Project Description

Palo Alto PA-5250

Palo Alto PA-5250 next-generation firewall appliances bring broad protection, high throughput, integration and innovation to high-speed data center, internet gateway and service provider deployments.

Palo Alto PA-5220 PA-5250 PA-5260 Firewall

Performance

App-ID firewall throughput 35,9 Gbps
Threat prevention throughput 20,3 Gbps
IPSec VPN throughput 14 Gbps
New sessions per second 348.000
Max sessions 8.000.000
Virtual systems (base) 25/125

Hardware Specification

Interfaces supported4 4x 100/1000/10G Cu, 16x 1G/10G SFP/SFP+, 4x 40G/100G QSFP28
Management I/O 2x 10/100/1000 Cu, 10/100/1000 out-of-band management, RJ45 console; 40G QSFP+ HA
Rack mountable? 3U, 19″ standard rack
Power supply 2x1200W AC or DC (1:1 Fully Redundant)
Redundant power supply? Yes
Disk drives System: 240GB SSD, RAID1. Log: 2TB HDD, RAID1
Hot swap fans Yes

Extensive threat prevention with high throughput, visibility and control

Broad protection across a wide range of use cases

PA-5200 Series next-generation firewalls prevent threats and safely enable applications across a diverse set of high-performance use cases – including internet gateway, data center and service provider environments.

Learn more >

High performance with granular visibility and control

All PA-5200 Series models, including the PA-5280, PA-5260, PA-5250 and PA-5220, provide predictable performance, deep visibility, and control over all traffic, including encrypted traffic. You can secure your organization through advanced visibility and control of applications, users and content at throughput speeds of up to 67 Gbps. Dedicated processing resources assigned to networking, security, signature matching and management functions ensure consistent performance.

Learn what’s new >

Strong security for encrypted traffic

The PA-5200 Series hardware and PAN-OS® software deliver high decryption throughput and SSL session capacity, removing all barriers to decryption. You can now secure the increasingly encrypted traffic without slowing down your business, simplify your deployments by eliminating dedicated decryption devices, and use our flexible policies to stop hidden threats without compromising privacy.

Learn more >

Download

DataSheet.pdf
Link