Classifies all applications, on all ports, all the time Enforces security policies for any user, at any location Prevents known and unknown threats


  • Category: Palo Alto - Firewall
  • SKU: PA-5220-DC

Price:49500


BUY NOW!

Description

Overview:

Key Security Features:

Classifies all applications, on all ports, all the time

  • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
  • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
  • Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development

Enforces security policies for any user, at any location

  • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms
  • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information

Prevents known and unknown threats

  • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
  • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
  • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection

The controlling element of the PA-5200 Series is PAN-OS®, security operating system, which that natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.


Interface Modes
  • L2, L3, Tap, Virtual wire (transparent mode)
  • Point-to-point protocol over Ethernet (PPPoE) and DHCP supported for dynamic address assignment
Routing
  • OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, Static routing
  • Policy-based forwarding
  • Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3
  • Bidirectional Forwarding Detection (BFD)
IPv6
  • L2, L3, Tap, Virtual Wire (transparent mode)
  • Features: App-ID™, User-ID™, Content-ID™, WildFire™, and SSL decryption
  • SLAAC
IPsec VPN
  • Key exchange: Manual key, IKE v1 and IKEv2 (pre-shared key, certificate-based authentication)
  • Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)
  • Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512
  • GlobalProtect™ large-scale VPN (LSVPN) for simplified configuration and management
VLANs
  • 802.1q VLAN tags per device/per interface: 4,094/4,094
  • Aggregate interfaces (802.3ad), LACP
Network Address Translation (NAT)
  • NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port (port address translation)
  • NAT64, NPTv6
  • Additional NAT features: Dynamic IP reservation, tun- able dynamic IP and port oversubscription
High Availability