Sonicwall
Sonicwall 02-SSC-2821 Network Security & Firewalls Sonicwall Tz270 Network Security/firewall Appliance - 8 Port - 10/100/1000base-t - Gigabit Ethernet  02ssc2821 758479228219

Part Number: 02-SSC-2821
Condition: New
In Stock: 341  
Real time availability   


Regular:$565.00
Save:$119.39 (21%)

Your Price:
$445.61

As low as $41/month
Buy Now, Pay Later



Promo valid until 12/31/2025
Square Trade
  • Shipping Insurance
  • Price Match Guarantee
  • Terms of Service Guarantee
  • Identity Theft Protection
FREE with your purchase
Expert Name, Expert Title
Let our Specialist make your purchase easier

Product Specifications



SonicWall TZ270 Network Security/Firewall Appliance - 8 Port - 10/100/1000Base-T - Gigabit Ethernet - DES, 3DES, MD5, SHA-1, AES (128-bit), AES (192-bit), AES (256-bit) - 8 x RJ-45 - Desktop, Rack-mountable 02-SSC-2821

TZ270 Appliance Only

Manufacturer Part Number: 02-SSC-2821

SONICWALL TZ270 Appliance Only



CPN:TZ270 Appliance Only
MANUFACTURER NAME: Sonicwall
MANUFACTURER PART NUMBER: 02-SSC-2821
UPC EAN CODE: 758479228219
LANGUAGE: EN
MARKET:US

General Information:

The latest SonicWall TZ series, are the first desktop form factor nextgeneration firewalls (NGFW) with 10 or 5 Gigabit Ethernet interfaces. The series consist of a wide range of products to suit a variety of use cases.

Designed for small, mid-sized organizations and distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated security effectiveness with best-in-class priceperformance. These NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, realtime breach detection and prevention.

The Gen 7 TZ series are highly scalable, with high port density of up to 10 ports. It features both inbuilt and an expandable storage of up to 256GB, that enables various features including logging, reporting, caching, firmware backup and more. An optional second power supply provides added redundancy in case of failure on select models.

Deployment of Gen 7 TZs are further simplified by Zero-Touch Deployment, with the ability to simultaneously roll out these devices across multiple locations with minimal IT support. Built on next-gen hardware, it integrates firewalling, switching and wireless capabilities, plus provides single-pane-of-glass management for SonicWall Switches and SonicWave Access Points. It allows tight integration with Capture Client for seamless endpoint security.

SonicOS and Security Services

The SonicOS architecture is at the core of TZ NGFWs. Gen 7 TZs are powered by the feature rich SonicOS 7.0 operating system with new modern looking UX/UI, advanced security, networking and management capabilities. Gen 7 TZ features integrated SD-WAN, TLS 1.3 support, real-time visualization, high-speed virtual private networking (VPN) and other robust security features.

Unknown threats are sent to SonicWall's cloud-based Capture Advanced Threat Protection (ATP) multiengine sandbox for analysis. Enhancing Capture ATP is our patent-pending Real-Time Deep Memory Inspection (RTDMI™) technology. As one of Capture ATP's engine, RTDMI detects and blocks malware and zero-day threats by inspecting directly in memory.

By leveraging Capture ATP with RTDMI technology, in addition to security services such as ReassemblyFree Deep Packet Inspection (RFDPI), Anti-virus and Anti-spyware Protection, intrusion prevention system, Application Intelligence and Control, Content Filtering Services, DPI-SSL, TZ series firewalls stop malware, ransomware and other advanced threats at the gateway. For more information, refer the SonicOS and Security Services Datasheet.

ManufacturerSonicWall Inc.
Manufacturer Part Number02-SSC-2821
Manufacturer Website Addresshttp://www.sonicwall.com
Brand NameSonicWall
Product SeriesTZ
Product ModelTZ270
Product NameTZ270 Network Security/Firewall Appliance
Product TypeNetwork Security/Firewall Appliance
  Product UPC758479228219
Technical Information:
Firewall Protection SupportedIntrusion Prevention
Malware Protection
Application Control
Content Filtering
Spyware Protection
URL Filtering
Denial of Service (DoS)
Packet Inspection
Signature-based Intrusion Prevention
Distributed Denial of Service (DDoS)
Threat Protection
Secure IPsec VPN Connectivity
Deep Inspection Firewall
Anti-spyware
Antivirus
Stateful Packet Filtering
Encryption StandardDES
3DES
MD5
SHA-1
AES (128-bit)
AES (192-bit)
AES (256-bit)
Interfaces/Ports:
Total Number of Ports8
USBYes
Number of Network (RJ-45) Ports8
Network & Communication:
Ethernet TechnologyGigabit Ethernet
Network Standard10/100/1000Base-T
Wireless Specifications:
Wireless LANNo
Management & Protocols:
ManageableYes
Power Description:
Frequency60 Hz
Physical Characteristics:
Form FactorDesktop
Rack-mountable
Height1.4"
Width7.5"
Depth5.3"
Weight (Approximate)1.81 lb
Miscellaneous:
Environmentally FriendlyYes
Environmental ComplianceWaste Electrical and Electronic Equipment Directive (WEEE)
Restriction of Hazardous Substances (RoHS)
Registration, Evaluation, Authorization and Restriction of Chemicals (REACH)
Country of OriginTaiwan
TAA CompliantYes

Date Inserted: Sunday April 4, 2021

This product was last updated on Monday November 18, 2024

All products are brand new and factory sealed unless otherwise stated.
 *** Disclaimer- Information is supplied by the Manufacturer. The image, including color, may differ from actual product appearance. CompSource, Inc. is not responsible for data. ***

Questions and Answers

Questions and Answers

Ask CompSource

Shipping / Returns

Shipping

Ground = FREE
(EST. Arrival Date between Wed.Nov.20 - Mon.Nov.25)

Two Day Air = $27.00
(EST. Arrival Date on Wed.Nov.20)

Priority = $70.00
(EST. arrival Date on Tue.Nov.19 in the AM)

U.S Mail Priority (AA,AE,AP only) = $34.00

FedEx International Economy (Canada only) = $87.00

Shipping dates are best estimates based on product location and may vary with holidays.

If product requires trucking, additional fees may apply.

* Some destinations are subject to Applicable State/Duty Taxes

Returns

CompSource realizes that every product may have different return guidelines. Please see the policy below regarding this item.

*** No returns allowed on this item ***

For support on this product, please contact Sonicwall. 888.777.1476 WWW.SONICWALL.COM


Sonicwall Company's Information

Sonicwall  
Click Sonicwall for all products

Local #: (408)745-9600

Toll Free #: 888.777.1476

Site:  WWW.SONICWALL.COM

Accessories

Product Reviews

Overall Rating | Write a Review

    Best Sellers
    More Best Sellers

    Rebates
    More Rebates

    Recently Viewed

    Learn more about Network Security & Firewalls

    Switches, routers, and wireless access points

    Switches, routers, and wireless access points perform very different functions in a network.

    A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.

    Switches

    Switches are the foundation of most business networks. A switch acts as a controller, connecting computers, printers, and servers to a network in a building or a campus.

    Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.

    There are two basic types of switches to choose from as part of your networking basics: managed and unmanaged.

    • An unmanaged switch works out of the box but can't be configured. Home-networking equipment typically offers unmanaged switches.
    • A managed switch can be configured. You can monitor and adjust a managed switch locally or remotely, giving you greater control over network traffic and access.

    Routers

    Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money.

    A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way.

    Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others.

    Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system.

    Access points

    An access point* allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers.

    An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away.

    But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes.

    *Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.

    Wireless networking

    Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

    Firewall

    And possibly the most important aspect of networking is security and Firewall!

    What is a Firewall?
    A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

    Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.

    A firewall can be hardware, software, or both.

    CompSource will educate and help make this process enjoyable and easy.

    Whether you're planning on using your network for basic home tasks or enterprise level security. You can tell our trained sales professionals your needs, and we�ll make custom recommendations to suit your specifications and budget. Our reps have extensive knowledge and love to share. We educate, not sell, CompSource makes sure you buy what you need and not waste money on what you don't. As with every decision we never push, it's up to you when, and if you make a purchase.

    CompSource has a great technical staff that can help with a solution for your exact needs.

    Chat with us or give our professionals a quick phone call (800)-413-7361.

    Thanks – ordered it Thursday – received it Friday. First time I ever received an item before the emailed invoice had a chance to arrive. Brad Brad
    More Reviews

    eStores

    Connect With Us