Palo Alto PA-7080
Palo Alto PA-7080 next-generation firewalls enable large organizations and service providers to secure high-performance, business-critical environments, such as large data centers and high-bandwidth network perimeters.
Performance
App-ID firewall throughput | 200 Gbps |
Threat prevention throughput | 100 Gbps |
IPSec VPN throughput | 80 Gbps |
New sessions per second | 1.200.000 |
Max sessions | 40.000.000/80.000.000 |
Virtual systems (base) | 25/225 |
Hardware Specification
Interfaces supported NPC option 1 | Up to 20x QSFP+, 120x SFP+ |
Interfaces supported NPC option 2 | Up to 120x 10/100/100, 80x SFP, 40 SFP+ |
Management I/O | 2x 10/100/1000, 2x QSFP+ high availability, 10/100/1000 out-of-band management, RJ45 console |
Rack mountable? | 19U, 19” standard rack |
Power supply | 4x2500W AC (2400W / 2700) expandable to 8 |
Redundant power supply? | Yes |
Disk drives | 2TB RAID1 |
Hot swap fans | Yes |
Secure your networks without holding back the business
Classify all applications on all ports, all the time
PA-7000 Series appliances identify the application, regardless of port, SSL/SSH encryption or evasive technique employed, and use the application – not the port – as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. They also categorize unidentified applications for policy control, threat forensics or custom App-ID development.
Enforce security policies for any user at any location
The PA-7000 Series NGFWs are integrated to facilitate policy deployment and enforcement. You can deploy consistent policies to local and remote users running on Windows®, macOS®, Linux, Android® or Apple iOS platforms. You get agentless integration with Microsoft Active Directory® and Terminal Services, LDAP, Novell eDirectory™ and Citrix. You can also integrate your firewall policies easily with 802.1X wireless, proxies, network access control and other sources of user identity information.
Prevent known and unknown threats
PA-7000 Series appliances block a range of threats, including exploits, malware and spyware, across all ports, regardless of common evasion tactics employed. They limit the unauthorized transfer of files and sensitive data to safely enable non-work-related web surfing. They also identify unknown malware, analyze it based on hundreds of malicious behaviors, and then automatically create and deliver protection.