Vulnerability Assessment Scanning and Penetration Testing by VSS, LLC.
Home


Search:


Palo Alto firewall PA-220 NEW GigE Model (Brand New Unopened) For Sale


Palo Alto firewall PA-220 NEW GigE Model (Brand New Unopened)

This item has been shown 0 times.

Buy Now

Palo Alto firewall PA-220 NEW GigE Model (Brand New Unopened):
$400

 

Log in  Get Support  EN [change]

PA-220

2 saves46673 views

Next-Generation Firewall in a Small Footprint

The PA-220 next-generation firewall safely enables applications and prevents modern cyber threats. Suitable for small organizations, branch offices and retail locations, the PA-220 desktop form factor brings you the same PAN-OS features that protect your largest data centers, including high availability with active/active and active/passive modes.

The PA-220 provides you interactive visibility and control of applications, users, and content at throughput speeds of up to 500 Mbps. You get redundant power input for increased reliability, a fanless design for quiet operation, and solid state disks to remove any moving parts. The PA-220 also simplifies the deployments of large numbers of firewalls through the USB port.

500 Mbps firewall throughput (App-ID enabled)150 Mbps threat prevention throughput100 Mbps IPSec VPN throughput64,000 max sessions4,200 new sessions per second1000 IPSec VPN tunnels/tunnel interfaces3 virtual routers15 security zones250 max number of policies

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses. Key Security Features: Classifies all applications, on all ports, all the time • Identifies the application, regardless of port, encryption (SSL or SSH) or evasive technique employed • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping • Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development Enforces security policies for any user, at any location • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, macOS™, Linux®, Android™ or Apple® iOS platforms • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix® • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions and any other source of user identity information Prevents known and unknown threats • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common evasion tactics employed • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection PA-220 The controlling element of the Palo Alto Networks® PA-220 is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time. Highlights • High availability with active/active and active/passive modes • Redundant power input for increased reliability • Fan-less design • Simplified deployments of large numbers of firewalls through USB Performance and Capacities1 Firewall throughput (App-ID enabled)2, 4 Threat prevention throughput3, 4 IPsec VPN throughput2, 4 New sessions per second5 PA-220 500 Mbps 150 Mbps 100 Mbps Max sessions 4,200 64,000 1 Performance and capacities are measured under ideal testing running PAN-OS 8.0 2 Firewall and IPsec VPN throughput are measured with App-ID and User-ID features enabled 3 Threat prevention throughput is measured with App-ID, User-ID, IPS, Antivirus and Anti-Spyware features enabled 4 Throughput is measured with 64Kb HTTP transactions 5 New sessions per second is measured with 4Kb HTTP transactions
Buy Now

Other Related Items:



Ubiquiti Networks Unifi Security Gateway Router With Gigabit Ethernet (usg) picture
Ubiquiti Networks Unifi Security Gateway Router With Gigabit Ethernet (usg)


Cujo Smart Internet Security Firewall - Nib picture
Cujo Smart Internet Security Firewall - Nib


Juniper Sa 700 Sa700 Vpn Secure Remote Access Appliance   picture
Juniper Sa 700 Sa700 Vpn Secure Remote Access Appliance


Fortinet Fortigate 200 Model Fortigate-200 Firewall Vpn Security Appliance picture
Fortinet Fortigate 200 Model Fortigate-200 Firewall Vpn Security Appliance


Cisco Systems Pix 515e Firewall -  picture
Cisco Systems Pix 515e Firewall -


Cisco Pix 515e Firewall 2-10/100 Ethernet Ports And Power Cord  picture
Cisco Pix 515e Firewall 2-10/100 Ethernet Ports And Power Cord


Zyxel Zywall Usg 200 Unified Security Gateway picture
Zyxel Zywall Usg 200 Unified Security Gateway


Nortel Networks Contivity 221s Vpn Router Eth 128 Bit Dm1401162 picture
Nortel Networks Contivity 221s Vpn Router Eth 128 Bit Dm1401162


General Instrument Jlc-7-450-2w Amlifier picture
General Instrument Jlc-7-450-2w Amlifier


Sonicwall Tz 215w Wireless Network Security Appliance  picture
Sonicwall Tz 215w Wireless Network Security Appliance



VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.