Palo Alto Networks รุ่นใหญ่
-
Paloaltonetworks PA-3220
Features:
- 5 Gbps firewall throughput (App-ID enabled1)
- 2.2 Gbps Threat Prevention throughput2
- 2.5 Gbps IPsec VPN throughput
- 1,000,000 sessions
- 58,000 new sessions per second3
- 4,000 IPsec VPN tunnels/tunnel interfaces
- 1,024 SSL VPN Users
- 10 virtual routers
- 1/6 virtual systems (base/max4)
- 60 security zones
- 2,500 max number of policies
฿0.00 -
Paloaltonetworks PA-3250
Features:
- 6.3 Gbps firewall throughput
(App-ID enabled1) - 3 Gbps Threat Prevention throughput2
- 3.2 Gbps IPsec VPN throughput
- 2,000,000 sessions
- 94,000 new sessions per second3
- 6,000 IPsec VPN tunnels/tunnel interfaces
- 2,048 SSL VPN Users
- 10 virtual routers
- 1/6 virtual systems (base/max4)
- 60 security zones
- 5,000 max number of policies
฿0.00 - 6.3 Gbps firewall throughput
-
Paloaltonetworks PA-3260
Features:
- 8.8 Gbps firewall throughput1
(App-ID enabled1) - 4.7 Gbps Threat Prevention throughput2
- 4.8 Gbps IPsec VPN throughput
- 3,000,000 max sessions
- 135,000 new sessions per second3
- 6,000 IPsec VPN tunnels/tunnel interfaces
- 2,048 SSL VPN Users
- 10 virtual routers
- 1/6 virtual systems (base/max4)
- 60 security zones
- 5,000 max number of policies
฿0.00 - 8.8 Gbps firewall throughput1
-
Paloaltonetworks PA-5220
Key Security Features:
Classifies all applications, on all ports, all the time
- Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
- Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
- Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development
Enforces security policies for any user, at any location
- Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms
- Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
- Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information
Prevents known and unknown threats
- Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
- Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
- Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
฿0.00