Datasheet

Features
RFDPI engine
Feature Description
Intrusion prevention
Feature Description
Reassembly-Free Deep
Packet Inspection (RFDPI)
Bi-directional inspection
Stream-based inspection
Highly parallel and scalable
Single-pass inspection
Countermeasure-based
protection
Automatic signature
updates
Intra-zone IPS protection
Botnet command and
control (CnC) detection
and blocking
Protocol abuse/anomaly
detection and prevention
Zero-day protection
Anti-evasion technology
This high-performance, proprietary and patented inspection engine performs stream-based
bi-directional trac analysis, without proxying or buering, to uncover intrusion attempts,
malware and identify application trac regardless of port.
Scans for threats in both inbound and outbound trac simultaneously to ensure that the
network is not used to distribute malware, and does not become a launch platform for attacks in
case an infected machine is brought inside.
Proxy-less and non-buering inspection technology provides ultra-low latency performance
for DPI of millions of simultaneous network streams without introducing file and stream size
limitations, and can be applied on common protocols as well as raw TCP streams.
The unique design of the RFDPI engine works with the multi-core architecture to provide high
DPI throughput and extremely high new session establishment rates to deal with trac spikes in
demanding networks.
A single-pass DPI architecture simultaneously scans for malware, intrusions and for application
identification, drastically reducing DPI latency and ensuring that all threat information is
correlated in a single architecture.
Tightly integrated intrusion prevention system (IPS) leverages signatures and other
countermeasures to scan packet payloads for vulnerabilities and exploits, covering a broad
spectrum of attacks and vulnerabilities.
The Dell SonicWALL Threat Research Team continuously researches and deploys updates to
an extensive list of IPS countermeasures that covers more than 50 attack categories. The new
updates take immediate eect without any reboot or service interruption required.
Bolsters internal security by segmenting the network into multiple security zones with intrusion
prevention, preventing threats from propagating across the zone boundaries.
Identifies and blocks command and control trac originating from bots on the local network to
IPs and domains that are identified as propagating malware or are known CnC points.
Identifies and blocks attacks that abuse protocols in an attempt to sneak past the IPS.
Protects the network against zero-day attacks with constant updates against the latest exploit
methods and techniques that cover thousands of individual exploits.
Extensive stream normalization, decoding and other techniques ensure that threats do not enter
the network undetected by utilizing evasion techniques in Layers 2-7.
5