Project Description

Palo Alto PA-5260

Palo Alto PA-5260 next-generation firewall appliances bring broad protection, high throughput, integration and innovation to high-speed data center, internet gateway and service provider deployments.

Palo Alto PA-5220 PA-5250 PA-5260 Firewall

Performance

App-ID firewall throughput 72,2 Gbps
Threat prevention throughput 30 Gbps
IPSec VPN throughput 21 Gbps
New sessions per second 458.000
Max sessions 32.000.000
Virtual systems (base) 25/225

Hardware Specification

Interfaces supported4 4x 100/1000/10G Cu, 16x 1G/10G SFP/SFP+, 4x 40G/100G QSFP28
Management I/O 2x 10/100/1000 Cu, 10/100/1000 out-of-band management, RJ45 console; 40G QSFP+ HA
Rack mountable? 3U, 19″ standard rack
Power supply 2x1200W AC or DC (1:1 Fully Redundant)
Redundant power supply? Yes
Disk drives System: 240GB SSD, RAID1. Log: 2TB HDD, RAID1
Hot swap fans Yes

Extensive threat prevention with high throughput, visibility and control

Broad protection across a wide range of use cases

PA-5200 Series next-generation firewalls prevent threats and safely enable applications across a diverse set of high-performance use cases – including internet gateway, data center and service provider environments.

Learn more >

High performance with granular visibility and control

All PA-5200 Series models, including the PA-5280, PA-5260, PA-5250 and PA-5220, provide predictable performance, deep visibility, and control over all traffic, including encrypted traffic. You can secure your organization through advanced visibility and control of applications, users and content at throughput speeds of up to 67 Gbps. Dedicated processing resources assigned to networking, security, signature matching and management functions ensure consistent performance.

Learn what’s new >

Strong security for encrypted traffic

The PA-5200 Series hardware and PAN-OS® software deliver high decryption throughput and SSL session capacity, removing all barriers to decryption. You can now secure the increasingly encrypted traffic without slowing down your business, simplify your deployments by eliminating dedicated decryption devices, and use our flexible policies to stop hidden threats without compromising privacy.

Learn more >

Download

DataSheet.pdf
Link