PA-5000 SERIES

Prevent threats, safely enable applications

No-compromise security, high-performance versatility

PA-5000 Series next-generation firewalls combine high throughput, advanced visibility and granular control to secure a wide range of organizations and deployments.

One consistent architecture, many applications.

PA-5000 Series next-generation firewalls prevent threats across a broad range of environments, including internet gateways, data centers, service provider ecosystems and more. All models are based on the same architectural foundation as our other next-generation firewalls. The PA-5000 Series safely enables applications, users and content at throughput speeds of up to 20 Gbps. Dedicated processing resources assigned to networking, security, signature matching and management functions ensure predictable performance.

 

PA-5060

  • 20 Gbps firewall throughput (App-ID enabled1)
  • 10 Gbps threat prevention throughput
  • 4 Gbps IPSec VPN throughput
  • 4,000,000 max sessions
  • 120,000 new sessions per second
  • 8,000 IPSec VPN tunnels/tunnel interfaces
  • 20,000 SSL VPN Users
  • 225 virtual routers
  • 25/225 virtual systems (base/max2)
  • 900 security zones
  • 40,000 max number of policies

PA-5050

  • 10 Gbps firewall throughput (App-ID enabled1)
  • 5 Gbps threat prevention throughput
  • 4 Gbps IPSec VPN throughput
  • 2,000,000 max sessions
  • 120,000 new sessions per second
  • 4,000 IPSec VPN tunnels/tunnel interfaces
  • 10,000 SSL VPN Users
  • 125 virtual routers
  • 25/125 virtual systems (base/max2)
  • 500 security zones
  • 20,000 max number of policies

PA-5020

  • 5 Gbps firewall throughput (App-ID enabled1)
  • 2 Gbps threat prevention throughput
  • 2 Gbps IPSec VPN throughput
  • 1,000,000 max sessions
  • 120,000 new sessions per second
  • 2,000 IPSec VPN tunnels/tunnel interfaces
  • 5,000 SSL VPN Users
  • 20 virtual routers
  • 10/20 virtual systems (base/max2)
  • 80 security zones
  • 10,000 max number of policies

1. Adding virtual systems over base quantity requires a separately purchased license

 

Request your Security Lifecycle Review (SLR)

The SLR examines your network traffic and generates a comprehensive report unique to your organization to help you discover the applications and threats exposing vulnerabilities in your security posture. Request now

 

 

Are you ready to take the
Ultimate Test Drive?

If you're ready to take the test drive, pick the best time for you below!

All times are displayed in Pacific time.


Learn


Evaluate


Implement