SlideShare a Scribd company logo
1 of 3
Download to read offline
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 4 0 0 0 S e r i e s S p e c s h e e t




PA-4000 Series

The PA-4000 Series is a next-generation
firewall that delivers unprecedented
visibility and control over applications,
users and content on enterprise
                                                                                                             PA-4060
networks.



               APPLICATION IDENTIFICATION:
               •	 Identifies	more	than	950	applications	
                                                                                          PA-4050                                  PA-4020
                 irrespective	of	port,	protocol,	SSL	
                 encryption	or	evasive	tactic	employed.
               •	 Enables	positive	enforcement	

                 application	usage	policies:	allow,	deny,	                The Palo Alto NetworksTM PA-4000 Series is comprised of three
                 schedule,	inspect,	apply	traffic	shaping.	               high performance platforms, the PA-4020, the PA-4050 and
               •	 Graphical	visibility	tools	enable	simple	
                                                                          the PA-4060, all of which are targeted at high speed Internet
                 and	intuitive	view	into	application	traffic.	
                                                                          gateway and datacenter deployments. The PA-4000 Series
               USER IDENTIFICATION:
               •	 Policy-based	visibility	and	control	over	
                                                                          manages multi-Gbps traffic flows using dedicated processing
                 who	is	using	the	applications	through	                   and memory for networking, security, threat prevention and
                 seamless	integration	with	Active	
                 Directory,	LDAP,	and	eDirectory.
                                                                          management.
               •	 Identifies	Citrix	and	Microsoft	Terminal	
                                                                          A 10 Gbps backplane smoothes the pathway between dedicated processors,
                 Services	users,	enabling	visibility	and	
                 control	over	their	respective	application	               and the physical separation of data and control plane ensures that
                 usage.		                                                 management access is always available, irrespective of the traffic load. The PA-
               •	 Control	non-Windows	hosts	via	web-                      4050 and PA-4020 each have 24 traffic interfaces while the PA-4060 supports
                 based	authentication.	                                   10 Gbps interfaces. All of the PA-4000 Series platforms have dedicated high
                                                                          availability and out-of-band management interfaces.
               CONTENT IDENTIFICATION:
               •	 Block	viruses,	spyware,	and	vulnerability	
                                                                          The controlling element of the PA-4000 Series next-generation firewalls is
                 exploits,	limit	unauthorized	transfer	of	
                                                                          PAN-OSTM, a security-specific operating system that tightly integrates three
                 files	and	sensitive	data	such	as	CC#	or	
                 SSN,	and	control	non-work	related	web	                   unique identification technologies: App-IDTM, User-ID and Content-ID, with
                 surfing.                                                 key firewall, networking and management features.
               •	 Single	pass	software	architecture	

                 enables	multi-gigabit	throughput	with	
                 low	latency	while	scanning	content.                         KEy PERFORmANCE SPECIFICATIONS            PA-4020    PA-4050      PA-4060

                                                                             Firewall	throughput	                      2	Gbps	     10	Gbps	     10	Gbps
                                                                             Threat	prevention	throughput	             2	Gbps	      5	Gbps	      5	Gbps
                                                                             IPSec	VPN	throughput		                    1	Gbps	      2	Gbps	      2	Gbps
                                                                             IPSec	VPN	tunnels/interfaces	              2,000	       4,000	       4,000
                                                                             SSL	VPN	concurrent	users	                  5,000	      10,000	      10,000
                                                                             New	sessions	per	second	                  60,000	      60,000	      60,000
                                                                             Max	sessions	                             500,000	   2,000,000	   2,000,000



                                                                          For a complete description of the PA-4000 Series next-generation firewall
                                                                          feature set, please visit www.paloaltonetworks.com/literature.
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 4 0 0 0 S e r i e s S p e c s h e e t




Additional PA-4000 Series Specifications and Features


       APP-ID                                                                             NETwORKINg
       •	Identifies	and	controls	more	than	950	applications							                        •	Dynamic	routing	(BGP,	OSPF	and	RIPv2)					
       •	SSL	decryption	(inbound	and	outbound)		                                          •	Tap	mode,	virtual	wire,	layer	2,	layer	3
       •	Customize	application	properties                                                 •	Network	address	translation	(NAT)	
       •	Custom	HTTP	and	SSL	applications                                                    -	Source	and	destination	address	translation
                                                                                             -	Dynamic	IP	and	port	pool:	254	
       FIREwALL
                                                                                             -	Dynamic	IP	pool:	16,234			
       •	Policy-based	control	by	application,	application	category,	                      •	DHCP	server/	DHCP	relay:	Up	to	3	servers
         subcategory,	technology,	risk	factor	or	characteristic							                    •	802.1Q	VLANs:	4,094
       •	Application	function	control	                                                    •	Policy-based	forwarding
       •	Fragmented	packet	protection                                                     •	802.3ad	link	aggregation
       •	Reconnaissance	scan	protection                                                   •	Point-to-Point	Protocol	over	Ethernet	(PPPoE)
       •	Denial	of	Service	(DoS)/Distributed	Denial	of	Services	(DDoS)	                   •	IPv6	application	visibility,	control	and	full	content	inspection	(Virtual	
         protection                                                                         wire	mode	only)
       •	Maximum	number	of	policies:	(PA-4020)	10,000,	(PA-4050)	20,000,	                 •	Jumbo	frames
         (PA-4060)	20,000                                                                 •	Virtual	routers:	(PA-4020)	20,	(PA-4050)	125,	(PA-4060)	125
                                                                                          •	Security	zones:	(PA-4020)	80,	(PA-4050)	500,	(PA-4060)	500
       USER-ID                                                                            •	Virtual	systems	(base/max):	(PA-4020)	10/20*,	(PA-4050)	25/125*,	
       •	Visibility	and	control	by	user,	group	and	IP	address							                        (PA-4060)	25/125*
       •	Active	Directory,	LDAP,	eDirectory,	Citrix	and	Microsoft	Terminal	
                                                                                          THREAT PREVENTION (SUbSCRIPTION REqUIRED)
         Services	
       •	XML	API	(external	user	repository	integration)                                   •	Detect	and	block	application	vulnerability	exploits	(IPS)			
       •	WMI	and	NetBios	polling                                                          •	Stream-based	protection	against	viruses,	spyware	and	worms	
       •	Maximum	concurrent	user/IP	mappings:	64,000                                      •	HTML/Javascript	virus	protection
                                                                                          •	Inspect	compressed	files	that	use	the	Deflate	algorithm	(Zip,	Gzip,	
       DATA FILTERINg                                                                       etc)	
       •	Control	unauthorized	data	transfer	(social	security	numbers,	credit	             •	Custom	vulnerability	and	spyware	phone	home	signatures
         card	numbers,	custom	data	patterns)							                                       •	Content	updates:	daily	(malware),	weekly	(vulnerability	signatures),	
       •	Control	unauthorized	transfer	of	more	than	50	file	types                           emergency	(all)

       URL FILTERINg (SUbSCRIPTION REqUIRED)                                              qUALITy OF SERVICE (qOS)

       •	76-category,	20M	URL	on-box	database		                                           •	Policy-based	traffic	shaping	by	application,	user,	source,	destination,	
       •	Custom	1M	URL	cache	database	(from	180M	URL	database)                              interface,	IPSec	VPN	tunnel	and	more		
       •	Custom	block	pages	and	URL	categories                                            •	Define	up	to	8	traffic	classes	with	guaranteed,	maximum	and	priority	
                                                                                            bandwidth	parameters
       IPSEC VPN (SITE-TO-SITE)                                                           •	Real-time	bandwidth	monitor
       •	Manual	key,	IKE	v1			                                                            •	Per	policy	diffserv	marking
       •	3DES,	AES	(128-bit,	192-bit,	256-bit)	encryption
                                                                                          mANAgEmENT TOOLS
       •	SHA1,	MD5	authentication
                                                                                          •	Integrated	web	interface					
       SSL VPN (REmOTE ACCESS)                                                            •	Command	line	interface	(CLI)
       •	IPSec	transport	with	SSL	fall-back		                                             •	Role-based	administration
       •	Enforce	unique	policies	for	SSL	VPN	traffic                                      •	Syslog	and	SNMPv2
       •	Enable/disable	split	tunneling	to	control	client	access	                         •	Customizable	administrator	login	banner
       •	LDAP,	SecurID,	or	local	DB	authentication                                        •	XML-based	REST	API	
       •	Client	OS:	Windows	XP,	Windows	Vista	(32	and	64	bit),	Windows	7	(32	             •	Centralized	management	(Panorama)
         and	64	bit)                                                                      •	Centrally	manage	PAN-OS	and	content	updates	(Panorama)	
                                                                                          •	Shared	policies	(Panorama)
       HIgH AVAILAbILITy
                                                                                          VISIbILITy AND REPORTINg TOOLS
       •	Active/Passive	failover						
       •	Configuration	and	session	synchronization                                        •	Graphical	summary	of	applications,	URL	categories,	threats	and	data	
       •	Heartbeat	checking	                                                                (ACC)		
       •	Link	and	path	failure	monitoring                                                 •	View,	filter,	export	traffic,	threat,	URL,	and	data	filtering	logs	
                                                                                          •	Fully	customizable	reporting
                                                                                          •	Trace	session	tool



*	Adding	virtual	systems	to	the	base	quantity	requires	a	separately	purchased	license.	




               PAGE	2
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 4 0 0 0 S e r i e s S p e c s h e e t




     HARDwARE SPECIFICATIONS                                               PA-4060                                                                 PA-4050/PA-4020
     I/O	                                                     (4)	10	Gigabit	XFP	+	(4)	Gigabit	SFP		                       (16)	10/100/1000	+	(8)	Gigabit	SFP
     Management	I/O	                                            (2)	10/100/1000	high	availability,		                        (2)	10/100/1000	high	availability,
     	                                                   (1)	10/100/1000	out-of-band	management,		                    (1)	10/100/1000	out-of-band	management,
     	                                                                (1)	DB9	console	port	                                       (1)	DB9	console	port
     Power	supply	(Avg/max	power	consumption)	                                              Redundant	400W	AC	(175W/200W)
     Input	voltage	(Input	frequency)	                                                               100-240Vac	(50-60Hz)
     Max	input	current	                                                                         50A@230Vac;	30A@120Vac
     Power	factor	                                                                      0.93	to	0.95	(PA-4060,	PA-4050,	PA-4020)
     Safety	                                                                                            UL,	CUL,	CB
     EMI	                                                                              FCC	Class	A,	CE	Class	A,	VCCI	Class	A,	TUV
     Rack	mountable	(dimensions)	                                                    2U,	19”	standard	rack	(3.5”H	x	16.5”D	x	17.5”W)
     MTBF	                                                                               7.18	years	(PA-4060,	PA-4050,	PA-4020)

     ENVIRONmENT
     Operating	temperature	                                                                         32°	to	122°	F,	0°	to	50°	C
     Non-operating	temperature	                                                                    -4°	to	158°	F,	-20°	to	70°	C




     ORDERINg INFORmATION                                PA-4060                                       PA-4050                                         PA-4020
     Platform	                                           PAN-PA-4060		                                 PAN-PA-4050	                                    PAN-PA-4020
     Annual	threat	prevention	subscription	              PAN-PA-4060-TP		                              PAN-PA-4050-TP	                                 PAN-PA-4020-TP
     Annual	URL	filtering	subscription	                  PAN-PA-4060-URL2	                             PAN-PA-4050-URL2	                               PAN-PA-4020-URL2
     VSYS	upgrade	(10	additional)		                      	       ---	                                  	     ---	                                      PAN-PA-4020-VSYS-10
     VSYS	upgrade	(50	additional)	                       PAN-PA-4060-VSYS-50	                          PAN-PA-4050-VSYS-50	                            	---
     VSYS	upgrade	(100	additional)	                      PAN-PA-4060-VSYS-100	                         PAN-PA-4050-VSYS-100	                           	---


For	additional	information	on	the	PA-4000	Series	software	features,	please	visit	www.paloaltonetworks.com/literature.




                                                                                                                                          Your Palo Alto Networks Reseller
                                                                                                                                                  www.altaware.com
                                                                                                                                                 sales@altaware.com
                                                                                                                                                   (866) 833-4070



                                     Palo Alto Networks	                  Copyright ©2010, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS,
                                                                          App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice.
                                     232	E.	Java	Drive
                                                                          Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update
                                     Sunnyvale,	CA.	94089                 information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this
                                     Sales		866.320.4788			               publication without notice. PAN-OS 3.1, March 2010.
                                     	      408.738.7700                  840-000002-00D
                                     www.paloaltonetworks.com

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network SecuritySantosh K L
 
D S A P 4000 U S
D S  A P 4000  U SD S  A P 4000  U S
D S A P 4000 U SAri Zoldan
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solutionCPqD
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationDenham Pearce
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsAltaware, Inc.
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure MobilityCisco Canada
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 

What's hot (19)

LCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN GatewayLCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN Gateway
 
Network Security
Network SecurityNetwork Security
Network Security
 
D S A P 4000 U S
D S  A P 4000  U SD S  A P 4000  U S
D S A P 4000 U S
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Datasheet stonegate ips-allinone
Datasheet stonegate ips-allinoneDatasheet stonegate ips-allinone
Datasheet stonegate ips-allinone
 
Datasheet stonegate fw-allinone
Datasheet stonegate fw-allinoneDatasheet stonegate fw-allinone
Datasheet stonegate fw-allinone
 
Cyberoam cr25wing
Cyberoam cr25wingCyberoam cr25wing
Cyberoam cr25wing
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise Presentation
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure Mobility
 
1000281 en 2
1000281 en 21000281 en 2
1000281 en 2
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Meraki MR66
Meraki MR66Meraki MR66
Meraki MR66
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 

Similar to PAN PA4000

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdfssuser88346b
 
cisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfcisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfHi-Network.com
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileAliza Ayub
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileIqra Hameed
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Michael Graves
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 

Similar to PAN PA4000 (20)

PAN PA2000 series
PAN PA2000 seriesPAN PA2000 series
PAN PA2000 series
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
cisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfcisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdf
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
2500 controller
2500 controller2500 controller
2500 controller
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Hiveap300
Hiveap300Hiveap300
Hiveap300
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 

More from Altaware, Inc.

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonAltaware, Inc.
 
Aerohive datasheet br200
Aerohive datasheet br200Aerohive datasheet br200
Aerohive datasheet br200Altaware, Inc.
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest AccessAltaware, Inc.
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product ComparisonsAltaware, Inc.
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAltaware, Inc.
 
Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAltaware, Inc.
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesAltaware, Inc.
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuideAltaware, Inc.
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAltaware, Inc.
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAltaware, Inc.
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12Altaware, Inc.
 

More from Altaware, Inc. (20)

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS Comparison
 
Aerohive datasheet br200
Aerohive datasheet br200Aerohive datasheet br200
Aerohive datasheet br200
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
Juniper MAG Series
Juniper MAG SeriesJuniper MAG Series
Juniper MAG Series
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product Comparisons
 
Infoblox appliances
Infoblox appliancesInfoblox appliances
Infoblox appliances
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution Brief
 
Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLAN
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & Examples
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators Guide
 
SIP2 for ILS
SIP2 for ILSSIP2 for ILS
SIP2 for ILS
 
Aerohive AP 350
Aerohive AP 350Aerohive AP 350
Aerohive AP 350
 
Aerohive AP 330
Aerohive AP 330Aerohive AP 330
Aerohive AP 330
 
Aerohive AP 170
Aerohive AP 170Aerohive AP 170
Aerohive AP 170
 
Aerohive AP 120
Aerohive AP 120Aerohive AP 120
Aerohive AP 120
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology Primer
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student Manager
 
PAN Platform Summary
PAN Platform SummaryPAN Platform Summary
PAN Platform Summary
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

PAN PA4000

  • 1. PA L O A LT O N E T W O R K S : PA - 4 0 0 0 S e r i e s S p e c s h e e t PA-4000 Series The PA-4000 Series is a next-generation firewall that delivers unprecedented visibility and control over applications, users and content on enterprise PA-4060 networks. APPLICATION IDENTIFICATION: • Identifies more than 950 applications PA-4050 PA-4020 irrespective of port, protocol, SSL encryption or evasive tactic employed. • Enables positive enforcement application usage policies: allow, deny, The Palo Alto NetworksTM PA-4000 Series is comprised of three schedule, inspect, apply traffic shaping. high performance platforms, the PA-4020, the PA-4050 and • Graphical visibility tools enable simple the PA-4060, all of which are targeted at high speed Internet and intuitive view into application traffic. gateway and datacenter deployments. The PA-4000 Series USER IDENTIFICATION: • Policy-based visibility and control over manages multi-Gbps traffic flows using dedicated processing who is using the applications through and memory for networking, security, threat prevention and seamless integration with Active Directory, LDAP, and eDirectory. management. • Identifies Citrix and Microsoft Terminal A 10 Gbps backplane smoothes the pathway between dedicated processors, Services users, enabling visibility and control over their respective application and the physical separation of data and control plane ensures that usage. management access is always available, irrespective of the traffic load. The PA- • Control non-Windows hosts via web- 4050 and PA-4020 each have 24 traffic interfaces while the PA-4060 supports based authentication. 10 Gbps interfaces. All of the PA-4000 Series platforms have dedicated high availability and out-of-band management interfaces. CONTENT IDENTIFICATION: • Block viruses, spyware, and vulnerability The controlling element of the PA-4000 Series next-generation firewalls is exploits, limit unauthorized transfer of PAN-OSTM, a security-specific operating system that tightly integrates three files and sensitive data such as CC# or SSN, and control non-work related web unique identification technologies: App-IDTM, User-ID and Content-ID, with surfing. key firewall, networking and management features. • Single pass software architecture enables multi-gigabit throughput with low latency while scanning content. KEy PERFORmANCE SPECIFICATIONS PA-4020 PA-4050 PA-4060 Firewall throughput 2 Gbps 10 Gbps 10 Gbps Threat prevention throughput 2 Gbps 5 Gbps 5 Gbps IPSec VPN throughput 1 Gbps 2 Gbps 2 Gbps IPSec VPN tunnels/interfaces 2,000 4,000 4,000 SSL VPN concurrent users 5,000 10,000 10,000 New sessions per second 60,000 60,000 60,000 Max sessions 500,000 2,000,000 2,000,000 For a complete description of the PA-4000 Series next-generation firewall feature set, please visit www.paloaltonetworks.com/literature.
  • 2. PA L O A LT O N E T W O R K S : PA - 4 0 0 0 S e r i e s S p e c s h e e t Additional PA-4000 Series Specifications and Features APP-ID NETwORKINg • Identifies and controls more than 950 applications • Dynamic routing (BGP, OSPF and RIPv2) • SSL decryption (inbound and outbound) • Tap mode, virtual wire, layer 2, layer 3 • Customize application properties • Network address translation (NAT) • Custom HTTP and SSL applications - Source and destination address translation - Dynamic IP and port pool: 254 FIREwALL - Dynamic IP pool: 16,234 • Policy-based control by application, application category, • DHCP server/ DHCP relay: Up to 3 servers subcategory, technology, risk factor or characteristic • 802.1Q VLANs: 4,094 • Application function control • Policy-based forwarding • Fragmented packet protection • 802.3ad link aggregation • Reconnaissance scan protection • Point-to-Point Protocol over Ethernet (PPPoE) • Denial of Service (DoS)/Distributed Denial of Services (DDoS) • IPv6 application visibility, control and full content inspection (Virtual protection wire mode only) • Maximum number of policies: (PA-4020) 10,000, (PA-4050) 20,000, • Jumbo frames (PA-4060) 20,000 • Virtual routers: (PA-4020) 20, (PA-4050) 125, (PA-4060) 125 • Security zones: (PA-4020) 80, (PA-4050) 500, (PA-4060) 500 USER-ID • Virtual systems (base/max): (PA-4020) 10/20*, (PA-4050) 25/125*, • Visibility and control by user, group and IP address (PA-4060) 25/125* • Active Directory, LDAP, eDirectory, Citrix and Microsoft Terminal THREAT PREVENTION (SUbSCRIPTION REqUIRED) Services • XML API (external user repository integration) • Detect and block application vulnerability exploits (IPS) • WMI and NetBios polling • Stream-based protection against viruses, spyware and worms • Maximum concurrent user/IP mappings: 64,000 • HTML/Javascript virus protection • Inspect compressed files that use the Deflate algorithm (Zip, Gzip, DATA FILTERINg etc) • Control unauthorized data transfer (social security numbers, credit • Custom vulnerability and spyware phone home signatures card numbers, custom data patterns) • Content updates: daily (malware), weekly (vulnerability signatures), • Control unauthorized transfer of more than 50 file types emergency (all) URL FILTERINg (SUbSCRIPTION REqUIRED) qUALITy OF SERVICE (qOS) • 76-category, 20M URL on-box database • Policy-based traffic shaping by application, user, source, destination, • Custom 1M URL cache database (from 180M URL database) interface, IPSec VPN tunnel and more • Custom block pages and URL categories • Define up to 8 traffic classes with guaranteed, maximum and priority bandwidth parameters IPSEC VPN (SITE-TO-SITE) • Real-time bandwidth monitor • Manual key, IKE v1 • Per policy diffserv marking • 3DES, AES (128-bit, 192-bit, 256-bit) encryption mANAgEmENT TOOLS • SHA1, MD5 authentication • Integrated web interface SSL VPN (REmOTE ACCESS) • Command line interface (CLI) • IPSec transport with SSL fall-back • Role-based administration • Enforce unique policies for SSL VPN traffic • Syslog and SNMPv2 • Enable/disable split tunneling to control client access • Customizable administrator login banner • LDAP, SecurID, or local DB authentication • XML-based REST API • Client OS: Windows XP, Windows Vista (32 and 64 bit), Windows 7 (32 • Centralized management (Panorama) and 64 bit) • Centrally manage PAN-OS and content updates (Panorama) • Shared policies (Panorama) HIgH AVAILAbILITy VISIbILITy AND REPORTINg TOOLS • Active/Passive failover • Configuration and session synchronization • Graphical summary of applications, URL categories, threats and data • Heartbeat checking (ACC) • Link and path failure monitoring • View, filter, export traffic, threat, URL, and data filtering logs • Fully customizable reporting • Trace session tool * Adding virtual systems to the base quantity requires a separately purchased license. PAGE 2
  • 3. PA L O A LT O N E T W O R K S : PA - 4 0 0 0 S e r i e s S p e c s h e e t HARDwARE SPECIFICATIONS PA-4060 PA-4050/PA-4020 I/O (4) 10 Gigabit XFP + (4) Gigabit SFP (16) 10/100/1000 + (8) Gigabit SFP Management I/O (2) 10/100/1000 high availability, (2) 10/100/1000 high availability, (1) 10/100/1000 out-of-band management, (1) 10/100/1000 out-of-band management, (1) DB9 console port (1) DB9 console port Power supply (Avg/max power consumption) Redundant 400W AC (175W/200W) Input voltage (Input frequency) 100-240Vac (50-60Hz) Max input current 50A@230Vac; 30A@120Vac Power factor 0.93 to 0.95 (PA-4060, PA-4050, PA-4020) Safety UL, CUL, CB EMI FCC Class A, CE Class A, VCCI Class A, TUV Rack mountable (dimensions) 2U, 19” standard rack (3.5”H x 16.5”D x 17.5”W) MTBF 7.18 years (PA-4060, PA-4050, PA-4020) ENVIRONmENT Operating temperature 32° to 122° F, 0° to 50° C Non-operating temperature -4° to 158° F, -20° to 70° C ORDERINg INFORmATION PA-4060 PA-4050 PA-4020 Platform PAN-PA-4060 PAN-PA-4050 PAN-PA-4020 Annual threat prevention subscription PAN-PA-4060-TP PAN-PA-4050-TP PAN-PA-4020-TP Annual URL filtering subscription PAN-PA-4060-URL2 PAN-PA-4050-URL2 PAN-PA-4020-URL2 VSYS upgrade (10 additional) --- --- PAN-PA-4020-VSYS-10 VSYS upgrade (50 additional) PAN-PA-4060-VSYS-50 PAN-PA-4050-VSYS-50 --- VSYS upgrade (100 additional) PAN-PA-4060-VSYS-100 PAN-PA-4050-VSYS-100 --- For additional information on the PA-4000 Series software features, please visit www.paloaltonetworks.com/literature. Your Palo Alto Networks Reseller www.altaware.com sales@altaware.com (866) 833-4070 Palo Alto Networks Copyright ©2010, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice. 232 E. Java Drive Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update Sunnyvale, CA. 94089 information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this Sales 866.320.4788 publication without notice. PAN-OS 3.1, March 2010. 408.738.7700 840-000002-00D www.paloaltonetworks.com