• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

PA-500

Prevent threats, safely enable applications

Consistent architecture for branch offices and midsize businesses

PA-500 next-generation firewall appliance helps secure branch offices and midsize businesses by preventing a broad range of cyberthreats while safely enabling applications.

Palo Alto has been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row. This year, we’re once again positioned highest in ability to execute as well as furthest in completeness of vision.

Learn more

Visibility, control and power to prevent network threats

The PA-500 next-generation firewall enables you to secure your organization through advanced visibility and control of applications, users and content at throughput speeds of up to 250 Mbps. Dedicated computing resources assigned to networking, security, signature matching and management functions ensure predictable performance.

 

Prevent attacks and grow with confidence

The PA-500 appliance secures your business with a prevention-focused architecture and integrated innovations that are easy to deploy and use – so you can cut risks and speed growth at the same time.

Classifies all applications, on all ports, all the time

The PA-500 appliance identifies the application, regardless of port, encryption (SSL or SSH) or evasive technique employed, and uses the application – not the port – as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. It also categorizes unidentified applications for policy control, threat forensics or App-ID™ technology development.

Enforces security policies for any user, at any location

The PA-500 lets you deploy consistent policies to local and remote users running on Windows®, macOS®, Linux®, Android®, or Apple® iOS platforms. You get agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®. And you can integrate your firewall policies easily with 802.1X wireless, proxies, network access control and other sources of user ID.

Learn what’s new

Prevents known and unknown threats

The PA-500 blocks a range of threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed. It limits the unauthorized transfer of files and sensitive data to safely enable non-work-related web surfing. It also identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection.

Learn more

The PA-500

PA-500

  • 250 Mbps firewall throughput
  • 100 Mbps Threat Prevention throughput
  • 50 Mbps IPsec VPN throughput
  • 64,000 max sessions
  • 7500 new sessions per second
  • 250 IPsec VPN tunnels/tunnel interfaces
  • 100 SSL VPN users
  • 3 virtual routers
  • 20 security zones
  • 1000 max number of policies

Request your Security Lifecycle Review

The SLR examines your network traffic and generates a comprehensive report unique to your organization to help you discover the applications and threats exposing vulnerabilities in your security posture. Request now

 

 

Are you ready to take the
Ultimate Test Drive?

If you're ready to take the test drive, pick the best time for you below!

All times are displayed in Pacific time.

Sorry, there are no Test Drives
scheduled at the moment


Visit the Test Drive page

  • Week 1
  • Week 2
  • Week 3
  • Week 4


Learn

RECOMMENDED
Link Visit

Link

Read Gartner Report

RECOMMENDED
Eye Read

Datasheet

PA-7000 Series Datasheet

RECOMMENDED
Eye Read

Datasheet

PA-5200 Series Datasheet

RECOMMENDED
Eye Read

Datasheet

PA-3200 Series Datasheet

RECOMMENDED
Eye Read

Datasheet

Product Summary Specsheet

RECOMMENDED
Eye Read

Datasheet

PA-800 Series Datasheet

RECOMMENDED
Link Visit

Link

Get Your Prevention Posture Assessment

RECOMMENDED
Eye Read

Datasheet

Firewall Feature Overview Datasheet

RECOMMENDED
Eye Read

Datasheet

PA-220R Datasheet

RECOMMENDED
Eye Read

Datasheet

PA-220 Datasheet

RECOMMENDED
Eye Read

Article

Next-Generation Firewalls - Product Selection


Evaluate

RECOMMENDED
Link Visit

Link

Security Lifecycle Review


Implement

RECOMMENDED
Link Visit

Link

Technical Documentation

RECOMMENDED
Link Visit

Link

Best Practices




Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved