Palo Alto PA-5250
Palo Alto PA-5250 next-generation firewall appliances bring broad protection, high throughput, integration and innovation to high-speed data center, internet gateway and service provider deployments.
Performance
App-ID firewall throughput | 35,9 Gbps |
Threat prevention throughput | 20,3 Gbps |
IPSec VPN throughput | 14 Gbps |
New sessions per second | 348.000 |
Max sessions | 8.000.000 |
Virtual systems (base) | 25/125 |
Hardware Specification
Interfaces supported4 | 4x 100/1000/10G Cu, 16x 1G/10G SFP/SFP+, 4x 40G/100G QSFP28 |
Management I/O | 2x 10/100/1000 Cu, 10/100/1000 out-of-band management, RJ45 console; 40G QSFP+ HA |
Rack mountable? | 3U, 19″ standard rack |
Power supply | 2x1200W AC or DC (1:1 Fully Redundant) |
Redundant power supply? | Yes |
Disk drives | System: 240GB SSD, RAID1. Log: 2TB HDD, RAID1 |
Hot swap fans | Yes |
Extensive threat prevention with high throughput, visibility and control
Broad protection across a wide range of use cases
PA-5200 Series next-generation firewalls prevent threats and safely enable applications across a diverse set of high-performance use cases – including internet gateway, data center and service provider environments.
High performance with granular visibility and control
All PA-5200 Series models, including the PA-5280, PA-5260, PA-5250 and PA-5220, provide predictable performance, deep visibility, and control over all traffic, including encrypted traffic. You can secure your organization through advanced visibility and control of applications, users and content at throughput speeds of up to 67 Gbps. Dedicated processing resources assigned to networking, security, signature matching and management functions ensure consistent performance.
Strong security for encrypted traffic
The PA-5200 Series hardware and PAN-OS® software deliver high decryption throughput and SSL session capacity, removing all barriers to decryption. You can now secure the increasingly encrypted traffic without slowing down your business, simplify your deployments by eliminating dedicated decryption devices, and use our flexible policies to stop hidden threats without compromising privacy.