IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Dell SonicWALL NSA 250M Wireless-N review

The SonicWALL NSA 250M Wireless-N appliance offers SMBs and remote offices an extensive range of tough gateway security measures, but the cost can add up quickly.

Gateway AV and anti-spam

Gateway AV provides a global policy that you can assign to any port zone. Scanning for HTTP, SMTP, POP, IMAP and CIFS can be enabled individually and for all protocols you can block password protected archives and packaged executables.

The appliance comes with basic anti-spam as you can use RBLs but we've never found these to be very useful. You're better off paying for SonicWALL's anti-spam service as it's far more effective.

This uses a scoring system to classify messages as definite or probable spam, phishing or infected and you can reject, delete or tag them. The Junk Store feature will prove useful as you can install it on your Exchange Server and allow users to inspect their personal quarantine areas and delete or release messages.

Dell SonicWALL NSA 250M Wireless-N - 2

The AppFlow Monitor keeps track of all web apps and you can use this screen to create new application rules on the fly

Application Controls

The Application Control option is designed to provide more versatile policing of web browsing activities, file transfers, email and email attachments. It can provide data leakage protection by scanning emails and files, checking message content, subjects, senders and recipients and blocking file types.

You can use it to control FTP transfers or HTTP requests and apply actions such as blocking or redirecting and limiting bandwidth for certain types of file transfers. It can also handle VoIP services as it can identify and prioritise SIP and H.323 traffic.

A useful feature is the ability to view the AppFlow Monitor from the web console's dashboard and see all application related activity. If you see an app pop up that you don't like the look of you can quickly create a rule that either blocks it, applies a bandwidth management policy or monitors its traffic.

You can go deeper with advanced application rules as these use signature IDs to identity specific activities. The appliance can spot actions such as Facebook pokes, Hotmail attachments uploads, Skype logins the list is endless and either block or log this activity.

Dell SonicWALL NSA 250M Wireless-N - 3

They're tricky to set up but the virtual wireless APs can present a range of guest services each with their own set of security policies

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Unlocking the value of data with data innovation acceleration
Whitepaper

Unlocking the value of data with data innovation acceleration

12 May 2022
Protect and preserve your data from endpoint to infrastructure
Whitepaper

Protect and preserve your data from endpoint to infrastructure

12 May 2022
Technology reimagined
Whitepaper

Technology reimagined

12 May 2022
Meeting the future of education with confidence
Whitepaper

Meeting the future of education with confidence

12 May 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022