Tactical Advice

Review: SonicWALL NSA E5500

The NSA E5500 covers nearly every aspect of data protection you can imagine, short of providing a fire extinguisher.

Calling the SonicWALL NSA E5500 a mere network security appliance is akin to calling the Batmobile a compact car. Designed to be an interface between your network and the outside world, the device can play every role needed to do that securely. Yes, it’s a firewall, an intrusion prevention system and a content-filtering appliance, but it’s also a gateway router that can handle Wi-Fi and Voice over IP traffic. In short, the E5500 should protect organizations of almost any size against almost anything.

It’s probably easier to describe what the E5500 doesn’t do than what it does. For example, it doesn’t make coffee. But it does perform stateful packet inspection, meet your VPN needs and support site-to-site tunnels and IPv6. The SonicWALL appliance can also be configured to allow or block virtually any application on a very granular level. So if you want to turn off instant messaging for a workgroup, you can.


The primary advantage of the SonicWALL E5500 is flexibility. There’s almost nothing that you can’t accomplish in terms of network security. The E5500 supports every network protocol that I could send over it, from HTTPS to VoIP. It handles secure connections and encrypted backup traffic, and it supports at least one service that’s not even listed on the extensive spec sheet — Global System for Mobile communication (GSM) over IP. I was able to use this service to make calls through the firewall using a Unlicensed Mobile Access connection to a Wi-Fi access point.

There are several options available for the appliance that we didn’t test, including deep packet inspection and support for up to 750,000 connections. Some features, such as gateway antivirus and content/URL filtering are optional. But they’re available, which reduces the number of appliances needed in the data center, which in turn eases operations.

Why It Works for IT

While management of the E5500 can be tedious, for the most part this device will simplify things for the IT staff. Because the SonicWALL E5500 can act as a primary network interface to the outside world, there is no need for a separate gateway router, firewall, intrusion prevention system or wireless controller, and IT groups won’t need to be trained to support a wide variety of different software and appliances.

3.9 gigabits per second
Stateful throughput of the SonicWALL NSA E5500

In addition, the E5500 supports failover. If one of these devices dies (or loses power or network connectivity), another E5500 in standby mode instantly takes over. Everything — all of the management settings, the VPNs and routing — will have already been synced to the standby machine. The failover is instantaneous and seamless.

Of course, there is a lot to learn about the device, but the excellent reporting and the logical operation of the management interface make this as easy as it’s likely to be, considering the number of things that can be managed. There are two management interfaces: an LCD on the device front for solving simple problems; and a web interface with a main status screen that shows activities of the appliance in real time and a dashboard that provides a broader opportunity to keep tabs on the device.


The extreme flexibility of the E5500 means that there’s a lot to learn, and the documentation that comes with it, especially the initial “Getting Started” guide, is less than user-friendly. There are so many options available that it takes some studying to understand what you really need to do.

However, in basic operation, the E5500 is almost plug-and-play, so it’s only the advanced operations that require deep technical knowledge to make them work.

Sign up for our e-newsletter

About the Author

Wayne Rash

Wayne Rash

Wayne Rash is a longtime technology journalist who has directed product testing centers. He is President of Wayne Rash & Associates, an analysis and editorial services firm located near Washington, D.C. He can be reached at wrash@mindspring.com. You can also follow him on Twitter as @wrash.


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.