See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

PA-200

Prevent threats, enable applications

Next-generation firewall in a small footprint

The PA-200 is a next-generation firewall appliance in a small form factor that secures networks by preventing a broad range of cyberthreats while safely enabling applications.

Palo Alto has been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row. This year, we’re once again positioned highest in ability to execute as well as furthest in completeness of vision.

Learn more

Consistent architecture, compact implementation

The PA-200 desktop form factor brings the same PAN-OS® features that protect your largest data centers – including high availability with active/active and active/passive modes – to small organizations or distributed branch offices. It provides interactive visibility and granular control of applications, users and content at throughput speeds up to 100 Mbps.



Classifies all applications, on all ports, all the time

The PA-200 identifies any application, regardless of port, encryption (SSL or SSH) or evasive technique employed, and uses the application – not the port – as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. It also categorizes unidentified applications for policy control, threat forensics or custom App-ID development.

Enforces security policies for any user, at any location

The PA-200 lets you deploy consistent policies to local and remote users running on Windows®, macOS®, Linux, Android® or Apple® iOS platforms. You get agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®, and you can integrate your firewall policies easily with 802.1X wireless, proxies, network access control and other sources of user identity.

Prevents known and unknown threats

The PA-200 blocks a range of threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed. It limits the unauthorized transfer of files and sensitive data to safely enable non-work-related web surfing. It also identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection.

The PA-200

PA-200

  • 100 Mbps firewall throughput
  • 50 Mbps Threat Prevention throughput
  • 50 Mbps IPsec VPN throughput
  • 64,000 max sessions
  • 1,000 new sessions per second
  • 25 IPsec VPN tunnels/tunnel interfaces
  • 25 SSL VPN users
  • 10 security zones
  • 250 max number of policies

Request your Security Lifecycle Review

The SLR examines your network traffic and generates a comprehensive report unique to your organization to help you discover the applications and threats exposing vulnerabilities in your security posture. Request now

 

 

Are you ready to take the
Ultimate Test Drive?

If you're ready to take the test drive, pick the best time for you below!

All times are displayed in Pacific time.

Sorry, there are no Test Drives
scheduled at the moment


Visit the Test Drive page

  • Week 1
  • Week 2
  • Week 3
  • Week 4


Learn

RECOMMENDED
Visit

Link

Read Gartner Report

RECOMMENDED
Read

Datasheet

PA-7000 Series Datasheet

RECOMMENDED
Read

Datasheet

PA-5200 Series Datasheet

RECOMMENDED
Read

Datasheet

PA-5000 Series Datasheet

RECOMMENDED
Read

Datasheet

PA-3200 Series Datasheet

RECOMMENDED
Read

Datasheet

PA-3000 Series Datasheet

RECOMMENDED
Read

Datasheet

PA-800 Series Datasheet

RECOMMENDED
Read

Datasheet

PA-500 Datasheet

RECOMMENDED
Read

Datasheet

PA-220R Datasheet

RECOMMENDED
Read

Datasheet

PA-220 Datasheet

RECOMMENDED
Read

Datasheet

PA-200 Datasheet

RECOMMENDED
Read

Datasheet

Product Summary Specsheet

RECOMMENDED
Read

Article

Next-Generation Firewalls - Product Selection

RECOMMENDED
Read

Datasheet

Firewall Feature Overview Datasheet

RECOMMENDED
Read

White Paper

Actionable Security Intelligence

RECOMMENDED
Visit

Link

Get Your Prevention Posture Assessment


Evaluate

RECOMMENDED
Visit

Link

Security Lifecycle Review


Implement

RECOMMENDED
Visit

Link

Technical Documentation

RECOMMENDED
Visit

Link

Best Practices

Start simplifying
enterprise security

As a member you'll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.