Call 877.449.0458
Live Chat
Cart(0)
Account Sign Up Checkout Log In
 

Featured Brands
Manufacturers


EMC VNXe 3200 Series

Download App for IOS

Download Android App on Google Play



Fast Delivery: If in stock, we offer same day shipping when ordered before 3PM EST.
Document Library
Specifications
Firewall Throughput: 500 Mbps
Threat Prevention Throughput: 200 Mbps
IPSec VPN Throughput: 200 Mbps
Max. Sessions: 125,000
New Sessions Per Second: 15,000
IPSec VPN Tunnels/Tunnel Intf.: 1,000
SSL VPN Users: 500
Virtual Routers: 10
Virtual Systems (Base/Max): 1/6
Security Zones: 40
Max Number of Policies: 2,500
Give us a call at 877-449-0458
Palo Alto Networks
Palo Alto Networks PA-2020 Next-Gen Firewall - 500Mbps Throughput, Up to 500 SSL VPN Users
Palo Alto Networks PA-2020 Next-Gen Firewall - 500Mbps Throughput, Up to 500 SSL VPN Users 11655 Palo Alto Networks PA-2020 Next-Gen Firewall - 500Mbps Throughput, Up to 500 SSL VPN Users PAN-PA-2020
We ask that you provide as much information as possible with your request.
Request EOL Inventory Availability ►

Model: PAN-PA-2020

Condition: New

Overview: Palo Alto Networks PA-2020 Next-Gen Firewall - 500Mbps Throughput, Up to 500 SSL VPN UsersPalo Alto Networks
This product is no longer in production. Click below to view its replacement:
Palo Alto Networks - Palo Alto Networks PA-3020 Next-Gen Firewall - 2Gbps, Up to 1,000 SSL VPN Users - (Purchase of Support Contract Required)

The Palo Alto Networks® PA-2000 Series is comprised of the PA-2050 and the PA-2020, both of which are targeted at high speed internet gateway deployments. The PA-2000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management.

The controlling element of the PA-2000 Series is PAN-OS™, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. The application, content, and user—in other words, the business elements that run your business—are then used as the basis of your security policies resulting, in an improved security posture and a reduction in incident response time.

CLASSIFY ALL APPLICATIONS, ON ALL PORTS, ALL THE TIME WITH APP-ID™.

  • Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.
  • Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.
  • Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.

EXTEND SAFE APPLICATION ENABLEMENT POLICIES TO ANY USER, AT ANY LOCATION, WITH USER-ID™ AND GLOBALPROTECT™.

  • Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.
  • Easily integrate firewall policies with NAC, 802.1X wireless, Proxies and NAC solutions. 
  • Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.

PROTECT AGAINST ALL THREATS—BOTH KNOWN AND UNKNOWN—WITH CONTENT-ID™ AND WILDFIRE™. 

  • Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.
  • Limit unauthorized transfer of files and sensitive data, and control non work-related web surfing. 
  • Identify unknown malware, analyze it based on more than 230 malicious behaviors, then automatically create and deliver protection in the next content update.


Top of Page


best live chat