TZ Series


 TZ-Series-banner

 

Exceptional security and stellar performance at a disruptively low TCO

Dell SonicWALL TZ series firewalls are high-performance, enterprise-grade network security solutions that match the limited budget and resources of small and medium-sized businesses (SMBs), remote and branch offices and retail point-of-sale locations.

SonicWALL TZ series firewalls provide broad protection with advanced security services consisting of on-box and cloud-based anti-malware, antispyware, intrusion prevention system (IPS), and URL filtering. To counter the trend of encrypted attacks, the new SonicWALL TZ series has the processing power to inspect encrypted SSL connections against the latest threats.

Backed by the Dell SonicWALL Global Response Intelligent Defense (GRID) network, the SonicWALL TZ series delivers continuous updates to maintain a strong network defense against cybercriminals. The SonicWALL TZ series is able to scan every byte of every packet on all ports and protocols with almost zero latency and no file size limitations.

The SonicWALL TZ series features Gigabit Ethernet ports, optional integrated 802.11ac wireless, IPSec and SSL VPN, failover through integrated 3G/4G support, load balancing and network segmentation that acknowledge the need for advanced networking features as well as advanced security. The SonicWALL TZ series UTM firewalls also provide broad support for native VPN remote access clients on Apple iOS, Google Android, Amazon Kindle, Windows, MacOS and Linux platforms, for fast, secure mobile access.

The Dell SonicWALL Global Management System (GMS) enables deployment and management of SonicWALL TZ series firewalls from a single system at the central office.

No-compromise protection for your business

In order for SMBs to grow, they must embrace new technologies such as mobility and the cloud. However, these new technologies can expose SMBs to malicious attacks. All businesses, regardless of size, need full protection. To accomplish this, the SonicWALL TZ series provides an integrated solution that inspects the entire network traffic including encrypted SSL connections.

Managed security for distributed environments

Schools, retail shops, remote sites, branch offices and distributed enterprises need a solution that integrates with their corporate firewall. SonicWALL TZ series firewalls share the same code base—and same protection— as our flagship SuperMassive nextgeneration firewalls. This simplifies remote site management, as every administrator sees the same user interface (UI). GMS enables network administrators to configure, monitor and manage remote SonicWALL firewalls through a single pane of glass. By adding high-speed, secure wireless, the SonicWALL TZ series extends the protection perimeter to include customers and guests frequenting the retail site or remote office.

Benefits:

  • Enterprise grade network protection that includes anti-malware, intrusion prevention, application control and content/URL filtering
  • Deep packet inspection on all traffic – without restrictions on file size or protocol, including encrypted SSL connections
  • Secure 802.11ac wireless connectivity using integrated wireless controller or via external Dell SonicPoint wireless access points
  • SSL VPN remote access for Apple iOS, Google Android, Amazon Kindle, Windows, Mac OS and Linux devices

Features and Benefits:

 

SonicWALL TZ Series Features:
RFDPI engine
Feature Description
Reassembly-Free Deep Packet Inspection This high-performance, proprietary and patented inspection engine performs stream based bi-directional traffic analysis, without proxying or buffering, to uncover intrusion attempts, malware and identify application traffic regardless of port.
Bi-directional inspection Scans for threats in both inbound and outbound traffic simultaneously to ensure that the network is not used to distribute malware, and does not become a launch platform for attacks in case an infected machine is brought inside.
Single-pass inspection A single-pass DPI architecture simultaneously scans for malware, intrusions and application identification, drastically reducing DPI latency and ensuring that all threat information is correlated in a single architecture.
Stream-based inspection Proxy-less and non-buffering inspection technology provides ultra-low latency performance for deep packet inspection of simultaneous network streams without introducing file and stream size limitations, and can be applied on common protocols as well as raw TCP streams.
Intrusion prevention
Countermeasure-based protection Tightly integrated intrusion prevention system (IPS) leverages signatures and other countermeasures to scan packet payloads for vulnerabilities and exploits, covering a broad spectrum of attacks and vulnerabilities.
Automatic signature updates The Dell SonicWALL Threat Research Team continuously researches and deploys updates to an extensive list of IPS countermeasures that covers more than 50 attack categories. The new updates take immediate effect without any reboot or service interruption required.
Intra-zone IPS protection Bolsters internal security by segmenting the network into multiple security zones with intrusion prevention, preventing threats from propagating across the zone boundaries.
Botnet command and control (CnC) detection and blocking Identifies and blocks command and control traffic originating from bots on the local network to IPs and domains that are identified as propagating malware or are known CnC points.
Protocol abuse/anomaly Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
Zero-day protection Protects the network against zero-day attacks with constant updates against the latest exploit methods and techniques that cover thousands of individual exploits.
Anti-evasion technology Extensive stream normalization, decoding and other techniques ensure that threats do not enter the network undetected by utilizing evasion techniques in Layers 2-7.
Threat prevention
Gateway anti-malware The RFDPI engine scans all inbound, outbound and intra-zone traffic for viruses, Trojans, key loggers and other malware in files of unlimited length and size across all ports and TCP streams.
CloudAV malware protection A continuously updated database of over 17 million threat signatures resides in the Dell SonicWALL cloud servers and is referenced to augment the capabilities of the onboard signature database, providing RFDPI with extensive coverage of threats.
Around-the-clock security updates New threat updates are automatically pushed to firewalls in the field with active security services, and take effect immediately without reboots or interruptions.
SSL decryption and inspection Decrypts and inspects SSL traffic on the fly, without proxying, for malware, intrusions and data leakage, and applies application, URL and content control policies in order to protect against threats hidden in SSL encrypted traffic Included with security subscriptions for all models except SOHO. Sold as a separate license on SOHO
Bi-directional raw TCP inspection The RFDPI engine is capable of scanning raw TCP streams on any port bi-directionally preventing attacks that they to sneak by outdated security systems that focus on securing a few well-known ports.
Extensive protocol support Identifies common protocols such as HTTP/S, FTP, SMTP, SMBv1/v2 and others, which do not send data in raw TCP, and decodes payloads for malware inspection, even if they do not run on standard, well-known ports.
Application intelligence and control*
Application control Control applications, or individual application features, that are identified by the RFDPI engine against a continuously expanding database of over 3,500 application signatures, to increase network security and enhance network productivity.
Custom application identification Control custom applications by creating signatures based on specific parameters or patterns unique to an application in its network communications, in order to gain further control over the network.
Application bandwidth management Granularly allocate and regulate available bandwidth for critical applications or application categories while inhibiting nonessential application traffic.
Granular control Control applications, or specific components of an application, based on schedules, user groups, exclusion lists and a range of actions with full SSO user identification through LDAP/AD/Terminal Services/Citrix integration
Content filtering
Inside/outside content filtering Enforce acceptable use policies and block access to websites containing information or images that are objectionable or unproductive with Content Filtering Service. Extend policy enforcement to block internet content for devices located outside the firewall perimeter with the Content Filtering Client.
Granular controls Block content using the predefined categories or any combination of categories. Filtering can be scheduled by time of day, such as during school or business hours, and applied to individual users or groups.
YouTube for Schools Enable teachers to choose from hundreds of thousands of free educational videos from YouTube EDU that are organized by subject and grade and align with common educational standards.
Web caching URL ratings are cached locally on the Dell SonicWALL firewall so that the response time for subsequent access to frequently visited sites is only a fraction of a second.
Enforced anti-virus and anti-spyware
Multi-layered protection Utilize the firewall capabilities as the first layer of defense at the perimeter, coupled with endpoint protection to block, viruses entering network through laptops, thumb drives and other unprotected systems.
Automated enforcement option Ensure every computer accessing the network has the most recent version of anti-virus and anti-spyware signatures installed and active, eliminating the costs commonly associated with desktop anti-virus and antispyware management.
Automated deployment and installation option Machine-by-machine deployment and installation of anti-virus and anti-spyware clients is automatic across the network, minimizing administrative overhead.
Always on, automatic virus protection Frequent anti-virus and anti-spyware updates are delivered transparently to all desktops and file servers to improve end user productivity and decrease security management.
Spyware protection Powerful spyware protection scans and blocks the installation of a comprehensive array of spyware programs on desktops and laptops before they transmit confidential data, providing greater desktop security and performance.
Firewall and networking
Stateful packet inspection All network traffic is inspected, analyzed and brought into compliance with firewall access policies.
DDoS/DoS attack protection SYN Flood protection provides a defense against DOS attacks using both Layer 3 SYN proxy and Layer 2 SYN blacklisting technologies. Additionally, it provides the ability to protect against DOS/DDoS through UDP/ICMP flood protection and connection rate limiting.
Flexible deployment options The SonicWALL TZ Series can be deployed in traditional NAT, Layer 2 Bridge, Wire Mode and Network Tap modes.
IPv6 support Internet Protocol version 6 (IPv6) is in its early stages to replace IPv4. With the latest SonicOS, the hardware will support filtering implementations.
High availability SonicWALL TZ500 and SonicWALL TZ600 models support high availability with Active/Standby with state synchronization. SonicWALL TZ300 and SonicWALL TZ400 models support high availability without Active/Standby synchronization. There is no high availability on SonicWALL SOHO models.
Wireless Network Security IEEE 802.11ac wireless technology can deliver up to 1.3 Gbps of wireless throughput with greater range and reliability. Available on SonicWALL TZ600 through SonicWALL TZ300 models. Optional 802.11 a/b/g/n is available on SonicWALL SOHO models.
Management and reporting
Global Management System Dell SonicWALL GMS monitors, configures and reports on multiple Dell SonicWALL appliances through a single management console with an intuitive interface to reduce management costs and complexity.
Powerful, single device management An intuitive, web-based interface allows quick and convenient configuration. Also, a comprehensive command line interface and support for SNMPv2/3.
IPFIX/NetFlow application flow reporting Exports application traffic analytics and usage data through IPFIX or NetFlow protocols for real-time and historical monitoring and reporting with tools such as Dell SonicWALL Scrutinizer or other tools that support IPFIX and NetFlow with extensions.
Virtual Private Networking
IPSec VPN for site-to-site connectivity High-performance IPSec VPN allows the SonicWALL TZ Series to act as a VPN concentrator for thousands of other large sites, branch offices or home offices.
SSL VPN or IPSec client remote access Utilizes clientless SSL VPN technology or an easy-to-manage IPSec client for easy access to email, files, computers, intranet sites and applications from a variety of platforms.
Redundant VPN gateway When using multiple WANs, a primary and secondary VPN can be configured to allow seamless automatic failover and failback of all VPN sessions.
Route-based VPN The ability to perform dynamic routing over VPN links ensures continuous uptime in the event of a temporary VPN tunnel failure, by seamlessly re-routing traffic between endpoints through alternate routes.
Content./context awareness
User activity tracking User identification and activity are made available through seamless AD/LDAP/Citrix1/TerminalServices SSO integration combined with extensive information obtained through DPI.
GeoIP country traffic identification Identifies and controls network traffic going to or coming from specific countries to either protect against attacks from known or suspected origins of threat activity, or to investigate suspicious traffic originating from the network.
Regular expression DPI filtering Prevents data leakage by identifying and controlling content crossing the network through regular expression matching.

Architecture & Deployment:

Reassembly-Free Deep Packet Inspection (RFDPI) engine

The RFDPI engine provides superior threat protection and application control without compromising performance. This patented engine inspects the traffic stream to detect threats at Layers 3-7. The RFDPI engine takes network streams through extensive and repeated normalization and decryption in order to neutralize advanced evasion techniques that seek to confuse detection engines and sneak malicious code into the network. Once a packet undergoes the necessary preprocessing, including SSL decryption, it is analyzed against a single proprietary memory representation of three signature databases: intrusion attacks, malware and applications. The connection state is then advanced to represent the position of the stream relative to these databases until it encounters a state of attack, or another “match” event, at which point a pre-set action is taken. As malware is identified, the SonicWALL firewall terminates the connection before any compromise can be achieved and properly logs the event. However, the engine can also be configured for inspection only or, in the case of application detection, to provide Layer 7 bandwidth management services for the remainder of the application stream as soon as the application is identified.

Reassembly-Free Deep Packet Inspection (RFDPI) engine

Extensible architecture for extreme scalability and performance

The RFDPI engine is designed from the ground up with an emphasis on providing security scanning at a high performance level, to match both the inherently parallel and ever-growing nature of network traffic. When combined with multi-core processor systems, this parallel-centric software architecture scales up perfectly to address the demands of deep packet inspection at high traffic loads. The SonicWALL TZ Series platform relies on processors that, unlike x86, are optimized for packet, crypto and network processing while retaining flexibility and programmability in the field—a weak point for ASICs systems. This flexibility is essential when new code and behavior updates are necessary to protect against new attacks that require updated and more sophisticated detection techniques.

Extensible architecture for extreme scalability and performance

Security and protection

The dedicated, in-house Dell SonicWALL Threat Research Team works on researching and developing countermeasures to deploy to the firewalls in the field for up-to-date protection. The team leverages more than one million sensors across the globe for malware samples, and for telemetry feedback on the latest threat Information, which in turn is fed into the intrusion prevention, anti-malware and application detection capabilities. Dell SonicWALL firewall customers with current subscriptions are provided continuously updated threat protection around the clock, with new updates taking effect immediately without reboots or interruptions. The signatures on the appliances protect against wide classes of attacks, covering up to tens of thousands of individual threats with a single signature. In addition to the countermeasures on the appliance, all Dell SonicWALL firewalls also have access to the Dell SonicWALL CloudAV service, which extends the onboard signature intelligence with more than 17 million signatures, and growing. This CloudAV database is accessed via a proprietary light-weight protocol by the firewall to augment the inspection done on the appliance. With Geo-IP and botnet filtering capabilities, Dell SonicWALL next-generation firewalls are able to block traffic from dangerous domains or entire geographies in order to reduce the risk profile of the network.

Dell SonicWALL TZ Deployment

Application intelligence and control

Application intelligence informs administrators of application traffic traversing the network, so they can schedule application controls based on business priority, throttle unproductive applications, and block potentially dangerous applications. Real-time visualization identifies traffic anomalies as they happen, enabling immediate countermeasures against potential inbound or outbound attacks or performance bottlenecks. Dell SonicWALL application traffic analytics provide granular insight into application traffic, bandwidth utilization and security threats, as well as powerful troubleshooting and forensics capabilities. Additionally, secure single sign-on (SSO) capabilities enhance the user experience, increase productivity and reduce support calls. Management of application intelligence and control is simplified by using an intuitive web-based interface.

Dell SonicWALL TZ Deployment

Global management and reporting

For larger, distributed enterprise deployments, the optional Dell SonicWALL Global Management System (GMS) provides administrators a unified, secure and extensible platform to manage Dell SonicWALL security appliances. It enables enterprises to easily consolidate the management of security appliances, reduce administrative and troubleshooting complexities and governs all operational aspects of the security infrastructure including centralized policy management and enforcement, real-time event monitoring, analytics and reporting, and more. GMS also meets the firewall change management requirements of enterprises through a workflow automation feature. This enables enterprises to gain agility and confidence in deploying the right firewall policies, at the right time, and in conformance with compliance regulations. GMS provides a better way to manage network security by business processes and service levels that dramatically simplify the lifecycle management of your overall security environments rather than on a device-by- device basis.

Flexible and secure wireless

Available as an optional feature, highspeed 802.11ac wireless combines with Dell SonicWALL next-generation firewall technology to create a wireless network security solution that delivers comprehensive protection for wired and wireless networks.

This enterprise-level wireless performance enables WiFi-ready devices to connect from greater distances and use bandwidth-intensive mobile apps, such as video and voice, in higher density environments without experiencing signal degradation.

Models: TZ SOHO TZ300 TZ400 TZ500 TZ600
Performance Overview
SonicOS Version SonicOS 5.9x / 6.2.x SonicOS 6.2.x
Security Processor 2 x 400 MHz / 2 x 800 MHz 2 x 800 MHz 4 x 800 MHz 4 x 1 GHz 4 x 1.4 GHz
Memory (RAM) 512 MB / 1GB 1 GB 1 GB 1 GB 1 GB
Memory (flash) 32 MB / 64 MB 64 MB 64 MB 64 MB 64 MB
1 GbE Copper Interfaces 5 5 7 8 9
Expansion USB USB USB 2 USB Expansion Slot (Rear)*, 2 USB
Firewall Inspection Throughput1 300 Mbps 750 Mbps 1,300 Mbps 1,400 Mbps 1,500 Mbps
Full DPI Throughput2 50 Mbps 100 Mbps 300 Mbps 400 Mbps 500 Mbps
Application Inspection Throughput2 300 Mbps 900 Mbps 1,000 Mbps 1,100 Mbps
IPS Throughput2 100 Mbps 300 Mbps 900 Mbps 1,000 Mbps 1,100 Mbps
Anti-malware Throughput2 50 Mbps 100 Mbps 300 Mbps 400 Mbps 500 Mbps
IMIX Throughput3 60 Mbps 200 Mbps 500 Mbps 700 Mbps 900 Mbps
SSL Inspection & Decryption (DPI SSL) Throughput2 15 Mbps 45 Mbps 100 Mbps 150 Mbps 200 Mbps
IPSec VPN Throughput3 100 Mbps 300 Mbps 900 Mbps 1,000 Mbps 1,100 Mbps
Connections per second 1,800 5,000 6,000 8,000 12,000
Maximum connections (SPI) 25,000 50,000 100,000 125,000 150,000
Maximum connections (DPI) 25,000 50,000 90,000 100,000 125,000
Single Sign-On (SSO) Users 250 500 500 500 500
VLAN Interfaces 25 25 50 50 50
SonicPoints Supported 2 8 16 16 24
VPN TZ SOHO TZ300 TZ400 TZ500 TZ600
Site-to-Site VPN Tunnels 10 10 20 25 50
IPSec VPN Clients (maximum) 1 (5) 1 (10) 2 (25) 2 (25) 2 (25)
SSL VPN Licenses (maximum) 1 (10) 1 (50) 2 (100) 2 (150) 2 (200)
Virtual Assist Bundled (Maximum) 30-day trial (1) 30-day trial (1) 30-day trial (1) 30-day trial (1)
Encryption/Authentication DES, 3DES, AES (128, 192, 256-bit), MD5, SHA-1, Suite B Cryptography
Key Exchange Diffie Hellman Groups 1, 2, 5, 14
Route-based VPN RIP, OSPF
Certificate Support Verisign, Thawte, Cybertrust, RSA Keon, Entrust and Microsoft CA for Dell SonicWALL-to-Dell SonicWALL VPN, SCEP
VPN Features Dead Peer Detection, DHCP Over VPN, IPSec NAT Traversal, Redundant VPN Gateway, Route-based VPN
Global VPN Client Platforms Supported Microsoft® Windows Vista 32/64-bit, Windows 7 32/64-bit, Windows 8.0 32/64-bit, Windows 8.1 32/64-bit
NetExtender Microsoft Windows Vista 32/64-bit, Windows 7, Windows 8.0 32/64-bit, Windows 8.1 32/64-bit, Mac OS X 10.4+, Linux FC3+/Ubuntu 7+/OpenSUSE
Mobile Connect Apple® iOS, Mac OS X, Google® Android™, Kindle Fire, Windows 8.1 (Embedded)
Security Services TZ SOHO TZ300 TZ400 TZ500 TZ600
Deep Packet Inspection Services Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, DPI SSL
Content Filtering Service (CFS) HTTP URL, HTTPS IP, keyword and content scanning, ActiveX, Java Applet, and cookie blocking bandwidth management on filtering categories, allow/forbid lists
Enforced Client Anti-Virus and Anti-Spyware McAfee®
Comprehensive Anti-Spam Service Supported
Application Visualization No Yes Yes Yes Yes
Application Control Yes Yes Yes Yes Yes
Networking TZ SOHO TZ300 TZ400 TZ500 TZ600
IP Address Assignment Static, (DHCP, PPPoE, L2TP and PPTP client), Internal DHCP server, DHCP relay
NAT Modes 1:1, 1:many, many:1, many:many, flexible NAT (overlapping IPs), PAT, transparent mode
Routing Protocols BGP, OSPF, RIPv1/v2, static routes, policy-based routing, multicast
QoS Bandwidth priority, max bandwidth, guaranteed bandwidth, DSCP marking, 802.1e (WMM)
Authentication XAUTH/RADIUS, Active Directory, SSO, LDAP, Novell, internal user database, Terminal Services, Citrix
Local User Database 150 250
VoIP Full H.323v1-5, SIP
Standards TCP/IP, UDP, ICMP, HTTP, HTTPS, IPSec, ISAKMP/IKE, SNMP, DHCP, PPPoE, L2TP, PPTP, RADIUS, IEEE 802.3
Certifications VPNC, IPv6 (Phase 2)
Certifications Pending Common Criteria NDPP, FIPS 140-2 (with Suite B) Level 2, ICSA Firewall, ICSA Anti-virus, UC APL
Common Access Card (CAC) Supported
High availability No Active/standby Active/standby Active/standby with stateful synchronization Active/standby with stateful synchronization
Hardware TZ SOHO TZ300 TZ400 TZ500 TZ600
Form Factor Desktop
Power Supply (W) 24W external 24W external 24W external 36W external 60W external
Maximum Power Consumption (W) 7.9 6.9 9.2 13.47 16.17
Input Power 100 to 240 VAC, 50-60 Hz, 1 A
Total Heat Dissipation 21.8 BTU 22.3 BTU 28.6 BTU 38.7 BTU 48.3 BTU
Dimensions (in) 1.4×5.6×7.5 1.3×5.3×7.5 1.3×5.3×7.5 1.4×5.9×8.9 1.4×7.1×11.0
Dimensions (cm) 3.6×14.1×19 3.5×13.4×19 3.5×13.4×19 3.5x15x22.5 3.5x18x28
Weight 0.34 Kg 0.725 Kg 0.725 Kg 0.915 Kg 1.47 Kg
WEEE Weight 0.8 Kg 1.145 Kg 1.148 Kg 1.338 Kg 1.893 Kg
Shipping Weight 1.2 Kg 1.373 Kg 1.373 Kg 1.928 Kg 2.483 Kg
MTBF (Years) 58.9 56.1 54 40.8 18.4
Environment 40-105° F, 0-40° C
Humidity 5-95% non-condensing
Major Regulatory Compliance (wired) FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP FCC Class B, ICES Class B, CE (EMC, LVD, RoHS), C-Tick, VCCI Class B, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP FCC Class A, ICES Class A, CE (EMC, LVD, RoHS), C-Tick, VCCI Class A, UL cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH, KCC/MSIP
Regulatory Model APL41-0BA APL28-0B5 APL28-0B5 APL29-0B7
Major Regulatory Compliance (wired) FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH FCC Class B, FCC RF ICES Class B, IC RF CE (R&TTE, EMC, LVD, RoHS), RCM, VCCI Class B, MIC/TELEC, UL, cUL, TUV/GS, CB, Mexico CoC by UL, WEEE , REACH
Integrated Wireless TZ SOHO TZ300 TZ400 TZ500 TZ600
Standards 802.11 ac/a/b/g/n 802.11a/b/g/n/ac (WEP, WPA, WPA2, 802.11i, TKIP, PSK,02.1x, EAP-PEAP, EAP-TTLS 802.11 a/b/g/n/ac
Frequency bands 802.11a: 5.180-5.825 GHz; 802.11b/g: 2.412-2.472 GHz; 802.11n: 2.412-2.472 GHz, 5.180-5.825 GHz; 802.11ac: 2.412-2.472 GHz, 5.180-5.825 GHz 802.11 a/b/g/n/ac
Operating Channels 802.11a: US and Canada 12, Europe 11, Japan 4, Singapore 4, Taiwan 4; 802.11b/g: US and Canada 1-11, Europe 1-13, Japan 1-14 (14-802.11b only); 802.11n (2.4 GHz): US and Canada 1-11, Europe 1-13, Japan 1-13; 802.11n (5 GHz): US and Canada 36-48/149-165, Europe 36-48, Japan 36-48, Spain 36-48/52-64; 802.11ac: US and Canada 36-48/149- 165, Europe 36-48, Japan 36-48, Spain 36-48/52-64 802.11 a/b/g/n/ac
Transmit output power Based on the regulatory domain specified by the system administrator 802.11 a/b/g/n/ac
Transmit power control Supported 802.11 a/b/g/n/ac
Data rates supported 802.11a: 6,9,12,18,24,36,48,54 Mbps per channel; 802.11b: 1,2,5.5,11 Mbps per channel; 802.11g: 6,9,12,18,24,36,48,54 Mbps per channel; 802.11n: 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 15,30, 45, 60, 90, 120, 135, 150 Mbps per channel; 802.11ac: 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 86.7, 96.3, 15, 30, 45, 60, 90, 120, 135, 150, 180, 200, 32.5, 65, 97.5, 130, 195, 260, 292.5, 325, 390, 433.3, 65, 130, 195, 260, 390, 520, 585, 650, 780, 866.7 Mbps per channel 802.11 a/b/g/n/ac
Modulation technology spectrum 802.11a: Orthogonal Frequency Division Multiplexing (OFDM); 802.11b: Direct Sequence Spread Spectrum (DSSS); 802.11g: Orthogonal Frequency Division Multiplexing (OFDM)/ Direct Sequence Spread Spectrum (DSSS); 802.11n: Orthogonal Frequency Division Multiplexing (OFDM); 802.11ac: Orthogonal Frequency Division Multiplexing (OFDM) 802.11 a/b/g/n/ac

Documentation:

Download the SonicWALL TZ Series Datasheet (PDF).

Share this :