Call 877.449.0458
Live Chat
Cart(0)
Account Sign Up Checkout Log In
 

Featured Brands
Manufacturers


Cisco Meraki MR52 Access Points

Download App for IOS

Download Android App on Google Play



Fast Delivery: If in stock, we offer same day shipping when ordered before 3PM EST.
Document Library
Specifications
Firewall Throughput: 2 Gbps
Threat Prevention Throughput: 1 Gbps
IPSec VPN Throughput: 500 Mbps
Max. Sessions: 250,000
New Sessions Per Second: 50,000
IPSec VPN Tunnels/Tunnel Intf.: 1,000
SSL VPN Users: 1,000
Virtual Routers: 10
Virtual Systems (Base/Max): 1/6
Security Zones: 40
Max Number of Policies: 2,500
Give us a call at 877-449-0458
Palo Alto Networks
Palo Alto Networks PA-3020 Next-Gen Firewall Bundle w/3 Years Standard Support, URL Filtering & Threat Prevention Subscription
Palo Alto Networks PA-3020 Next-Gen Firewall Bundle w/3 Years Standard Support, URL Filtering & Threat Prevention Subscription 14077 Palo Alto Networks PA-3020 Next-Gen Firewall Bundle w/3 Years Standard Support, URL Filtering & Threat Prevention Subscription PAN-PA-3020-BDL3
Corporate Armor Price:
US Shipments Only
$31,470.00
Qty.
VeriSign® Secured

Model: PAN-PA-3020-BDL3

Overview: Palo Alto Networks PA-3020 Next-Gen Firewall - 2Gbps Throughput, Up to 1,000 SSL VPN Users - Includes Standard Support, URL Filtering Subscription & Threat Prevention Subscription for 3 YearsPalo Alto Networks
Request a Demo

The Palo Alto Networks® PA-3000 Series is comprised of the PA-3060, the PA-3050 and the PA-3020, all of which are targeted at high speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management.

The controlling element of the PA-3000 Series is PAN-OS™, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. The application, content, and user—in other words, the business elements that run your business—are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.

CLASSIFY ALL APPLICATIONS, ON ALL PORTS, ALL THE TIME WITH APP-ID™.

  • Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.
  • Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.
  • Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.

EXTEND SAFE APPLICATION ENABLEMENT POLICIES TO ANY USER, AT ANY LOCATION, WITH USER-ID™ AND GLOBALPROTECT™.

  • Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.
  • Easily integrate firewall policies with NAC, 802.1X wireless, Proxies and NAC solutions. 
  • Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.

PROTECT AGAINST ALL THREATS—BOTH KNOWN AND UNKNOWN—WITH CONTENT-ID™ AND WILDFIRE™. 

  • Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.
  • Limit unauthorized transfer of files and sensitive data, and control non work-related web surfing. 
  • Identify unknown malware, analyze it based on more than 230 malicious behaviors, then automatically create and deliver protection in the next content update.


Top of Page


best live chat