Project Description

<h1 style=“color: #415465; font-weight: bold; text-align: center;“>Palo Alto PA-5020</h1>
<p style=“font-size: 18px;“>Palo Alto PA-5020 next-generation firewalls combine high throughput, advanced visibility and granular control to secure a wide range of organizations and deployments.</p>

Palo Alto PA-5020 Firewall

<h2><strong>Performance</strong></h2>

<table width=“100%“>
<tbody>
<tr>
<td width=“40%“><strong>App-ID firewall throughput</strong></td>
<td width=“60%“>5 Gbps</td>
</tr>
<tr>
<td width=“299″><strong>Threat prevention throughput</strong></td>
<td width=“500″>2 Gbps</td>
</tr>
<tr>
<td width=“299″><strong>IPSec VPN throughput</strong></td>
<td width=“500″>2 Gbps</td>
</tr>
<tr>
<td width=“299″><strong>New sessions per second</strong></td>
<td width=“500″>120.000</td>
</tr>
<tr>
<td width=“299″><strong>Max sessions</strong></td>
<td width=“500″>1.000.000</td>
</tr>
<tr>
<td width=“299″><strong>Virtual systems (base)</strong></td>
<td width=“500″>10/20</td>
</tr>
</tbody>
</table>

<h2><strong>Hardware Specification</strong></h2>

<table width=“100%“>
<tbody>
<tr>
<td width=“40%“><strong>Interfaces supported4</strong></td>
<td width=“60%“>12x 10/100/1000, SFP, 4x 10 SFP+</td>
</tr>
<tr>
<td><strong>Management I/O</strong></td>
<td width=“500″>2x 10/100/1000 out-ofband management, 10/100/1000 high availability, RJ-45 console</td>
</tr>
<tr>
<td><strong>Rack mountable?</strong></td>
<td>2U, 19” standard rack</td>
</tr>
<tr>
<td><strong>Power supply</strong></td>
<td>Redundant 450W AC or DC</td>
</tr>
<tr>
<td><strong>Redundant power supply?</strong></td>
<td>Yes</td>
</tr>
<tr>
<td><strong>Disk drives</strong></td>
<td>120GB or 240GB SSD, RAID Optional</td>
</tr>
<tr>
<td><strong>Hot swap fans</strong></td>
<td>Yes</td>
</tr>
</tbody>
</table>

<h2 style=“font-size: 42px; margin: 15px 0px; color: #474747; text-align: center;“>Key Security Features</h2>

<h3 style=“font-weight: bold; font-size: 22px; margin: 20px 0 10px;“>Classifies all applications, on all ports, all the time</h3>
<ul>
<li>Identifies the application, regardless of port, SSL/SSH encryption, or evasive technique employed.</li>
<li>Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect, and apply traffic-shaping.</li>
<li>Categorizes unidentified applications for policy control, threat forensics, or App-ID™ technology development.</li>
</ul>

<h3 style=“font-weight: bold; font-size: 22px; margin: 20px 0 10px;“>Enforces security policies for any user, at any location</h3>
<ul>
<li>Deploys consistent policies to local and remote users running on Windows®, macOS®, Linux, Android®, or Apple iOS platforms.</li>
<li>Enables agentless integration with Microsoft Active Directory® and Terminal Services, LDAP, Novell eDirectory™, and Citrix.</li>
<li>Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information.</li>
</ul>

<h3 style=“font-weight: bold; font-size: 22px; margin: 20px 0 10px;“>Prevent known and unknown threats</h3>
<ul>
<li>Blocks a range of known threats—including exploits, malware, and spyware—across all ports, regardless of common evasion tactics employed.</li>
<li>Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing.</li>
<li>Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection.</li>
</ul>

<h2 style=“text-align: left; color: #333333;“><strong>Download</strong></h2>

DataSheet.pdf
Link