SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 2 0 0 0 S e r i e s S p e c s h e e t




PA-2000 Series

The PA-2000 Series is a next-generation
firewall that delivers unprecedented                                                       PA-2020                                   PA-2050

visibility and control over applications,
users and content on enterprise
                                                                          The Palo Alto NetworksTM PA-2000 Series is comprised of two
networks.
                                                                          high performance platforms, the PA-2020 and the PA-2050,
                                                                          both of which are targeted at high speed Internet gateway
               APPLICATION IDENTIFICATION:
                                                                          deployments. The PA-2000 Series manages network traffic
               •	 Identifies	more	than	950	applications	                  flows using dedicated processing and memory for networking,
                 irrespective	of	port,	protocol,	SSL	
                                                                          security, threat prevention and management.
                 encryption	or	evasive	tactic	employed.
               •	 Enables	positive	enforcement	
                                                                          A high speed backplane smoothes the pathway between dedicated processors,
                 application	usage	policies:	allow,	deny,	
                 schedule,	inspect,	apply	traffic	shaping.		
                                                                          and the separation of data and control plane ensures that management access
               •	 Graphical	visibility	tools	enable	simple	
                                                                          is always available, irrespective of the traffic load. Interface density for the
                 and	intuitive	view	into	application	traffic.	            PA-2020 and the PA-2050 is unmatched with up to 20 traffic interfaces and
                                                                          dedicated out-of-band management interfaces.
               USER IDENTIFICATION:
               •	 Policy-based	visibility	and	control	over	               The controlling element of the PA-2000 Series next-generation firewalls is
                 who	is	using	the	applications	through	                   PAN-OSTM, a security-specific operating system that tightly integrates three
                 seamless	integration	with	Active	
                                                                          unique identification technologies: App-IDTM, User-ID and Content-ID, with
                 Directory,	LDAP,	and	eDirectory.
                                                                          key firewall, networking, VPN and management features.
               •	 Identifies	Citrix	and	Microsoft	Terminal	

                 Services	users,	enabling	visibility	and	
                 control	over	their	respective	application	
                                                                              KEy PERFORmANCE SPECIFICATIONS             PA-2020               PA-2050
                 usage.	
               •	 Control	non-Windows	hosts	via	web-                          Firewall	throughput	                       500	Mbps	              1	Gbps
                                                                              Threat	prevention	throughput	              200	Mbps	             500	Mbps	
                 based	authentication.		
                                                                              IPSec	VPN	throughput		                     200	Mbps	             300	Mbps
               CONTENT IDENTIFICATION:                                        IPSec	VPN	tunnels/interfaces	                 1,000	                2,000
               •	 Block	viruses,	spyware,	and	vulnerability	                  SSL	VPN	concurrent	users	                      500	                 1,000
                                                                              New	sessions	per	second	                     15,000	               15,000
                 exploits,	limit	unauthorized	transfer	of	
                                                                              Max	sessions	                               125,000	              250,000
                 files	and	sensitive	data	such	as	CC#	or	
                 SSN,	and	control	non-work	related	web	
                 surfing.
                                                                          For a complete description of the PA-2000 Series feature set, please visit www.
               •	 Single	pass	software	architecture	
                                                                          paloaltonetworks.com/literature.
                 enables	multi-gigabit	throughput	with	
                 low	latency	while	scanning	content.
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 2 0 0 0 S e r i e s S p e c s h e e t




Additional PA-2000 Series Specifications and Features


          APP-ID                                                                            NETwORKINg
          •	Identifies	and	controls	more	than	950	applications							                       •	Dynamic	routing	(BGP,	OSPF	and	RIPv2)					
          •	SSL	decryption	(inbound	and	outbound)		                                         •	Tap	mode,	virtual	wire,	layer	2,	layer	3
          •	Customize	application	properties                                                •	Network	address	translation	(NAT)	
          •	Custom	HTTP	and	SSL	applications                                                   -	Source	and	destination	address	translation
                                                                                               -	Dynamic	IP	and	port	pool:	254	
          FIREwALL
                                                                                               -	Dynamic	IP	pool:	16,234			
          •	Policy-based	control	by	application,	application	category,	                     •	DHCP	server/	DHCP	relay:	Up	to	3	servers
            subcategory,	technology,	risk	factor	or	characteristic							                   •	802.1Q	VLANs:	4,094
          •	Application	function	control	                                                   •	Policy-based	forwarding
          •	Fragmented	packet	protection                                                    •	Point-to-Point	Protocol	over	Ethernet	(PPPoE)
          •	Reconnaissance	scan	protection                                                  •	IPv6	application	visibility,	control	and	full	content	inspection	(Virtual	
          •	Denial	of	Service	(DoS)/Distributed	Denial	of	Services	(DDoS)	                    wire	mode	only)
            protection                                                                      •	Virtual	routers:	10
          •	Maximum	number	of	policies:	(PA-2020)	2,500	(PA-2050)	5,000                     •	Security	zones:	40
                                                                                            •	Virtual	systems	(base/max):	1/6*
          USER-ID
                                                                                            THREAT PREVENTION (SUbSCRIPTION REqUIRED)
          •	Visibility	and	control	by	user,	group	and	IP	address							
          •	Active	Directory,	LDAP,	eDirectory,	Citrix	and	Microsoft	Terminal	              •	Detect	and	block	application	vulnerability	exploits	(IPS)			
            Services	                                                                       •	Stream-based	protection	against	viruses,	spyware	and	worms	
          •	XML	API	(external	user	repository	integration)                                  •	HTML/Javascript	virus	protection
          •	WMI	and	NetBios	polling                                                         •	Inspect	compressed	files	that	use	the	Deflate	algorithm	(Zip,	Gzip,	
          •	Maximum	concurrent	user/IP	mappings:	64,000                                       etc)	
                                                                                            •	Custom	vulnerability	and	spyware	phone	home	signatures
          DATA FILTERINg                                                                    •	Content	updates:	daily	(malware),	weekly	(vulnerability	signatures),	
          •	Control	unauthorized	data	transfer	(social	security	numbers,	credit	              emergency	(all)
            card	numbers,	custom	data	patterns)							
                                                                                            qUALITy OF SERVICE (qOS)
          •	Control	unauthorized	transfer	of	more	than	50	file	types
                                                                                            •	Policy-based	traffic	shaping	by	application,	user,	source,	destination,	
          URL FILTERINg (SUbSCRIPTION REqUIRED)                                               interface,	IPSec	VPN	tunnel	and	more		
          •	76-category,	20M	URL	on-box	database		                                          •	8	traffic	classes	with	guaranteed,	maximum	and	priority	bandwidth	
          •	Custom	1M	URL	cache	database	(from	180M	URL	database)                             parameters
          •	Custom	block	pages	and	URL	categories                                           •	Real-time	bandwidth	monitor
                                                                                            •	Per	policy	diffserv	marking
          IPSEC VPN (SITE-TO-SITE)
                                                                                            mANAgEmENT TOOLS
          •	Manual	key,	IKE	v1			
          •	3DES,	AES	(128-bit,	192-bit,	256-bit)	encryption                                •	Integrated	web	interface					
          •	SHA1,	MD5	authentication                                                        •	Command	line	interface	(CLI)
                                                                                            •	Role-based	administration
          SSL VPN (REmOTE ACCESS)                                                           •	Syslog	and	SNMPv2
          •	IPSec	transport	with	SSL	fall-back		                                            •	Customizable	administrator	login	banner
          •	Enforce	unique	policies	for	SSL	VPN	traffic                                     •	XML-based	REST	API	
          •	Enable/disable	split	tunneling	to	control	client	access	                        •	Centralized	management	(Panorama)
          •	LDAP,	SecurID,	or	local	DB	authentication                                       •	Centrally	manage	PAN-OS	and	content	updates	(Panorama)	
          •	Client	OS:	Windows	XP,	Windows	Vista	(32	and	64	bit),	Windows	7	(32	            •	Shared	policies	(Panorama)
            and	64	bit)
                                                                                            VISIbILITy AND REPORTINg TOOLS
          HIgH AVAILAbILITy                                                                 •	Graphical	summary	of	applications,	URL	categories,	threats	and	data	
          •	Active/Passive	failover						                                                     (ACC)		
          •	Configuration	and	session	synchronization                                       •	View,	filter,	export	traffic,	threat,	URL,	and	data	filtering	logs	
          •	Heartbeat	checking	                                                             •	Fully	customizable	reporting
          •	Link	and	path	failure	monitoring                                                •	Trace	session	tool



*	Adding	virtual	systems	to	the	base	quantity	requires	a	separately	purchased	license.	




               PAGE	2
PA L O 	 A LT O 	 N E T W O R K S : 	 PA - 2 0 0 0 S e r i e s S p e c s h e e t




     HARDwARE SPECIFICATIONS                                               PA-2050                                                                   PA-2020
     I/O	                                      (16)	10/100/1000	+	(4)	SFP	optical	gigabit	(PA-2050)	 	 (12)	10/100/1000	+	(2)	SFP	optical	gigabit	(PA-2020)	
     Management	I/O	                                                     (
                                                                         	 1)	10/100/1000	out-of-band	management	port,	(1)	RJ-45	console	port
     Power	supply	(Avg/max	power	consumption)	                           	               175W/200W	(105W/120W)
     Input	voltage	(Input	frequency)	                                    	                 100-240Vac	(50-60Hz)
     Power	factor	                                                       	            0.65	to	0.70	(PA-2050,	PA-2020)
     Max	input	current	                                                  	               70A@230Vac;	35A@115Vac
     Rack	mountable	(Dimensions)	                                        	     1U,	19”	standard	rack	(1.75”H	x	17”D	x	17”W)
     Safety	                                                             	                      UL,	CUL,	CB
     EMI	                                                                	      FCC	Class	A,	CE	Class	A,	VCCI	Class	A,	TUV
     MTBF	                                                               	             7.3	years	(PA-2050,	PA-2020)

     ENVIRONmENT
     Operating	temperature	                             32°	to	122°	F,	0°	to	50°	C
     Non-operating	temperature	                         -4°	to	158°	F,	-20°	to	70°	C



     ORDERINg INFORmATION                               PA-2050                               PA-2020
     Platform	                                          PAN-PA-2050	                          PAN-PA-2020
     Annual	threat	prevention	subscription	             PAN-PA-2050-TP	                       PAN-PA-2020-TP
     Annual	URL	filtering	subscription	                 PAN-PA-2050-URL2	                     PAN-PA-2020-URL2
     Virtual	systems		                                  PAN-PA-2050-VSYS-5	                   PAN-PA-2020-VSYS-5



For	additional	Information	on	the	PA-2000	Series	software	features,	please	visit	www.paloaltonetworks.com/literature.




                                                                                                                                        Your Palo Alto Networks Reseller
                                                                                                                                                www.altaware.com
                                                                                                                                               sales@altaware.com
                                                                                                                                                 (866) 833-4070



                                     Palo Alto Networks	                  Copyright ©2010, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS,
                                                                          App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice.
                                     232	E.	Java	Drive
                                                                          Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update
                                     Sunnyvale,	CA.	94089                 information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this
                                     Sales		866.320.4788			               publication without notice. PAN-OS 3.1, March 2010.
                                     	      408.738.7700                  840-000003-00B
                                     www.paloaltonetworks.com

Contenu connexe

Tendances

Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway stefansayer
 
Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...Erol TOKALACOGLU
 
FRAFOS ABC Session Border Controller
FRAFOS ABC Session Border ControllerFRAFOS ABC Session Border Controller
FRAFOS ABC Session Border Controllerstefansayer
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sraMotty Ben Atia
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetIxia
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 

Tendances (20)

NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
ALOE Transit SBC rev.1 Brochure
ALOE Transit SBC rev.1 BrochureALOE Transit SBC rev.1 Brochure
ALOE Transit SBC rev.1 Brochure
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
LCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN GatewayLCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN Gateway
 
Sangoma SBC Training Presentation
Sangoma SBC Training PresentationSangoma SBC Training Presentation
Sangoma SBC Training Presentation
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
Aethra Telecommunications IP PBX Jan 2014
Aethra Telecommunications IP PBX Jan 2014Aethra Telecommunications IP PBX Jan 2014
Aethra Telecommunications IP PBX Jan 2014
 
The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway
 
Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
 
FRAFOS ABC Session Border Controller
FRAFOS ABC Session Border ControllerFRAFOS ABC Session Border Controller
FRAFOS ABC Session Border Controller
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
VoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacksVoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacks
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM Datasheet
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 

En vedette

Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAltaware, Inc.
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAltaware, Inc.
 
Advantages of learning spanish yourself
Advantages of learning spanish yourselfAdvantages of learning spanish yourself
Advantages of learning spanish yourselfBirkenbihl Approach
 
12 fatal mistakes All Learning Developers Make
12 fatal mistakes All Learning Developers Make12 fatal mistakes All Learning Developers Make
12 fatal mistakes All Learning Developers MakeLou Russell
 
How to be a Dictator
How to be a DictatorHow to be a Dictator
How to be a Dictatorbethanybeth
 
Content Marketing Science And Art - Centerline Digital - UPDATED October 2013
Content Marketing Science And Art - Centerline Digital - UPDATED October 2013Content Marketing Science And Art - Centerline Digital - UPDATED October 2013
Content Marketing Science And Art - Centerline Digital - UPDATED October 2013Centerline Digital
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsAltaware, Inc.
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAltaware, Inc.
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest AccessAltaware, Inc.
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesAltaware, Inc.
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAltaware, Inc.
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuideAltaware, Inc.
 

En vedette (19)

Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLAN
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student Manager
 
PAN PA2000 series
PAN PA2000 seriesPAN PA2000 series
PAN PA2000 series
 
Advantages of learning spanish yourself
Advantages of learning spanish yourselfAdvantages of learning spanish yourself
Advantages of learning spanish yourself
 
Game 3
Game 3Game 3
Game 3
 
12 fatal mistakes All Learning Developers Make
12 fatal mistakes All Learning Developers Make12 fatal mistakes All Learning Developers Make
12 fatal mistakes All Learning Developers Make
 
Task 3
Task 3Task 3
Task 3
 
Questionnaire2
Questionnaire2Questionnaire2
Questionnaire2
 
Q4
Q4Q4
Q4
 
How to be a Dictator
How to be a DictatorHow to be a Dictator
How to be a Dictator
 
Content Marketing Science And Art - Centerline Digital - UPDATED October 2013
Content Marketing Science And Art - Centerline Digital - UPDATED October 2013Content Marketing Science And Art - Centerline Digital - UPDATED October 2013
Content Marketing Science And Art - Centerline Digital - UPDATED October 2013
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution Brief
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & Examples
 
Infoblox appliances
Infoblox appliancesInfoblox appliances
Infoblox appliances
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology Primer
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators Guide
 

Similaire à PAN PA2000 series

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Cisco asa firewall
Cisco asa firewallCisco asa firewall
Cisco asa firewallIT Tech
 
cisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfcisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfHi-Network.com
 
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsCisco Russia
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Michael Graves
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)subtitle
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileAliza Ayub
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileIqra Hameed
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 

Similaire à PAN PA2000 series (20)

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Hiveap300
Hiveap300Hiveap300
Hiveap300
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Cisco asa firewall
Cisco asa firewallCisco asa firewall
Cisco asa firewall
 
2500 controller
2500 controller2500 controller
2500 controller
 
cisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdfcisco-spa-1x10ge-l-v2-datasheet.pdf
cisco-spa-1x10ge-l-v2-datasheet.pdf
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010
 
Datasheet stonegate ips-allinone
Datasheet stonegate ips-allinoneDatasheet stonegate ips-allinone
Datasheet stonegate ips-allinone
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)
 
ICC icXchange Solution Brochure
ICC icXchange Solution BrochureICC icXchange Solution Brochure
ICC icXchange Solution Brochure
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 

Plus de Altaware, Inc.

Plus de Altaware, Inc. (13)

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS Comparison
 
Aerohive datasheet br200
Aerohive datasheet br200Aerohive datasheet br200
Aerohive datasheet br200
 
Juniper MAG Series
Juniper MAG SeriesJuniper MAG Series
Juniper MAG Series
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product Comparisons
 
SIP2 for ILS
SIP2 for ILSSIP2 for ILS
SIP2 for ILS
 
Aerohive AP 350
Aerohive AP 350Aerohive AP 350
Aerohive AP 350
 
Aerohive AP 330
Aerohive AP 330Aerohive AP 330
Aerohive AP 330
 
Aerohive AP 170
Aerohive AP 170Aerohive AP 170
Aerohive AP 170
 
Aerohive AP 120
Aerohive AP 120Aerohive AP 120
Aerohive AP 120
 
PAN Platform Summary
PAN Platform SummaryPAN Platform Summary
PAN Platform Summary
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12
 
PAN CIPA Requirements
PAN CIPA RequirementsPAN CIPA Requirements
PAN CIPA Requirements
 
Aw aerohive ap 330
Aw aerohive ap 330Aw aerohive ap 330
Aw aerohive ap 330
 

Dernier

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Dernier (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

PAN PA2000 series

  • 1. PA L O A LT O N E T W O R K S : PA - 2 0 0 0 S e r i e s S p e c s h e e t PA-2000 Series The PA-2000 Series is a next-generation firewall that delivers unprecedented PA-2020 PA-2050 visibility and control over applications, users and content on enterprise The Palo Alto NetworksTM PA-2000 Series is comprised of two networks. high performance platforms, the PA-2020 and the PA-2050, both of which are targeted at high speed Internet gateway APPLICATION IDENTIFICATION: deployments. The PA-2000 Series manages network traffic • Identifies more than 950 applications flows using dedicated processing and memory for networking, irrespective of port, protocol, SSL security, threat prevention and management. encryption or evasive tactic employed. • Enables positive enforcement A high speed backplane smoothes the pathway between dedicated processors, application usage policies: allow, deny, schedule, inspect, apply traffic shaping. and the separation of data and control plane ensures that management access • Graphical visibility tools enable simple is always available, irrespective of the traffic load. Interface density for the and intuitive view into application traffic. PA-2020 and the PA-2050 is unmatched with up to 20 traffic interfaces and dedicated out-of-band management interfaces. USER IDENTIFICATION: • Policy-based visibility and control over The controlling element of the PA-2000 Series next-generation firewalls is who is using the applications through PAN-OSTM, a security-specific operating system that tightly integrates three seamless integration with Active unique identification technologies: App-IDTM, User-ID and Content-ID, with Directory, LDAP, and eDirectory. key firewall, networking, VPN and management features. • Identifies Citrix and Microsoft Terminal Services users, enabling visibility and control over their respective application KEy PERFORmANCE SPECIFICATIONS PA-2020 PA-2050 usage. • Control non-Windows hosts via web- Firewall throughput 500 Mbps 1 Gbps Threat prevention throughput 200 Mbps 500 Mbps based authentication. IPSec VPN throughput 200 Mbps 300 Mbps CONTENT IDENTIFICATION: IPSec VPN tunnels/interfaces 1,000 2,000 • Block viruses, spyware, and vulnerability SSL VPN concurrent users 500 1,000 New sessions per second 15,000 15,000 exploits, limit unauthorized transfer of Max sessions 125,000 250,000 files and sensitive data such as CC# or SSN, and control non-work related web surfing. For a complete description of the PA-2000 Series feature set, please visit www. • Single pass software architecture paloaltonetworks.com/literature. enables multi-gigabit throughput with low latency while scanning content.
  • 2. PA L O A LT O N E T W O R K S : PA - 2 0 0 0 S e r i e s S p e c s h e e t Additional PA-2000 Series Specifications and Features APP-ID NETwORKINg • Identifies and controls more than 950 applications • Dynamic routing (BGP, OSPF and RIPv2) • SSL decryption (inbound and outbound) • Tap mode, virtual wire, layer 2, layer 3 • Customize application properties • Network address translation (NAT) • Custom HTTP and SSL applications - Source and destination address translation - Dynamic IP and port pool: 254 FIREwALL - Dynamic IP pool: 16,234 • Policy-based control by application, application category, • DHCP server/ DHCP relay: Up to 3 servers subcategory, technology, risk factor or characteristic • 802.1Q VLANs: 4,094 • Application function control • Policy-based forwarding • Fragmented packet protection • Point-to-Point Protocol over Ethernet (PPPoE) • Reconnaissance scan protection • IPv6 application visibility, control and full content inspection (Virtual • Denial of Service (DoS)/Distributed Denial of Services (DDoS) wire mode only) protection • Virtual routers: 10 • Maximum number of policies: (PA-2020) 2,500 (PA-2050) 5,000 • Security zones: 40 • Virtual systems (base/max): 1/6* USER-ID THREAT PREVENTION (SUbSCRIPTION REqUIRED) • Visibility and control by user, group and IP address • Active Directory, LDAP, eDirectory, Citrix and Microsoft Terminal • Detect and block application vulnerability exploits (IPS) Services • Stream-based protection against viruses, spyware and worms • XML API (external user repository integration) • HTML/Javascript virus protection • WMI and NetBios polling • Inspect compressed files that use the Deflate algorithm (Zip, Gzip, • Maximum concurrent user/IP mappings: 64,000 etc) • Custom vulnerability and spyware phone home signatures DATA FILTERINg • Content updates: daily (malware), weekly (vulnerability signatures), • Control unauthorized data transfer (social security numbers, credit emergency (all) card numbers, custom data patterns) qUALITy OF SERVICE (qOS) • Control unauthorized transfer of more than 50 file types • Policy-based traffic shaping by application, user, source, destination, URL FILTERINg (SUbSCRIPTION REqUIRED) interface, IPSec VPN tunnel and more • 76-category, 20M URL on-box database • 8 traffic classes with guaranteed, maximum and priority bandwidth • Custom 1M URL cache database (from 180M URL database) parameters • Custom block pages and URL categories • Real-time bandwidth monitor • Per policy diffserv marking IPSEC VPN (SITE-TO-SITE) mANAgEmENT TOOLS • Manual key, IKE v1 • 3DES, AES (128-bit, 192-bit, 256-bit) encryption • Integrated web interface • SHA1, MD5 authentication • Command line interface (CLI) • Role-based administration SSL VPN (REmOTE ACCESS) • Syslog and SNMPv2 • IPSec transport with SSL fall-back • Customizable administrator login banner • Enforce unique policies for SSL VPN traffic • XML-based REST API • Enable/disable split tunneling to control client access • Centralized management (Panorama) • LDAP, SecurID, or local DB authentication • Centrally manage PAN-OS and content updates (Panorama) • Client OS: Windows XP, Windows Vista (32 and 64 bit), Windows 7 (32 • Shared policies (Panorama) and 64 bit) VISIbILITy AND REPORTINg TOOLS HIgH AVAILAbILITy • Graphical summary of applications, URL categories, threats and data • Active/Passive failover (ACC) • Configuration and session synchronization • View, filter, export traffic, threat, URL, and data filtering logs • Heartbeat checking • Fully customizable reporting • Link and path failure monitoring • Trace session tool * Adding virtual systems to the base quantity requires a separately purchased license. PAGE 2
  • 3. PA L O A LT O N E T W O R K S : PA - 2 0 0 0 S e r i e s S p e c s h e e t HARDwARE SPECIFICATIONS PA-2050 PA-2020 I/O (16) 10/100/1000 + (4) SFP optical gigabit (PA-2050) (12) 10/100/1000 + (2) SFP optical gigabit (PA-2020) Management I/O ( 1) 10/100/1000 out-of-band management port, (1) RJ-45 console port Power supply (Avg/max power consumption) 175W/200W (105W/120W) Input voltage (Input frequency) 100-240Vac (50-60Hz) Power factor 0.65 to 0.70 (PA-2050, PA-2020) Max input current 70A@230Vac; 35A@115Vac Rack mountable (Dimensions) 1U, 19” standard rack (1.75”H x 17”D x 17”W) Safety UL, CUL, CB EMI FCC Class A, CE Class A, VCCI Class A, TUV MTBF 7.3 years (PA-2050, PA-2020) ENVIRONmENT Operating temperature 32° to 122° F, 0° to 50° C Non-operating temperature -4° to 158° F, -20° to 70° C ORDERINg INFORmATION PA-2050 PA-2020 Platform PAN-PA-2050 PAN-PA-2020 Annual threat prevention subscription PAN-PA-2050-TP PAN-PA-2020-TP Annual URL filtering subscription PAN-PA-2050-URL2 PAN-PA-2020-URL2 Virtual systems PAN-PA-2050-VSYS-5 PAN-PA-2020-VSYS-5 For additional Information on the PA-2000 Series software features, please visit www.paloaltonetworks.com/literature. Your Palo Alto Networks Reseller www.altaware.com sales@altaware.com (866) 833-4070 Palo Alto Networks Copyright ©2010, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice. 232 E. Java Drive Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update Sunnyvale, CA. 94089 information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this Sales 866.320.4788 publication without notice. PAN-OS 3.1, March 2010. 408.738.7700 840-000003-00B www.paloaltonetworks.com