SlideShare a Scribd company logo
1 of 3
Download to read offline
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 4 0 0 0 S e r i e s S p e c s h e e t




PA-4000 Series

The PA-4000 Series is a next-generation
firewall that delivers unprecedented
visibility and control over applications,
users and content on enterprise
                                                                                                             PA-4060
networks.



               APPLICATION IDENTIFICATION:
               •	 Identifies	more	than	950	applications	
                                                                                          PA-4050                                  PA-4020
                 irrespective	of	port,	protocol,	SSL	
                 encryption	or	evasive	tactic	employed.
               •	 Enables	positive	enforcement	

                 application	usage	policies:	allow,	deny,	                The Palo Alto NetworksTM PA-4000 Series is comprised of three
                 schedule,	inspect,	apply	traffic	shaping.	               high performance platforms, the PA-4020, the PA-4050 and
               •	 Graphical	visibility	tools	enable	simple	
                                                                          the PA-4060, all of which are targeted at high speed Internet
                 and	intuitive	view	into	application	traffic.	
                                                                          gateway and datacenter deployments. The PA-4000 Series
               USER IDENTIFICATION:
               •	 Policy-based	visibility	and	control	over	
                                                                          manages multi-Gbps traffic flows using dedicated processing
                 who	is	using	the	applications	through	                   and memory for networking, security, threat prevention and
                 seamless	integration	with	Active	
                 Directory,	LDAP,	and	eDirectory.
                                                                          management.
               •	 Identifies	Citrix	and	Microsoft	Terminal	
                                                                          A 10 Gbps backplane smoothes the pathway between dedicated processors,
                 Services	users,	enabling	visibility	and	
                 control	over	their	respective	application	               and the physical separation of data and control plane ensures that
                 usage.		                                                 management access is always available, irrespective of the traffic load. The PA-
               •	 Control	non-Windows	hosts	via	web-                      4050 and PA-4020 each have 24 traffic interfaces while the PA-4060 supports
                 based	authentication.	                                   10 Gbps interfaces. All of the PA-4000 Series platforms have dedicated high
                                                                          availability and out-of-band management interfaces.
               CONTENT IDENTIFICATION:
               •	 Block	viruses,	spyware,	and	vulnerability	
                                                                          The controlling element of the PA-4000 Series next-generation firewalls is
                 exploits,	limit	unauthorized	transfer	of	
                                                                          PAN-OSTM, a security-specific operating system that tightly integrates three
                 files	and	sensitive	data	such	as	CC#	or	
                 SSN,	and	control	non-work	related	web	                   unique identification technologies: App-IDTM, User-ID and Content-ID, with
                 surfing.                                                 key firewall, networking and management features.
               •	 Single	pass	software	architecture	

                 enables	multi-gigabit	throughput	with	
                 low	latency	while	scanning	content.                         KEy PERFORmANCE SPECIFICATIONS            PA-4020    PA-4050      PA-4060

                                                                             Firewall	throughput	                      2	Gbps	     10	Gbps	     10	Gbps
                                                                             Threat	prevention	throughput	             2	Gbps	      5	Gbps	      5	Gbps
                                                                             IPSec	VPN	throughput		                    1	Gbps	      2	Gbps	      2	Gbps
                                                                             IPSec	VPN	tunnels/interfaces	              2,000	       4,000	       4,000
                                                                             SSL	VPN	concurrent	users	                  5,000	      10,000	      10,000
                                                                             New	sessions	per	second	                  60,000	      60,000	      60,000
                                                                             Max	sessions	                             500,000	   2,000,000	   2,000,000



                                                                          For a complete description of the PA-4000 Series next-generation firewall
                                                                          feature set, please visit www.paloaltonetworks.com/literature.
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 4 0 0 0 S e r i e s S p e c s h e e t




Additional PA-4000 Series Specifications and Features


       APP-ID                                                                             NETwORKINg
       •	Identifies	and	controls	more	than	950	applications							                        •	Dynamic	routing	(BGP,	OSPF	and	RIPv2)					
       •	SSL	decryption	(inbound	and	outbound)		                                          •	Tap	mode,	virtual	wire,	layer	2,	layer	3
       •	Customize	application	properties                                                 •	Network	address	translation	(NAT)	
       •	Custom	HTTP	and	SSL	applications                                                    -	Source	and	destination	address	translation
                                                                                             -	Dynamic	IP	and	port	pool:	254	
       FIREwALL
                                                                                             -	Dynamic	IP	pool:	16,234			
       •	Policy-based	control	by	application,	application	category,	                      •	DHCP	server/	DHCP	relay:	Up	to	3	servers
         subcategory,	technology,	risk	factor	or	characteristic							                    •	802.1Q	VLANs:	4,094
       •	Application	function	control	                                                    •	Policy-based	forwarding
       •	Fragmented	packet	protection                                                     •	802.3ad	link	aggregation
       •	Reconnaissance	scan	protection                                                   •	Point-to-Point	Protocol	over	Ethernet	(PPPoE)
       •	Denial	of	Service	(DoS)/Distributed	Denial	of	Services	(DDoS)	                   •	IPv6	application	visibility,	control	and	full	content	inspection	(Virtual	
         protection                                                                         wire	mode	only)
       •	Maximum	number	of	policies:	(PA-4020)	10,000,	(PA-4050)	20,000,	                 •	Jumbo	frames
         (PA-4060)	20,000                                                                 •	Virtual	routers:	(PA-4020)	20,	(PA-4050)	125,	(PA-4060)	125
                                                                                          •	Security	zones:	(PA-4020)	80,	(PA-4050)	500,	(PA-4060)	500
       USER-ID                                                                            •	Virtual	systems	(base/max):	(PA-4020)	10/20*,	(PA-4050)	25/125*,	
       •	Visibility	and	control	by	user,	group	and	IP	address							                        (PA-4060)	25/125*
       •	Active	Directory,	LDAP,	eDirectory,	Citrix	and	Microsoft	Terminal	
                                                                                          THREAT PREVENTION (SUbSCRIPTION REqUIRED)
         Services	
       •	XML	API	(external	user	repository	integration)                                   •	Detect	and	block	application	vulnerability	exploits	(IPS)			
       •	WMI	and	NetBios	polling                                                          •	Stream-based	protection	against	viruses,	spyware	and	worms	
       •	Maximum	concurrent	user/IP	mappings:	64,000                                      •	HTML/Javascript	virus	protection
                                                                                          •	Inspect	compressed	files	that	use	the	Deflate	algorithm	(Zip,	Gzip,	
       DATA FILTERINg                                                                       etc)	
       •	Control	unauthorized	data	transfer	(social	security	numbers,	credit	             •	Custom	vulnerability	and	spyware	phone	home	signatures
         card	numbers,	custom	data	patterns)							                                       •	Content	updates:	daily	(malware),	weekly	(vulnerability	signatures),	
       •	Control	unauthorized	transfer	of	more	than	50	file	types                           emergency	(all)

       URL FILTERINg (SUbSCRIPTION REqUIRED)                                              qUALITy OF SERVICE (qOS)

       •	76-category,	20M	URL	on-box	database		                                           •	Policy-based	traffic	shaping	by	application,	user,	source,	destination,	
       •	Custom	1M	URL	cache	database	(from	180M	URL	database)                              interface,	IPSec	VPN	tunnel	and	more		
       •	Custom	block	pages	and	URL	categories                                            •	Define	up	to	8	traffic	classes	with	guaranteed,	maximum	and	priority	
                                                                                            bandwidth	parameters
       IPSEC VPN (SITE-TO-SITE)                                                           •	Real-time	bandwidth	monitor
       •	Manual	key,	IKE	v1			                                                            •	Per	policy	diffserv	marking
       •	3DES,	AES	(128-bit,	192-bit,	256-bit)	encryption
                                                                                          mANAgEmENT TOOLS
       •	SHA1,	MD5	authentication
                                                                                          •	Integrated	web	interface					
       SSL VPN (REmOTE ACCESS)                                                            •	Command	line	interface	(CLI)
       •	IPSec	transport	with	SSL	fall-back		                                             •	Role-based	administration
       •	Enforce	unique	policies	for	SSL	VPN	traffic                                      •	Syslog	and	SNMPv2
       •	Enable/disable	split	tunneling	to	control	client	access	                         •	Customizable	administrator	login	banner
       •	LDAP,	SecurID,	or	local	DB	authentication                                        •	XML-based	REST	API	
       •	Client	OS:	Windows	XP,	Windows	Vista	(32	and	64	bit),	Windows	7	(32	             •	Centralized	management	(Panorama)
         and	64	bit)                                                                      •	Centrally	manage	PAN-OS	and	content	updates	(Panorama)	
                                                                                          •	Shared	policies	(Panorama)
       HIgH AVAILAbILITy
                                                                                          VISIbILITy AND REPORTINg TOOLS
       •	Active/Passive	failover						
       •	Configuration	and	session	synchronization                                        •	Graphical	summary	of	applications,	URL	categories,	threats	and	data	
       •	Heartbeat	checking	                                                                (ACC)		
       •	Link	and	path	failure	monitoring                                                 •	View,	filter,	export	traffic,	threat,	URL,	and	data	filtering	logs	
                                                                                          •	Fully	customizable	reporting
                                                                                          •	Trace	session	tool



*	Adding	virtual	systems	to	the	base	quantity	requires	a	separately	purchased	license.	




               PAGE	2
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 4 0 0 0 S e r i e s S p e c s h e e t




     HARDwARE SPECIFICATIONS                                               PA-4060                                                                 PA-4050/PA-4020
     I/O	                                                     (4)	10	Gigabit	XFP	+	(4)	Gigabit	SFP		                       (16)	10/100/1000	+	(8)	Gigabit	SFP
     Management	I/O	                                            (2)	10/100/1000	high	availability,		                        (2)	10/100/1000	high	availability,
     	                                                   (1)	10/100/1000	out-of-band	management,		                    (1)	10/100/1000	out-of-band	management,
     	                                                                (1)	DB9	console	port	                                       (1)	DB9	console	port
     Power	supply	(Avg/max	power	consumption)	                                              Redundant	400W	AC	(175W/200W)
     Input	voltage	(Input	frequency)	                                                               100-240Vac	(50-60Hz)
     Max	input	current	                                                                         50A@230Vac;	30A@120Vac
     Power	factor	                                                                      0.93	to	0.95	(PA-4060,	PA-4050,	PA-4020)
     Safety	                                                                                            UL,	CUL,	CB
     EMI	                                                                              FCC	Class	A,	CE	Class	A,	VCCI	Class	A,	TUV
     Rack	mountable	(dimensions)	                                                    2U,	19”	standard	rack	(3.5”H	x	16.5”D	x	17.5”W)
     MTBF	                                                                               7.18	years	(PA-4060,	PA-4050,	PA-4020)

     ENVIRONmENT
     Operating	temperature	                                                                         32°	to	122°	F,	0°	to	50°	C
     Non-operating	temperature	                                                                    -4°	to	158°	F,	-20°	to	70°	C




     ORDERINg INFORmATION                                PA-4060                                       PA-4050                                         PA-4020
     Platform	                                           PAN-PA-4060		                                 PAN-PA-4050	                                    PAN-PA-4020
     Annual	threat	prevention	subscription	              PAN-PA-4060-TP		                              PAN-PA-4050-TP	                                 PAN-PA-4020-TP
     Annual	URL	filtering	subscription	                  PAN-PA-4060-URL2	                             PAN-PA-4050-URL2	                               PAN-PA-4020-URL2
     VSYS	upgrade	(10	additional)		                      	       ---	                                  	     ---	                                      PAN-PA-4020-VSYS-10
     VSYS	upgrade	(50	additional)	                       PAN-PA-4060-VSYS-50	                          PAN-PA-4050-VSYS-50	                            	---
     VSYS	upgrade	(100	additional)	                      PAN-PA-4060-VSYS-100	                         PAN-PA-4050-VSYS-100	                           	---


For	additional	information	on	the	PA-4000	Series	software	features,	please	visit	www.paloaltonetworks.com/literature.




                                                                                                                                          Your Palo Alto Networks Reseller
                                                                                                                                                  www.altaware.com
                                                                                                                                                 sales@altaware.com
                                                                                                                                                   (866) 833-4070



                                     Palo Alto Networks	                  Copyright ©2010, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS,
                                                                          App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice.
                                     232	E.	Java	Drive
                                                                          Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update
                                     Sunnyvale,	CA.	94089                 information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this
                                     Sales		866.320.4788			               publication without notice. PAN-OS 3.1, March 2010.
                                     	      408.738.7700                  840-000002-00D
                                     www.paloaltonetworks.com

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network SecuritySantosh K L
 
D S A P 4000 U S
D S  A P 4000  U SD S  A P 4000  U S
D S A P 4000 U SAri Zoldan
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solutionCPqD
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationDenham Pearce
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsAltaware, Inc.
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure MobilityCisco Canada
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 

What's hot (19)

LCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN GatewayLCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN Gateway
 
Network Security
Network SecurityNetwork Security
Network Security
 
D S A P 4000 U S
D S  A P 4000  U SD S  A P 4000  U S
D S A P 4000 U S
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Datasheet stonegate ips-allinone
Datasheet stonegate ips-allinoneDatasheet stonegate ips-allinone
Datasheet stonegate ips-allinone
 
Datasheet stonegate fw-allinone
Datasheet stonegate fw-allinoneDatasheet stonegate fw-allinone
Datasheet stonegate fw-allinone
 
Cyberoam cr25wing
Cyberoam cr25wingCyberoam cr25wing
Cyberoam cr25wing
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise Presentation
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure Mobility
 
1000281 en 2
1000281 en 21000281 en 2
1000281 en 2
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Meraki MR66
Meraki MR66Meraki MR66
Meraki MR66
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 

Similar to PAN PA4000

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdfssuser88346b
 
cisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfcisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfHi-Network.com
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileAliza Ayub
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileIqra Hameed
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Michael Graves
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 

Similar to PAN PA4000 (20)

PAN PA2000 series
PAN PA2000 seriesPAN PA2000 series
PAN PA2000 series
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
cisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfcisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdf
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
2500 controller
2500 controller2500 controller
2500 controller
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Hiveap300
Hiveap300Hiveap300
Hiveap300
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 

More from Altaware, Inc.

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonAltaware, Inc.
 
Aerohive datasheet br200
Aerohive datasheet br200Aerohive datasheet br200
Aerohive datasheet br200Altaware, Inc.
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest AccessAltaware, Inc.
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product ComparisonsAltaware, Inc.
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAltaware, Inc.
 
Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAltaware, Inc.
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesAltaware, Inc.
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuideAltaware, Inc.
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAltaware, Inc.
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAltaware, Inc.
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12Altaware, Inc.
 

More from Altaware, Inc. (20)

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS Comparison
 
Aerohive datasheet br200
Aerohive datasheet br200Aerohive datasheet br200
Aerohive datasheet br200
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
Juniper MAG Series
Juniper MAG SeriesJuniper MAG Series
Juniper MAG Series
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product Comparisons
 
Infoblox appliances
Infoblox appliancesInfoblox appliances
Infoblox appliances
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution Brief
 
Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLAN
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & Examples
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators Guide
 
SIP2 for ILS
SIP2 for ILSSIP2 for ILS
SIP2 for ILS
 
Aerohive AP 350
Aerohive AP 350Aerohive AP 350
Aerohive AP 350
 
Aerohive AP 330
Aerohive AP 330Aerohive AP 330
Aerohive AP 330
 
Aerohive AP 170
Aerohive AP 170Aerohive AP 170
Aerohive AP 170
 
Aerohive AP 120
Aerohive AP 120Aerohive AP 120
Aerohive AP 120
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology Primer
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student Manager
 
PAN Platform Summary
PAN Platform SummaryPAN Platform Summary
PAN Platform Summary
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

PAN PA4000

  • 1. PA L O A LT O N E T W O R K S : PA - 4 0 0 0 S e r i e s S p e c s h e e t PA-4000 Series The PA-4000 Series is a next-generation firewall that delivers unprecedented visibility and control over applications, users and content on enterprise PA-4060 networks. APPLICATION IDENTIFICATION: • Identifies more than 950 applications PA-4050 PA-4020 irrespective of port, protocol, SSL encryption or evasive tactic employed. • Enables positive enforcement application usage policies: allow, deny, The Palo Alto NetworksTM PA-4000 Series is comprised of three schedule, inspect, apply traffic shaping. high performance platforms, the PA-4020, the PA-4050 and • Graphical visibility tools enable simple the PA-4060, all of which are targeted at high speed Internet and intuitive view into application traffic. gateway and datacenter deployments. The PA-4000 Series USER IDENTIFICATION: • Policy-based visibility and control over manages multi-Gbps traffic flows using dedicated processing who is using the applications through and memory for networking, security, threat prevention and seamless integration with Active Directory, LDAP, and eDirectory. management. • Identifies Citrix and Microsoft Terminal A 10 Gbps backplane smoothes the pathway between dedicated processors, Services users, enabling visibility and control over their respective application and the physical separation of data and control plane ensures that usage. management access is always available, irrespective of the traffic load. The PA- • Control non-Windows hosts via web- 4050 and PA-4020 each have 24 traffic interfaces while the PA-4060 supports based authentication. 10 Gbps interfaces. All of the PA-4000 Series platforms have dedicated high availability and out-of-band management interfaces. CONTENT IDENTIFICATION: • Block viruses, spyware, and vulnerability The controlling element of the PA-4000 Series next-generation firewalls is exploits, limit unauthorized transfer of PAN-OSTM, a security-specific operating system that tightly integrates three files and sensitive data such as CC# or SSN, and control non-work related web unique identification technologies: App-IDTM, User-ID and Content-ID, with surfing. key firewall, networking and management features. • Single pass software architecture enables multi-gigabit throughput with low latency while scanning content. KEy PERFORmANCE SPECIFICATIONS PA-4020 PA-4050 PA-4060 Firewall throughput 2 Gbps 10 Gbps 10 Gbps Threat prevention throughput 2 Gbps 5 Gbps 5 Gbps IPSec VPN throughput 1 Gbps 2 Gbps 2 Gbps IPSec VPN tunnels/interfaces 2,000 4,000 4,000 SSL VPN concurrent users 5,000 10,000 10,000 New sessions per second 60,000 60,000 60,000 Max sessions 500,000 2,000,000 2,000,000 For a complete description of the PA-4000 Series next-generation firewall feature set, please visit www.paloaltonetworks.com/literature.
  • 2. PA L O A LT O N E T W O R K S : PA - 4 0 0 0 S e r i e s S p e c s h e e t Additional PA-4000 Series Specifications and Features APP-ID NETwORKINg • Identifies and controls more than 950 applications • Dynamic routing (BGP, OSPF and RIPv2) • SSL decryption (inbound and outbound) • Tap mode, virtual wire, layer 2, layer 3 • Customize application properties • Network address translation (NAT) • Custom HTTP and SSL applications - Source and destination address translation - Dynamic IP and port pool: 254 FIREwALL - Dynamic IP pool: 16,234 • Policy-based control by application, application category, • DHCP server/ DHCP relay: Up to 3 servers subcategory, technology, risk factor or characteristic • 802.1Q VLANs: 4,094 • Application function control • Policy-based forwarding • Fragmented packet protection • 802.3ad link aggregation • Reconnaissance scan protection • Point-to-Point Protocol over Ethernet (PPPoE) • Denial of Service (DoS)/Distributed Denial of Services (DDoS) • IPv6 application visibility, control and full content inspection (Virtual protection wire mode only) • Maximum number of policies: (PA-4020) 10,000, (PA-4050) 20,000, • Jumbo frames (PA-4060) 20,000 • Virtual routers: (PA-4020) 20, (PA-4050) 125, (PA-4060) 125 • Security zones: (PA-4020) 80, (PA-4050) 500, (PA-4060) 500 USER-ID • Virtual systems (base/max): (PA-4020) 10/20*, (PA-4050) 25/125*, • Visibility and control by user, group and IP address (PA-4060) 25/125* • Active Directory, LDAP, eDirectory, Citrix and Microsoft Terminal THREAT PREVENTION (SUbSCRIPTION REqUIRED) Services • XML API (external user repository integration) • Detect and block application vulnerability exploits (IPS) • WMI and NetBios polling • Stream-based protection against viruses, spyware and worms • Maximum concurrent user/IP mappings: 64,000 • HTML/Javascript virus protection • Inspect compressed files that use the Deflate algorithm (Zip, Gzip, DATA FILTERINg etc) • Control unauthorized data transfer (social security numbers, credit • Custom vulnerability and spyware phone home signatures card numbers, custom data patterns) • Content updates: daily (malware), weekly (vulnerability signatures), • Control unauthorized transfer of more than 50 file types emergency (all) URL FILTERINg (SUbSCRIPTION REqUIRED) qUALITy OF SERVICE (qOS) • 76-category, 20M URL on-box database • Policy-based traffic shaping by application, user, source, destination, • Custom 1M URL cache database (from 180M URL database) interface, IPSec VPN tunnel and more • Custom block pages and URL categories • Define up to 8 traffic classes with guaranteed, maximum and priority bandwidth parameters IPSEC VPN (SITE-TO-SITE) • Real-time bandwidth monitor • Manual key, IKE v1 • Per policy diffserv marking • 3DES, AES (128-bit, 192-bit, 256-bit) encryption mANAgEmENT TOOLS • SHA1, MD5 authentication • Integrated web interface SSL VPN (REmOTE ACCESS) • Command line interface (CLI) • IPSec transport with SSL fall-back • Role-based administration • Enforce unique policies for SSL VPN traffic • Syslog and SNMPv2 • Enable/disable split tunneling to control client access • Customizable administrator login banner • LDAP, SecurID, or local DB authentication • XML-based REST API • Client OS: Windows XP, Windows Vista (32 and 64 bit), Windows 7 (32 • Centralized management (Panorama) and 64 bit) • Centrally manage PAN-OS and content updates (Panorama) • Shared policies (Panorama) HIgH AVAILAbILITy VISIbILITy AND REPORTINg TOOLS • Active/Passive failover • Configuration and session synchronization • Graphical summary of applications, URL categories, threats and data • Heartbeat checking (ACC) • Link and path failure monitoring • View, filter, export traffic, threat, URL, and data filtering logs • Fully customizable reporting • Trace session tool * Adding virtual systems to the base quantity requires a separately purchased license. PAGE 2
  • 3. PA L O A LT O N E T W O R K S : PA - 4 0 0 0 S e r i e s S p e c s h e e t HARDwARE SPECIFICATIONS PA-4060 PA-4050/PA-4020 I/O (4) 10 Gigabit XFP + (4) Gigabit SFP (16) 10/100/1000 + (8) Gigabit SFP Management I/O (2) 10/100/1000 high availability, (2) 10/100/1000 high availability, (1) 10/100/1000 out-of-band management, (1) 10/100/1000 out-of-band management, (1) DB9 console port (1) DB9 console port Power supply (Avg/max power consumption) Redundant 400W AC (175W/200W) Input voltage (Input frequency) 100-240Vac (50-60Hz) Max input current 50A@230Vac; 30A@120Vac Power factor 0.93 to 0.95 (PA-4060, PA-4050, PA-4020) Safety UL, CUL, CB EMI FCC Class A, CE Class A, VCCI Class A, TUV Rack mountable (dimensions) 2U, 19” standard rack (3.5”H x 16.5”D x 17.5”W) MTBF 7.18 years (PA-4060, PA-4050, PA-4020) ENVIRONmENT Operating temperature 32° to 122° F, 0° to 50° C Non-operating temperature -4° to 158° F, -20° to 70° C ORDERINg INFORmATION PA-4060 PA-4050 PA-4020 Platform PAN-PA-4060 PAN-PA-4050 PAN-PA-4020 Annual threat prevention subscription PAN-PA-4060-TP PAN-PA-4050-TP PAN-PA-4020-TP Annual URL filtering subscription PAN-PA-4060-URL2 PAN-PA-4050-URL2 PAN-PA-4020-URL2 VSYS upgrade (10 additional) --- --- PAN-PA-4020-VSYS-10 VSYS upgrade (50 additional) PAN-PA-4060-VSYS-50 PAN-PA-4050-VSYS-50 --- VSYS upgrade (100 additional) PAN-PA-4060-VSYS-100 PAN-PA-4050-VSYS-100 --- For additional information on the PA-4000 Series software features, please visit www.paloaltonetworks.com/literature. Your Palo Alto Networks Reseller www.altaware.com sales@altaware.com (866) 833-4070 Palo Alto Networks Copyright ©2010, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice. 232 E. Java Drive Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update Sunnyvale, CA. 94089 information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this Sales 866.320.4788 publication without notice. PAN-OS 3.1, March 2010. 408.738.7700 840-000002-00D www.paloaltonetworks.com