- General Information
- Manufacturer
- Palo Alto Networks
- Manufacturer Website Address
- http://www.paloaltonetworks.com
- Brand Name
- Palo Alto
- Product Series
- PA-400
- Packaged Quantity
- 1
- Product Type
- Network Security Appliance
PA-400 Series
The Palo Alto Networks PA-400 Series, comprising the PA-460, PA-450, PA-440, and PA-410, brings ML-Powered NGFW capabilities to distributed enterprise branch offices, retail locations, and midsize businesses.
The world's first ML-Powered Next-Generation Firewall (NGFW) enables you to prevent unknown threats, see and secure everything-including the Internet of Things (IoT)-and reduce errors with automatic policy recommendations.
The controlling element of the PA-400 Series is PAN-OS, the same software that runs all Palo Alto Networks NGFWs. PAN-OS® natively classifies all traffic, inclusive of applications, threats, and content, and then ties that traffic to the user regardless of location or device type. The application, content, and user-in other words, the elements that run your business-then serve as the basis of your security policies, resulting in improved security posture and reduced incident response times.
Key Security and Connectivity Features | ML-Powered Next-Generation Firewall
- Embeds machine learning (ML) in the core of the firewall to provide inline signatureless attack prevention for file-based attacks while identifying and immediately stopping never-before-seen phishing attempts.
- Leverages cloud-based ML processes to push zero-delay signatures and instructions back to the NGFW.
- Uses behavioral analysis to detect IoT devices and make policy recommendations as part of a cloud-delivered and natively integrated service on the NGFW.
- Automates policy recommendations that save time and reduce the chance of human error.
Identifies and categorizes all applications, on all ports, all the time, with full Layer 7 inspection
- Identifies the applications traversing your network irrespective of port, protocol, evasive techniques, or encryption (TLS/SSL).
- Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect, and apply traffic-shaping.
- Offers the ability to create custom App-ID™ tags for proprietary applications or request App-ID development for new applications from Palo Alto Networks.
- Identifies all payload data within an application (e.g., files and data patterns) to block malicious files and thwart exfiltration attempts.
- Creates standard and customized application usage reports, including software-as-a-service (SaaS) reports that provide insight into all sanctioned and unsanctioned SaaS traffic on your network.
- Enables safe migration of legacy Layer 4 rule sets to App-ID-based rules with built-in Policy Optimizer, giving you a rule set that is more secure and easier to manage.
- Technical Information
- Firewall Protection Supported
- Threat Protection
- IoT Security
- Application Firewall
- SSL Inspection
- URL Filtering
- DNS Security
- SaaS Security
- Intrusion Prevention
- Zero Day Event
- Secure IPsec VPN Connectivity
- Web Protection
- Firewall Throughput
- 1.70 Gbit/s
- Encryption Standard
- MD5
- AES (192-bit)
- AES (128-bit)
- AES (256-bit)
- 3DES
- SHA-384
- SHA-1
- SHA-256
- SHA-512
- SSL
- Interfaces/Ports
- Total Number of Ports
- 7
- USB
- Yes
- Number of Network (RJ-45) Ports
- 7
- Media & Performance
- VPN Throughput
- 115.20 MB/s
- Network & Communication
- Ethernet Technology
- Gigabit Ethernet
- Network Standard
- 10/100/1000Base-T
- Management & Protocols
- Manageable
- Yes
- Power Description
- Frequency
- 50 Hz
- 60 Hz
- Power Consumption
- 18 W
- Physical Characteristics
- Form Factor
- Desktop
- Height
- 1.6"
- Width
- 9.5"
- Depth
- 6.4"
- Weight (Approximate)
- 3.10 lb
- Miscellaneous
- Application/Usage
- Network
- Branch Office
- Business
- Enterprise
- Energy Star
- No