Call 704.583.9973
Live Chat
Account Sign Up Checkout Log In

Featured Brands


Download App for IOS

Download Android App on Google Play

Fast Delivery: If in stock, we offer same day shipping when ordered before 3PM EST.
Document Library
Firewall Throughput: 500 Mbps
Threat Prevention Throughput: 150 Mbps
IPSec VPN Throughput: 100 Mbps
Max. Sessions: 64,000
New Sessions Per Second: 4,200
IPSec VPN Tunnels/Tunnel Intf.: 250
Virtual Routers: 3
Security Zones: 15
Max Number of Policies: 250
Give us a call at 877-449-0458
Palo Alto Networks
Palo Alto Networks PA-220 PAN-DB URL Filtering subscription for 3 years
Palo Alto Networks PA-220 PAN-DB URL Filtering subscription for 3 years 16010 Palo Alto Networks PA-220 PAN-DB URL Filtering subscription for 3 years PAN-PA-220-URL4-3YR
We ask that you provide as much information as possible with your request.
Request Quote 4 Hour Response

Model: PAN-PA-220-URL4-3YR

Condition: New

Overview: Palo Alto Networks PA-220 PAN-DB URL Filtering subscription for 3 yearsPalo Alto Networks
Request a Demo

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.

The controlling element of the Palo Alto Networks® PA-220 is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.


  • High availability with active/active and active/passive modes
  • Redundant power input for increased reliability
  • Fan-less design 
  • Simplified deployments of large numbers of firewalls through USB

Key Security Features:

Classifies all applications, on all ports, all the time

  • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
  • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
  • Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development

Enforces security policies for any user, at any location

  • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms
  • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information

Prevents known and unknown threats

  • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
  • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
  • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection

Top of Page

best live chat