentation capabilities to protect your AWS environment. NSv virtual firewalls support the same security and networking features in SonicWall physical NGFW appliances including our patented Reassembly-Free Deep Packet Inspection (RFDPI) technology and award-winning Capture ATP sandbox with Real-Time Deep Memory Inspection (RTDMI) for advanced threat protection.
Centrally manage all your firewalls using the SonicWall Capture Security Center (CSC) to maintain consistent security policies across cloud and on-premises environments. The solution helps you implement security best practices and meet compliance standards.
Note: SonicWall supports most IPsec VPN data center and cloud solutions including models from Cisco, Fortinet, Palo Alto Networks, Sophos, Watchguard, Barracuda Networks, Check Point, Netgear, Zyxel, McAfee, Huawei, Forcepoint, Citrix Systems, Hewlett Packard, D-Link, OpenSwan, pfSense, Vyatta, plus best effort for any IPsec device that supports: IKEv1/2, AES 256/128, SHA1, MD5, and NAT-Traversal standards.
Highlights
- Next-generation security for public cloud infrastructure and resources; Gain complete visibility into your virtual environment for threat prevention; Implement proper security zoning and ensure appropriate placement of policies
- Defend against zero-day vulnerabilities with SonicWall Capture ATP; Prevent any service disruption in the virtual ecosystem; Gain centralized control and visibility with single-pane-of-glass management via the CSC; Increase agility and scalability without performance impact; Improve security governance, compliance and risk management
- Use Cases: Internet gateway for ingress/egress traffic protection; Lateral protection of east-west traffic; Site-to-Site VPN deployment; Secure end-to-end remote access; Multi-cloud secure connectivity
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
c5.large Recommended | $0.57 |
c5n.2xlarge | $1.54 |
c5n.large | $0.57 |
m5.xlarge | $0.72 |
m5n.xlarge | $0.72 |
m5n.2xlarge | $1.54 |
m5.2xlarge | $1.54 |
m5n.large | $0.57 |
m5.large | $0.57 |
c5n.xlarge | $0.72 |
Vendor refund policy
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Follow below guide for NSv 270/470/870 Configuring the NSv Virtual Firewall
- Make sure you have at least two elastic network interfaces installed. Also ensure both ENI are configured on different subnets.
- Launch URL [https://[NSv]https://[NSv DNS or IP]/ to access the admin web interface.
- On the appliance interface login page, type in the default credentials and then click Login. The default credentials are:
User: admin Password: [AWS instance ID]
You will need to change the password when you log in the first time. Full instructions for access are provided here: -
SonicOSX 7.0.0 https://www.sonicwall.com/techdocs/pdf/nsv-aws-getting-started-guide-payg-byol.pdfÂ
Resources
Vendor resources
Support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Standard contract
Customer reviews
Internal and cloud firewall deployment has reduced costs and improved real-time threat visibility
What is our primary use case?
My main use case for SonicWall NSv is as a firewall, specifically using it as an on-premise VM.
I can give you a quick specific example of how I use SonicWall NSv in my environment: we are using an internal firewall, so it's not a perimeter. We are using an internal firewall and only using an IPS.
Another use case I have is using SonicWall NSv in AWSÂ , which has BYOL. BYOL fits into my workflow because generally, there is no need to buy new hardware. I can use the CPU and RAM, and if it needs to grow, I can increase the CPU and RAM only without needing to change the hardware.
What is most valuable?
Real-time memory inspection in SonicWall NSv is quite unique and valuable, especially for security-focused environments.
SonicWall NSv has positively impacted my organization by being cost-effective, with latency monitoring as an added advantage for us, along with full SD-WAN.
I can share specific outcomes or metrics: it results in cost savings, especially with zero-touch deployment while maintaining it in our VM, which is more cost-effective for us.
What needs improvement?
To improve SonicWall NSv, we need to address that it is currently available only on AWS and Azure , and I think we need to move on with Oracle and GCP.
Regarding improvements, I find that logs are required. I chose 8 out of 10 because logs are unable to restore in the same system, requiring a separate analyzer or analytics. Competitors have seven-day storage available, which is very useful.
For how long have I used the solution?
I have been using SonicWall NSv for two years.
What do I think about the stability of the solution?
SonicWall NSv has been stable for me with no downtime or reliability issues.
What do I think about the scalability of the solution?
I would describe the scalability of SonicWall NSv as excellent. It can easily grow with my organization's needs.
How are customer service and support?
The customer support for SonicWall NSv is really good, and I have found it helpful when I needed assistance.
How would you rate customer service and support?
Positive
What other advice do I have?
I would rate the reporting and analytics features of SonicWall NSv as detailed enough for my needs.
I would describe the ease of management and configuration for SonicWall NSv as very useful, making it simple to create a policy in a single dashboard, which is easy to configure and maintain.
The security capabilities of SonicWall NSv compared to other firewall solutions I have used are moderate because deep inspection is required to prevent the URLs, making it very difficult to secure those.
My advice to others looking into using SonicWall NSv is that it is cost-effective. You can purchase it easily and maintain the firewall without issues.
I have rated this review 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
User management has improved security and visibility but support still needs refinement
What is our primary use case?
My main use case for SonicWall NSv is user management and protection.
I use SonicWall NSv for adding users to our network and ensuring that security.
What is most valuable?
The best features SonicWall NSv offers are its user-friendliness and ease of access.
SonicWall NSv is user-friendly and easy to access due to how it is generally set up.
SonicWall NSv has positively impacted my organization by allowing us to scale growth without having to constantly reinvent our processes.
SonicWall NSv has helped us scale growth and avoid reinventing processes by providing us with latency visibility, showing us how many people we can add and how we can scale through that capacity.
What needs improvement?
I do not have anything that comes to mind regarding how SonicWall NSv can be improved.
For how long have I used the solution?
I have been using SonicWall NSv for probably the last six months to a year, and I have used similar solutions in different companies throughout my career.
What do I think about the stability of the solution?
SonicWall NSv is stable.
What do I think about the scalability of the solution?
SonicWall NSv's scalability is scalable and very easy.
How are customer service and support?
The customer support for SonicWall NSv is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We switched between a couple of products before SonicWall NSv, and I was always more satisfied with SonicWall NSv.
Which other solutions did I evaluate?
I evaluated other options before choosing SonicWall NSv.
What other advice do I have?
I would advise others looking into using SonicWall NSv to use it as it is helpful and helps businesses do what they need to do while giving them the protection that they need.
I would rate this product a 7 out of 10.
Cloud firewall has unified hybrid access and has reduced operational effort across sites
What is our primary use case?
My main use case for SonicWall NSv is to secure cloud, such as using it for threat prevention, IPS, anti-malware, and VPN.
I use SonicWall NSv for threat prevention and VPN in my environment by managing different zones depending on what we're serving, which is practical because it's all software-based. We have been successful using and managing the environment.
I generally use SonicWall NSv as a firewall, so anything that is needed as a firewall is handled well.
What is most valuable?
The best features SonicWall NSv offers mainly include site-to-site VPN and segmentation, which are especially helpful in our hybrid cloud environment.
Segmentation is helpful because you are able to have people working in the same department, even though they are geographically dispersed, and they all will have the same access and user privileges. This allows us to reduce traffic, for example, for broadcasting on the network, and helps in bringing the team together, even though they are geographically dispersed.
SonicWall NSv has positively impacted my organization by allowing us to secure and manage the network in a secure fashion and providing easy access. This is helpful as it doesn't require somebody to be senior to perform small tasks.
A specific outcome that shows how SonicWall NSv helped my organization is that for any change in configuration, we need to make changes on the firewall. Using SonicWall NSv has been beneficial because of the ease of use and maintaining system security, making it business as usual.
What needs improvement?
SonicWall NSv can be improved by incorporating AI to help with configuration, propose scenarios, and check the changes before deployment, which would be helpful.
For how long have I used the solution?
I have been using SonicWall NSv for three years.
What do I think about the stability of the solution?
SonicWall NSv is stable.
What do I think about the scalability of the solution?
SonicWall NSv's scalability is good, as we can expand it to cover our network, making it suitable for the future as well.
How are customer service and support?
Customer support for SonicWall NSv is good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I did not previously use a different solution. We used to use a regular firewall, but now with SonicWall NSv, this has been helpful.
What was our ROI?
I have seen a return on investment with SonicWall NSv, as I have saved money by saving time and needing fewer employees due to the ease of use, allowing us to manage our resources better.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for SonicWall NSv is favorable.
Which other solutions did I evaluate?
Before choosing SonicWall NSv, we evaluated other options and used to have the physical SonicWall, the regular SonicWall where you purchase the device.
What other advice do I have?
My advice to others looking into using SonicWall NSv is that if they are using regular firewalls, this will be a game-changer, but there are also other NGFW options. The ROI is good, so that's the main thing, as the ratio between technical and financial benefits is favorable, and you can save money using it. I would rate this product 9 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Cloud firewall has secured servers and has simplified centralized VPN access for remote users
What is our primary use case?
I primarily use SonicWall NSv to protect cloud servers. I created firewall rules, check traffic, enable IPS, and use it for VPN access.
My main use case was securing the cloud server. I use SonicWall NSv to control incoming and outgoing traffic and to block threats in the cloud.
In one setup, I had to deploy SonicWall NSv on Azure . I created a virtual machine from a SonicWall image, assigned a network interface, and connected it between the internet and the cloud servers. After deployment, I configured basic firewall rules and NAT. In another setup, I configured SSL VPN for remote users. I created user accounts, assigned them to the VPN group, and configured the portal. The user connected through the SonicWall NSv VPN client and accessed the cloud server securely.
What is most valuable?
The best feature SonicWall NSv offers is its simple and clean interface that makes it easy to create rules, check logs, and manage security, even in the cloud. The IDS and IPS features work well and block common attacks, scanning attempts, and malicious traffic before it reaches the cloud servers. SonicWall NSv manages very stable VPN connectivity, as seen in the SSL VPNÂ example where remote users can connect securely to cloud resources without issues.
There are many features available, including application control features that can detect and control applications in the traffic. This helps block unnecessary or risky applications. Additionally, SonicWall NSv supports NAT and routing very easily, which is important for hosting applications in the cloud. The most valuable aspect is that it is lightweight and flexible compared to other cloud firewalls, and you can scale the VM size up or down based on your needs.
SonicWall NSv has reduced the risk of attack, which is very impactful for any organization, especially larger organizations. With IPS and threat protections enabled, the risk of attack and malware on cloud workloads is reduced significantly. You can have centralized management where you control everything centrally, giving you one place to manage all cloud security rules, VPNs, IPS, and monitoring. This makes management easier for the IT team. Since it is a virtual firewall, you do not need physical hardware, which reduced costs and removed the hardware maintenance effort. It has improved cloud security, reduced attack risk, allowed secure remote access, saved hardware costs, and made management simple for the IT team.
What needs improvement?
There is minimal room for improvement, perhaps one to two percent. The reporting and analytics should be improved. The reports could be more detailed and easier to customize.
For how long have I used the solution?
I have been working in my current field as a network security consultant for more than five years.
What do I think about the stability of the solution?
SonicWall NSv has been stable in our environment. We had no major downtime. From user feedback, it has been rated around eight to nine out of ten for stability.
What do I think about the scalability of the solution?
One challenge was the initial setup. Some options were not very clear in the beginning, so it took some time to configure everything properly. The second challenge was performance. When the traffic increased, we had to upgrade the VM size, otherwise it would slow down. Performance totally depends on the VM size.
How are customer service and support?
Customer support for SonicWall NSv is excellent.
How would you rate customer service and support?
Positive
How was the initial setup?
One challenge was the initial setup. Some options were not very clear in the beginning, so it took some time to configure everything properly. The information provided was very knowledgeable and very helpful.
What was our ROI?
The return on investment was approximately five thousand to eight thousand dollars in savings.
What's my experience with pricing, setup cost, and licensing?
The licensing cost was a bit higher compared to other options, but it is negligible.
Which other solutions did I evaluate?
SonicWall NSv is very helpful to deploy and manage. Everything can be managed easily and it is very simple, so I cannot justify switching to other options.
What other advice do I have?
My advice is to select the correct VM size. There could be a little bit of improvement regarding the VM size selection to ensure optimal performance. My overall rating for this product is eight out of ten.
Secures east-west cloud traffic and improves threat visibility through deep inspection
What is our primary use case?
I can give you an example for micro-segmentation and traffic control from my previous company. Imagine you have a standard three-tier web application hosted within a single virtual private cloud in AWS or Azure . Before SonicWall NSv segmentation, there is a risk because these three tiers often exist in the same flat virtual network and are separated only by basic security groups. Any successful attack, such as a zero-day exploit, would grant the web tier direct access for the attacker to gain a foothold inside the network because the security groups may only enforce simple port rules, such as allowing the app tier to talk to the database tier on port 1430.
In the solution, SonicWall NSv serves as a network segmentation gateway that can be deployed between these tiers. For example, SonicWall NSv can be deployed as a zoning and policy enforcement gateway with east-west security. By forcing all intra-cloud traffic to east-west to traverse SonicWall NSv, we gain full visibility. We can inspect the encrypted traffic using DPI-SSL between our own servers, and we can check attack containment. If the web tier is compromised, the attacker is immediately blocked by SonicWall NSv IPS signatures, and we maintain regulatory compliance.
Previously, I worked with a company where we had clients from the financial sector. We used a simple illustration about Innova Financial, a medium to large financial service company that is subject to regulations like PCI DSS. They used SonicWall NSv to secure their mission-critical cloud platform in Microsoft Azure .
What is most valuable?
Regarding deep memory inspection and real-time zero-day defense in SonicWall NSv, deep memory inspection is distinct from traditional sandboxing methods because it is focused on what is happening in the memory during file execution time, rather than just observing file system behavior. The deep memory inspection process addresses all challenges by employing a proprietary technique within the secure analysis environment, focusing on CPU-level analysis and real-time verdict. Those are the key points.
SonicWall NSv's user interface is quite clear and easy to navigate. If someone has not worked with SonicWall and this is their first experience with the platform, I would highly recommend it. It is very easy to navigate and very user-friendly.
SonicWall NSv has positively impacted our organization because we gained clear visibility into our network, and it helps to identify potential security issues that we had. We were able to remediate those issues, and so far, we have had a great experience with SonicWall NSv. We were able to manage approximately 99% of network-based attacks through this platform.
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
I would rate the customer support of SonicWall NSv a nine.
How would you rate customer service and support?
Positive