Межсетевой экран Palo Alto PA-3020
Почему нет цен?
Уточнить ценуГарантия до 5 лет
Диагностика перед отправкой
С нами выгодно и удобно!
- Поддержка персонального менеджера
- Партнёрские скидки до 70%
- Онлайн-кабинет гарантийного сервиса
Как купить?
Раз, два и все делаРассчитаем стоимость
Присылайте спецификацию для подбора и расчета стоимости оборудования
Привезём и подключим
Подключим и настроим оборудование в вашем офисе или ЦОДе
Характеристики
Отсрочка платежа
В зависимости от суммы поставляемого товара можем предоставить отсрочку платежа на срок от 5 до 90 дней. Условия отсрочки платежа рассматриваются индивидуально. Подробную информацию уточняйте у вашего менеджера.
Первый платеж
Второй платеж
Первый платеж
Второй платеж
Первый платеж
Второй платеж
Описание
The Palo Alto Networks PA-3000 Series is comprised of three high performance platforms, the PA-3060, the PA-3050 and the PA-3020, which are targeted at high-speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management.
The controlling element of the PA-3000 Series is PAN-OS, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. The application, content, and user—in other words, the business elements that run your business—are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.
Quick Specs
Table 1 shows the Quick Specs.
Part number | PAN-PA-3020 |
Description | Palo Alto Networks PA-3020, Security appliance, GigE, 1U, rack-mountable |
Firewall throughput (App-ID enabled) | 2 Gbps |
Threat prevention throughput | 1 Gbps |
IPSec VPN throughput | 500 Mbps |
New sessions per second | 50,000 |
Max sessions | 250,000 |
IPSec VPN tunnels/tunnel interfaces | 1,000 |
GlobalProtect (SSL VPN) concurrent users | 1,000 |
Product Details
Security Features1.Application Visibility
Port numbers, protocols, and IP addresses are useful for network devices, but they tell you nothing about what is on your network. Detailed information about the applications, users, and content traversing your network empowers you to quickly determine any risks they pose and quickly respond. Leveraging the rich context provided by Palo Alto Networks firewalls, our visualization, analysis, and reporting tools let you quickly learn more about activity on your network and analyze incidents from a current or comparative perspective.
An integral component for secure application enablement policies.
Traditionally, security policies were applied based on IP addresses, but the increasingly dynamic nature of users and applications mean that IP addresses alone have become ineffective as a policy control element for safe application enablement.
3.Antivirus
Network-based Malware Protection.
The broadening use of social media, messaging and other non-work-related applications introduce a variety of vectors for viruses, spyware, worms and other types of malwares. Palo Alto Networks next-generation firewalls allow you to block unwanted applications with App-ID, and then scan allowed applications for malware.
4.Data Filtering & File Blocking
The application function level control, file blocking by type, and data filtering features of our next-generation firewalls allow you to implement a range of policies that help balance permitting the use of personal or non-work-related applications, with the business and security risks of unauthorized file and data transfer.
5.Modern Malware Protection
WildFire: Protection from targeted and unknown threats.
Modern attackers are increasingly using targeted and new unknown variants of malware to sneak past traditional security solutions. To address this, Palo Alto Networks developed WildFire, which identifies new malware in minutes. By executing suspect files in a virtual environment and observing their behavior, Palo Alto Networks identifies malware quickly and accurately, even if the malware sample has never been seen before. Once a file is deemed malicious, WildFire automatically generates protections that are delivered to all WildFire subscribers within an hour of detection. A WildFire license provides your IT team with a wealth of forensics to see exactly who was targeted, the application used in the delivery, and any URLs that were part of the attack.
Compare to Similar Items
Table 2 shows the comparison.
Model | PAN-PA-3020 | ||
Firewall throughput (App-ID enabled) | 2 Gbps | 4 Gbps | 4 Gbps |
Threat prevention throughput | 1 Gbps | 2 Gbps | 2 Gbps |
IPSec VPN throughput | 500 Mbps | 500 Mbps | 500 Mbps |
New sessions per second | 50,000 | 50,000 | 50,000 |
Max sessions | 250,000 | 500,000 | 500,000 |
IPSec VPN tunnels/tunnel interfaces | 1,000 | 2,000 | 2,000 |
GlobalProtect (SSL VPN) concurrent users | 1,000 | 2,000 | 2,000 |
SSL inbound certificates | 25 | 25 | 25 |
Virtual routers | 10 | 10 | 10 |
Virtual systems (base/max) | 1/6 | 1/6 | 1/6 |
Security zones | 40 | 40 | 40 |
Max. number of policies | 2,500 | 5,000 | 5,000 |
подбор оборудования
до 90 дней