Deploy the PA-4060, PA-4050, or the PA-4020 on your network to safely enable applications, users, and content at throughput speeds of up to 10 Gbps. Dedicated, function-specific processing is used for networking, security, content inspection, and management to deliver predictable firewall performance.

 

 

PA-4060

  • 10 Gbps firewall throughput (App-ID enabled1)
  • 5 Gbps threat prevention throughput
  • 2 Gbps IPSec VPN throughput
  • 2,000,000 max sessions
  • 60,000 new sessions per second
  • 4,000 IPSec VPN tunnels/tunnel interfaces
  • 10,000 SSL VPN Users 125 virtual routers
  • 125 virtual routers 
  • 25/125* virtual systems (base/max2)
  • 500 security zones
  • 20,000 max number of policies

PA-4050

  • 10 Gbps firewall throughput (App-ID enabled1)
  • 5 Gbps threat prevention throughput
  • 2 Gbps IPSec VPN throughput
  • 2,000,000 max sessions
  • 60,000 new sessions per second
  • 4,000 IPSec VPN tunnels/tunnel interfaces
  • 10,000 SSL VPN Users
  • 125 virtual routers
  • 25/125* virtual systems (base/max2)
  • 500 security zones
  • 20,000 max number of policies

PA-4020

  • 100,000 max sessions
  • 500 IPSec VPN tunnels/tunnel interfaces
  • 200 SSL VPN Users
  • 20 security zones
  • 2,000 max number of policies
  • 4,000 address objects
  • 1 Gbps Firewall Throughput (App-ID enabled)*
  • 600 Mbps Threat Prevention Throughput*
  • 250 Mbps IPSec VPN Throughput*
  • 8,000 New sessions per second*

 

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.
  • 2
  • 54415

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits
  • 4
  • 105347

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 85
  • 234178

What is a Zero Trust Architecture?

Businesses who want to prevent the exfiltration of sensitive data and improve their defense against modern cyber threats can consider a Zero Trust architecture.
  • 1
  • 36995

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.
  • 4
  • 79881

PA-5200 Series Datasheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances is comprised of the PA-5280, PA-5260, PA-5250 and PA-5220.
  • 21
  • 86655