PaloAlto PA-820
PaloAlto PA-820
Classifies all applications, on all ports, all the time
- Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
- Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
- Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development
Enforces security policies for any user, at any location
- Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms
- Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
- Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information
Prevents known and unknown threats
- Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
- Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
- Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.
The controlling element of the Palo Alto Networks® PA-800 Series appliances is PAN-OS® security operat- ing system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.
Specification
STT | Tính năng | Palo Alto PA-820 |
1 | Thông số kỹ thuật | |
Firewall Throughput | 1.6 Gbps | |
Threat Prevention throughput | 800 Mbps | |
IPSec VPN throughput | 1.2 Gbps | |
New sessions per second | 8300 | |
Maximum sessions | 128000 | |
Interfaces supported | (4) 10/100/1000, (8) SFP | |
Management I/O | (1) 10/100/1000 out-of-band management port (2) 10/100/1000 high availability (1) RJ-45 console port (1) USB (1) Micro USB console | |
Size | 1U, 19” standard rack (1.75” H x 14” D x 17.125” W) | |
Power Supply (Avg/Max Power Consumption) | One fixed AC 200 W power supply | |
Redundant Power Supply | No | |
Storage capacity | 240 GB SSD | |
Hot-swappable fans | No | |
Power Comsumption | Maximum: 120 W Average: 41 W | |
Max BTU/hr | 256 | |
Input Voltage (Input Frequency) | 100–240VAC (50–60 Hz) | |
Max Current Consumption | 1.0A @ 100VAC, 0.5A @ 240VAC (PA-820) | |
Max Inrush Current | 0.4A @ 230VAC, 0.96A @ 120VAC | |
Weight (Stand-Alone Device/ As Shipped) | 11 lbs / 18 lbs | |
Safety | cCSAus, CB | |
EMI | FCC Class A, CE Class A, VCCI Class A | |
Certifications | See https://www.paloaltonetworks.com/company/certifications.html | |
Enviroment | Operating temperature: 32° to 104° F, 0° to 40° C Non-operating temperature: -4° to 158° F, -20° to 70° C | |
Airflow | Front to back | |
2 | Network Feature | |
Interface mode | L2, L3, tap, virtual wire (transparent mode) | |
Routing | OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, static routing Policy-based forwarding Point-to-Point Protocol over Ethernet (PPPoE) Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3 | |
IPv6 | L2, L3, tap, virtual wire (transparent mode) Features: App-ID, User-ID, Content-ID, WildFire, and SSL decryption SLAAC | |
IPSec VPN | Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key, certificate-based authentication) Encryption: 3DES, AES (128-bit, 192-bit, 256-bit) Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512 | |
VLANs | 802.1Q VLAN tags per device/per interface: 4,094/4,094 | |
Network Address Translation | NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port (port address translation) NAT64, NPTv6 Additional NAT features: dynamic IP reservation, tunable dynamic IP and port oversubscription | |
High Availability | Active/Passive with no session synchronization Failure detection: path monitoring, interface monitoring |
Subscriptions
The following Palo Alto Networks subscriptions unlock certain firewall features or enable the firewall to
leverage a Palo Alto Networks cloud-delivered service (or both). Here you can read more about each service
or feature that requires a subscription to work with the firewall. To enable a subscription, you must first
Activate Subscription Licenses; once active, most subscription services can use Dynamic Content Updates
to provide new and updated functionality to the firewall.
Subscriptions You Can Use With the Firewall | |
Threat Prevention | Threat Prevention provides: • Antivirus, anti-spyware (command-and-control), and vulnerability protection. • Built-in external dynamic lists that you can use to secure your network against malicious hosts. • Ability to identify infected hosts that try to connect to malicious domains. • Get Started with Threat Prevention |
DNS Security | Provides enhanced DNS sinkholing capabilities by querying DNS Security, an extensible cloud-based service capable of generating DNS signatures using advanced predictive analytics and machine learning. This service provides full access to the continuously expanding DNS-based threat intelligence produced by Palo Alto Networks. To set up DNS Security, you must first purchase and install a Threat Prevention license. • Get Started with DNS Security |
URL Filtering | Provides the ability to not only control web-access, but how users interact with online content based on dynamic URL categories. You can also prevent credential theft by controlling the sites to which users can submit their corporate credentials. To set up URL Filtering, you must purchase and install a subscription for one of the supported URL filtering databases: PAN-DB or BrightCloud. With PAN-DB, you can set up access to the PAN-DB public cloud or to the PAN-DB private cloud. • Get Started with URL Filtering |
WildFire | Although basic WildFire® support is included as part of the Threat Prevention license, the WildFire subscription service provides enhanced services for organizations that require immediate coverage for threats, frequent WildFire signature updates, advanced file type forwarding (APK, PDF, Microsoft Office, and Java Applet), as well as the ability to upload files using the WildFire API. A WildFire subscription is also required if your firewalls will be forwarding files to an on-premise WF-500 appliance. • Get Started with WildFire |
AutoFocus | Provides a graphical analysis of firewall traffic logs and identifies potential risks to your network using threat intelligence from the AutoFocus portal. With an active license, you can also open an AutoFocus search based on logs recorded on the firewall. • Get Started with AutoFocus |
Cortex Data Lake Cortex Data Lake was previously called the Logging Service. The Customer Support Portal and firewall web interface both still reference the Logging Service in some places, including the device license name that’s displayed in the firewall web interface (Device > Licenses). |
Provides cloud-based, centralized log storage and aggregation. The Logging Service is required or highly-recommended to support several other cloud-delivered services, including Magnifier, GlobalProtect cloud service, and Traps management service. • Get Started with Cortex Data Lake |
GlobalProtect | Provides mobility solutions and/or large-scale VPN capabilities. By default, you can deploy GlobalProtect portals and gateways (without HIP checks) without a license. If you want to use advanced GlobalProtect features (HIP checks and related content updates, the GlobalProtect Mobile App, IPv6 connections, or a GlobalProtect Clientless VPN) you will need a GlobalProtect license (subscription) for each gateway. • Get Started with GlobalProtect |
Virtual Systems | This license is required to enable support for multiple virtual systems on PA-3200 Series firewalls. In addition, you must purchase a Virtual Systems license if you want to increase the number of virtual systems beyond the base number provided by default on PA-5200 Series, and PA-7000 Series firewalls (the base number varies by platform). The PA-800 Series, PA-220, and VM-Series firewalls do not support virtual systems. • Get Started with Virtual Systems |
Specs
System Performance
Firewall throughput | 1/1 Gbps |
Concurrent connections | 128,000 |
New connections/sec | 8,300 |
Threat Protection Throughput | 620/790 Mbps |
IPSec VPN throughput | 400 Mbps |
Physical interfaces
GE RJ45 Ports | (4) 10/100/1000 |
GE SFP Slots | (8) Gigabit SFP |
I/O ports | (1) 10/100/1000 out-of-band management port (2) 10/100/1000 high availability (1) RJ-45 console port (1) USB port (1) Micro USB console port |
Storage | 240 GB SSD |
Dimensions & Enviroment
Mounting | 1U, 19” standard rack (1.75” H x 14” D x 17.125” W) |
Dimensions Width x Depth x Height (inches) | 1.75”H x 14”D x 17.125”W |
Weight | 11 lbs / 18 lbs (Stand-Alone Device/As Shipped) |
Power supply | One fixed AC 200 W power supply |
Safety | cCSAus, CB |
Power Consumption | Maximum: PA-850: 240 W, PA-820: 120 W | Average: PA-850: 64 W, PA-820: 41 W |
Max BTU/hr | 256 |
Max Current Consumption | 1.0A @ 100VAC, 0.5A @ 240VAC |
EMI | FCC Class A, CE Class A, VCCI Class A |
Max Inrush Current | 0.4A @ 230VAC, 0.96A @ 120VAC |
Operating Temperature | 32° to 104° F, 0° to 40° C |
Non-operating temperature | -4° to 158° F, -20° to 70° C |
Certifications | See https://www.paloaltonetworks.com/company/certifications.html |
Airflow | Front to back |