Many in stock
Secure, high-speed wireless solutions
SonicWall Wireless Network Security solutions combine high-performance IEEE 802.11ac Wave 2 wireless technology with industry-leading next-generation firewalls. The result is a superior experience for WiFi users that’s as secure as any wired connection.
The solutions are based on:
- SonicWall SonicWave series indoor and outdoor wireless access points (APs) which support the 802.11ac Wave 2 wireless standard
- SonicWall TZ, NSA and SuperMassive firewalls, which use deep packet inspection technology to detect and eliminate threats over wired and wireless networks
Superior user experience
SonicWave APs take advantage of the capabilities in 802.11ac Wave 2 plus features such as band steering and a built-in 2.5 GbE port to deliver highspeed wireless performance. Other features, including 4x4 MU-MIMO and beamforming, improve performance in higher density environments when using bandwidth-intensive applications such as HD multimedia, and cloud and mobile apps.
Each SonicWave access point includes three radios. One operates in the less crowded 5 GHz frequency band, reducing interference from other devices while strengthening signal reliability. Another operates in the 2.4 GHz band to support legacy 802.11b/g/n clients. The third radio is dedicated to security and performs rogue AP detection, passive scanning and packet capturing. With four transmitting and four receiving antennas plus support for 4x4 MU-MIMO, SonicWave APs are engineered to optimize signal quality, range and reliability for wireless devices including Wave 2-enabled clients.
For organizations with a substantial long-term investment in 802.11n, the SonicWall SonicPoint N2 features an enterprise wireless chipset, dual radios, high-speed performance and all the advantages that SonicWall Wireless Network Security solutions offer.
Comprehensive threat prevention
SonicWall firewalls scan all wireless traffic coming into and going out of the network using deep packet inspection technology and then remove harmful threats such as malware and intrusions, even over SSL/ TLS encrypted connections. Other security and control capabilities such as content filtering, application control and intelligence and Capture Advanced Threat Protection provide added layers of protection. The Wireless Network Security solution also integrates additional security-related features including wireless intrusion detection and prevention, virtual access point segmentation, wireless guest services, RF monitoring and wireless packet capture.
Simplified deployment and centralized management
Access point deployment and setup are greatly simplified, reducing total cost of ownership (TCO). Integrated into every SonicWall firewall is a wireless controller that auto-detects and auto-provisions SonicWave APs across the network. Wireless signal analysis tools provide a visual map to optimize site-based access point placement.
Management and monitoring for wireless and security are handled centrally through the firewall or through SonicWall Global Management System, providing network administrators with a single pane of glass from which to manage all aspects of the network.
For organizations with a substantial investment in 802.11ac clients, the SonicWall SonicPoint series features dual radios, high-speed 802.11ac performance, 3x3 SU-MIMO and all the security advantages that SonicWall Wireless Network Security solutions offer.
Unless otherwise stated below, you have 30 days from the date your product left the warehouse (regardless of when you actually took delivery of the product) to get a valid RMA from our website and get your product to a shipper to return back to us. It does not have to be back in our warehouse within 30 days, but it does have to be in the possession of the shipper (along with the valid RMA). RMAs must be valid, unexpired, and issued for the product being returned. Only one RMA is issued per return. When it expires, you may no longer return your product. If you are ineligible for an RMA, contact the manufacturer directly or check any applicable warranty you might have. See the Manufacturer Contact List at the bottom of this page. Except as provided for verified defective products (See Special Returns Policy for Defective Products below), you will be responsible for all shipping charges for returns sent to our Returns Warehouse. All products are subject to a 15% restocking fee (except where prohibited by law) if returned opened or in a non-factory sealed box, provided that there is no restocking fee for defective products (see Special Returns Policy for Defective Products below). Upon our acceptance of the merchandise in like new condition in strict conformance with the basic criteria and basic returns policy, the purchase price will be credited to the credit card used for the original purchase. Please allow up to fourteen days from shipment for your return to arrive at our Returns Warehouse, delivery times vary based on shipper selected. Your return will be processed within 5-7 business days (excluding Saturdays, Sundays, and holidays) after receipt of the item. Many of the items we sell have Special Return Policies. See the appropriate policy below to see if items you purchase are affected. The risk of loss for the product being returned shall be with you at all times during the shipment of such product to the returns center and with respect to any shipments from the returns center back to you, the original distributor or manufacturer, or any buyer through the liquidation process. Title to the product being returned will remain with you at all times and transfer from you to the original distributor, or a third party in the case of a liquidation of the return, only upon receipt of the products by such distributors or buyers.
Defective products can only be returned in exchange for the exact same product, or at the sole discretion of Protective Data Solutions, the purchase price will be credited to the credit card used for the original purchase. Defective products may only be returned within 30 days of the date your product left the warehouse (regardless of when you actually took delivery of the product). Once your return is processed, and is verified to meet the basic criteria above and to be defective, your replacement order will be sent to fulfillment. How quickly your replacement product ships after that depends on product availability. For products that we verify to be defective, we will reimburse you for your original shipping expenses, provided that your defective return must be shipped via ground shipment only. If you return your product via a faster, more expensive shipper, you incur the expenses yourself and any request for reimbursement will be denied. Protective Data Solutions in its sole and absolute discretion shall be the sole determiner of whether a product is in fact defective.
We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.
When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. IF THE ITEM IS A LICENSE OR RENEWAL, e-Deliveries will be processed the same business day. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.
Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.
DiscountsBulk discounting is available, so give us a call or email us at firstname.lastname@example.org and we can build you a custom quote and see if we can save you even more off the advertised price.
You may also pay via Cashiers Check, Bank Wire, and more. Contact us for other payment options.