Project Description

Palo Alto PA-5050

Palo Alto PA-5050 next-generation firewalls combine high throughput, advanced visibility and granular control to secure a wide range of organizations and deployments.

Palo Alto PA-5050 Firewall

Performance

App-ID firewall throughput 10 Gbps
Threat prevention throughput 5 Gbps
IPSec VPN throughput 4 Gbps
New sessions per second 120.000
Max sessions 2.000.000
Virtual systems (base) 25/125

Hardware Specification

Interfaces supported4 12x 10/100/1000, SFP, 4x 10 SFP+
Management I/O 2x 10/100/1000 out-ofband management, 10/100/1000 high availability, RJ-45 console
Rack mountable? 2U, 19” standard rack
Power supply Redundant 450W AC or DC
Redundant power supply? Yes
Disk drives 120GB or 240GB SSD, RAID Optional
Hot swap fans Yes

Key Security Features

Classifies all applications, on all ports, all the time

  • Identifies the application, regardless of port, SSL/SSH encryption, or evasive technique employed.
  • Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect, and apply traffic-shaping.
  • Categorizes unidentified applications for policy control, threat forensics, or App-ID™ technology development.

Enforces security policies for any user, at any location

  • Deploys consistent policies to local and remote users running on Windows®, macOS®, Linux, Android®, or Apple iOS platforms.
  • Enables agentless integration with Microsoft Active Directory® and Terminal Services, LDAP, Novell eDirectory™, and Citrix.
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information.

Prevent known and unknown threats

  • Blocks a range of known threats—including exploits, malware, and spyware—across all ports, regardless of common evasion tactics employed.
  • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing.
  • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection.

Download

DataSheet.pdf
Link