มี Firewall ให้เช่า รวมทั้งไว้ spare ระหว่างซ่อม


Call center



Paloaltonetworks PA-500
Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500 Paloaltonetworks PA-500

Paloaltonetworks PA-500

รหัสสินค้า: PAN-PA-500-2GB

สถานะของสินค้า : สินค้าพร้อมส่ง

0 บาท


Paloaltonetworks PA-500

จำแนกได้ทุก application, ทุก port, เเละตลอดเวลา

  • 1.  สามารถระบุ application โดยไม่คำนึงถึง port, การเข้ารหัส (SSL หรือ SSH), หรือใช้เทคนิคการหลีกเลี่ยงหลบ port
  • 2. ใช้ application, ไม่ใช้ port เป็นพื้นฐานสำหรับการตัดสินใจสำหรับ policy ให้ใช้งานง่ายๆ เเละมั่นคงปลอดภัยทั้งหมดไม่ว่าจะทำ: allow, deny, schedule, inspect หรือ traffic-shaping
  • 3. Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development
  • 4. จัดหมวดหมู่ application ที่ไม่สามารถระบุได้สำหรับ control policy, threat forensics, App-ID™ หรือการพัฒนา App-ID™ เองที่ customize ตาม user

ใช้ security policies ได้ ไม่ว่าจะ user เเบบไหนก็ได้, หรืออยู่ที่ใดก็ได้ในโลก

  • 1. ติดตั้ง policy สำหรับ local user เเละ remote users ซึ่ง support ทั้ง Windows®, Mac® OS X®, Linux®, Android®, หรือ Apple® iOS platforms
  • 2. ไม่ต้องมี agentless ไปลงเครือง Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ เเละ Citrix®
  • 3. ติดตั้งง่ายๆ ตั้ง policy ไม่ว่าจะ 802.1X wireless, proxies, NAC solutions, หรือไม่ว่าจาก source อะไรก็ได้ที่สามารถระบุ user information ได้

ป้องกัน known เเละ unknown threats

  • 1. Blocks ได้ทั้ง known threats, การ exploits ช่องโหว่, malware เเละ spyware, ครอบคลุมทุก port, ไม่ว่าจะเจอ threat ที่สามารถหลบหลีก port ก็ยังสามารถป้องกันได้
  • 2. ป้องกันไม่ให้ผู้ที่ไม่ได้รับอนุญาตส่ง files เเละ data ที่สำคัญ, เเละ เปิด web ที่ไม่เกี่ยวกับงาน
  • 3. สามารถระบุ unknown malware, โดยวิเคราะห์จาก malicious behaviors, หลังจากนั้นก็จะสร้างการ protection ได้อย่างอัตโนมัติ

Palo Alto Networks® PA-500 มี OS ชื่อว่า PAN-OS® security, ซึ่งสามารถเเยกทุก traffic ได้, รวมถึง applications, threats เเละ content, โดยพิจารณาจาก location หรือ ประเภทของ device, application, content เเละ user กล่าวอีกนัยหนึ่งองค์ประกอบทางธุรกิจที่ดำเนินธุรกิจจะถูกใช้เป็นพื้นฐานของนโยบายความปลอดภัยของคุณซึ่งจะส่งผลให้ท่าทางการรักษาความปลอดภัยดีขึ้นและลดเวลาในการตอบสนองต่อเหตุการณ์


  • 1. High availability ได้ทั้ง mode active/active เเละ active/passive
  • 2. Redundant power
  • 3. ออกเเบบ ไม่มีพัดลม (Fan-less design) เพื่อเพิ่มอายุการใช้งานอุปกรณ์
  • 4. ติดตั้งง่ายๆ โดยเอา configure จาก USB


Security Features

  • Application Visibility
    Port numbers, protocols, and IP addresses are useful for network devices, but they tell you nothing about what is on your network. Detailed information about the applications, users, and content traversing your network empowers you to quickly determine any risks they pose and quickly respond. Leveraging the rich context provided by Palo Alto Networks firewalls, our visualization, analysis, and reporting tools let you quickly learn more about activity on your network and analyze incidents from a current or comparative perspective.
  • User Visibility - An integral component for secure application enablement policies.
    Traditionally, security policies were applied based on IP addresses, but the increasingly dynamic nature of users and applications mean that IP addresses alone have become ineffective as a policy control element for safe application enablement. Our next-generation firewalls integrate with a wide range of enterprise directories and terminal services offerings, allowing you to:
    • See who is using the applications on your network
    • Set policy based on users
    • Perform forensic analysis and generate reports on user activities
  • AntiVirus - Network-based Malware Protection.
    The broadening use of social media, messaging and other non-work related applications introduce a variety of vectors for viruses, spyware, worms and other types of malware. Palo Alto Networks next-generation firewalls allow you to block unwanted applications with App-ID, and then scan allowed applications for malware.
  • IPS
    Today's attacks on your network use a combination of application vectors and exploits. Palo Alto Networks next-generation firewalls arm you with a two-pronged approach to stopping these attacks. Unwanted applications are blocked through App-ID, and the applications you choose to allow through are scanned for vulnerability exploits by our NSS-approved IPS engine.
  • Data Filtering & File Blocking
    The application function level control, file blocking by type, and data filtering features of our next-generation firewalls allow you to implement a range of policies that help balance permitting the use of personal or non-work related applications, with the business and security risks of unauthorized file and data transfer.
  • Modern Malware Protection - WildFire: Protection from targeted and unknown threats.
    Modern attackers are increasingly using targeted and new unknown variants of malware to sneak past traditional security solutions. To address this, Palo Alto Networks developed WildFire, which identifies new malware in minutes. By executing suspect files in a virtual environment and observing their behavior, Palo Alto Networks identifies malware quickly and accurately, even if the malware sample has never been seen before. Once a file is deemed malicious, WildFire automatically generates protections that are delivered to all WildFire subscribers within an hour of detection. A WildFire license provides your IT team with a wealth of forensics to see exactly who was targeted, the application used in the delivery, and any URLs that were part of the attack.
  • URL Filtering - Control Web Activity with URL Filtering.
    The perfect complement to the policy-based application control provided by App-ID is our on-box URL filtering database, which gives you total control over related web activity. By addressing your lack of visibility and control from both an application and web perspective, App-ID and URL Filtering together protect you from a full spectrum of legal, regulatory, productivity, and resource utilization risks.
  • Mobile Security
    Mobile computing is one of the most disruptive forces in information technology. It is revolutionizing how and where employees work, as well as the tools they use to perform their jobs. Mobile devices are not just ways to access existing applications such as corporate email, but the platform for opening up entirely new ways of doing business. Make sure that you have the proper security to extend your business applications and data to smartphones, tablets and laptops. Learn how to safely enable mobile devices by using GlobalProtect from Palo Alto Networks.

Networking Features

  • Decryption - Identify & Control Encrypted Traffic.
    Take control of your SSL and SSH encrypted traffic and ensure it is not being used to conceal unwanted activity or dangerous content. Using policy-based decryption and inspection, you can confirm that SSL and SSH are being used for business purposes only, instead of to spread threats or unauthorized data transfer.
  • IPv6 - Safely enabling applications, users and content in IPv6 environments.
    Our next-generation firewalls allow you to deploy consistent, safe application enablement policies across IPv6, IPv4 and mixed environments.
  • Networking
    Our flexible networking architecture includes dynamic routing, switching, and VPN connectivity, which enables you to easily deploy Palo Alto Networks next-generation firewalls into nearly any networking environment.
  • VPN - Standards-based VPN Connectivity.
    Secure site-to-site and remote user connectivity is a critical infrastructure component. Every Palo Alto Networks next-generation firewall platform allows you to easily and securely communicate between sites using standards-based IPSec VPN connections. Remote user communications are protected through a rich set of VPN features.
  • Virtualization Security
    The VM-Series supports the exact same next-generation firewall and advanced threat prevention features available in our physical form factor appliances, allowing you to safely enable applications flowing into, and across your private, public and hybrid cloud computing environments. Automation features and an API enable you to dynamically update security policies as your VM environment changes, eliminating potential security lag. The VM-Series supports the following hypervisors: VMWare ESXi and NSX, Citrix SDX, KVM (Centos/RHEL), Ubuntu, Amazon Web Services.

Management Features

  • Centralized Management
    The centralized management features in Panorama will minimize the administrative efforts and operational costs associated with your deployment of our next-generation firewalls in multiple locations – either internally or globally. Panorama allows your team to centrally manage all device aspects including configuration and policy deployment, visibility into applications, users and content as well as logging and reporting.
  • Device Management
    Our firewall management philosophy is to make administrative tasks such as report generation, log queries, policy creation, and ACC browsing easy to execute and consistent, no matter which mechanism - web interface, Panorama, CLI or API - you use.
  • Policy Control - Secure Application Enablement.
    The increased visibility into applications, users and content delivered by Palo Alto Networks simplifies figuring out which applications are traversing your network, who is using them, and the potential security risks. Armed with this data, you can apply secure enablement policies with a range of responses that are more finely tuned than the traditional 'allow or deny' approach.
  • Redundancy
    Palo Alto Networks next-generation firewalls support a series of redundancy and resiliency features that ensure your firewall will continue to provide the secure application enablement you need to keep your business running.
  • Virtual Systems - Scalable Firewall Services With Virtual Systems.
    Virtual systems are unique and distinct next-generation firewall instances within a single Palo Alto Networks firewall. Instead of deploying many individual firewalls, security service providers and enterprises can deploy a single pair of firewalls (high availability) and enable a series of virtual firewall instances (virtual systems). Each virtual system is an independent (virtual) firewall within your firewall that is managed separately and cannot be accessed or viewed by other users.

Technical Specifications:

PA-500 Front View

Performance and Capacities Specifications
Firewall throughput 250 Mbps
Threat prevention throughput 100 Mbps
IPSec VPN throughput 50 Mbps
New sessions per second 7,500
Max sessions 64,000
SSL decrypt sessions 1,000
IPSec VPN tunnels/tunnel interfaces 250
GlobalProtect (SSL VPN) concurrent users 100
SSL decrypt sessions 1,000
SSL inbound certificates 25
Virtual routers 3
Security zones 20
Max. number of policies 1,000
Hardware Specifications
I/O (8) 10/100/1000
Management I/O (1) 10/100/1000 out-of-band management port, (1) RJ-45 console port
Storage Capacity 160GB SSD
Power Supply (Avg/Max Power Consumpiton) 180W (40W/75W)
Max BTU/HR 256
Input Voltage (Input Frequency) 100-240VAC (50-60Hz)
Max Current Consumption [email protected]
Mean Time Between Failure (MTBF) 10.16 years
Max Inrush Current [email protected]; [email protected]
Rack Mountable 1U, 19" standard rack
Dimensions 1.75"H x 10"D x 17"W
Weight (Stand alone device/as shipped) 8lbs/13lbs
Safety UL, CUL, CB
EMI FCC Class A, CE Class A, VCCI Class A, TUV
Certifications FIPS 140 Level 2, ICSA, UCAPL
Operating temperature 32° to 122° F, 0° to 50° C
Non-operating temperature -4° to 158° F, -20° to 70° C

Networking Specifications:

Interface Modes
  • L2, L3, Tap, Virtual wire (transparent mode)


  • Modes: OSPF, RIP, BGP, Static
  • Forwarding table size (entries per device/per VR): 1,250/1,250
  • Policy-based forwarding
  • Point-to-Point Protocol over Ethernet (PPPoE)
  • Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3


  • Active/Passive with no session synchronization
  • Failure detection: Path monitoring, Interface monitoring

Address Assignment

  • Address assignment for device: DHCP Client/PPPoE/Static
  • Address assignment for users: DHCP Server/DHCP Relay/Static


  • Features: L2, L3, Tap, Virtual Wire (transparent mode)
  • Services: App-ID, User-ID, Content-ID, WildFire and SSL Decryption


  • 802.1q VLAN tags per device/per interface: 4,094/4,094
  • Max interfaces: 250
  • Aggregate interfaces (802.3ad)


  • Max NAT rules: 125
  • Max NAT rules (DIPP): 125
  • Dynamic IP and port pool: 254
  • Dynamic IP pool: 16,234
  • NAT Modes: 1:1 NAT, n:n NAT, m:n NAT
  • DIPP oversubscription (Unique destination IPs per source port and IP): 1
  • NAT64

Virtual Wire

  • Max virtual wires: 125
  • Interface types mapped to virtual wires: physical and subinterfaces

L2 Forwarding

  • ARP table size/device: 500
  • MAC table size/device: 500
  • IPv6 neighbor table size: 500

Security Specifications:

  • Policy-based control over applications, users and content
  • Fragmented packet protection
  • Reconnaissance scan protection
  • Denial of Service (DoS)/Distributed Denial of Services (DDoS) protection
  • Decryption: SSL (inbound and outbound), SSH


  • Identify and analyze targeted and unknown files for more than 100 malicious behaviors
  • Generate and automatically deliver protection for newly discovered malware via signature updates
  • Signature update delivery in less than 1 hour, integrated logging/reporting; access to WildFire API for programmatic submission of up to 100 samples per day and up to 1,000 report queries by file hash per day (Subscription Required)

File and Data Filtering

  • File transfer: Bi-directional control over more than 60 unique file types
  • Data transfer: Bi-directional control over unauthorized transfer of CC# and SSN
  • Drive-by download protection

User Integration (User-ID)

  • Microsoft Active Directory, Novell eDirectory, Sun One and other LDAP-based directories
  • Microsoft Windows Server 2003/2008/2008r2, Microsoft Exchange Server 2003/2007/2010
  • Microsoft Terminal Services, Citrix XenApp
  • XML API to facilitate integration with non-standard user repositories

IPSEC VPN (Site-To-Site)

  • Key Exchange: Manual key, IKE v1
  • Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)
  • Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512
  • Dynamic VPN tunnel creation (GlobalProtect)
Threat Prevention (Subscription Required)
  • Application, operating system vulnerability exploit protection
  • Stream-based protection against viruses (including those embedded in HTML, Javascript, PDF and compressed), spyware, worms
URL Filtering (Subscription Required)
  • Pre-defined and custom URL categories
  • Device cache for most recently accessed URLs
  • URL category as part of match criteria for security policies
  • Browse time information

Quality of Service (QOS)

  • Policy-based traffic shaping by application, user, source, destination, interface, IPSec VPN tunnel and more
  • 8 traffic classes with guaranteed, maximum and priority bandwidth parameters
  • Real-time bandwidth monitor
  • Per policy diffserv marking
  • Physical interfaces supported for QoS: 4

SSL VPN/Remote Access (GlobalProtect)

  • GlobalProtect Gateway
  • GlobalProtect Portal
  • Transport: IPSec with SSL fall-back
  • Authentication: LDAP, SecurID, or local DB
  • Client OS: Mac OS X 10.6, 10.7 (32/64 bit), 10.8 (32/64 bit), Windows XP, Windows Vista (32/64 bit), Windows 7 (32/64 bit)
  • Third party client support: Apple iOS, Android 4.0 and greater, VPNC IPSec for Linux

Management, Reporting, Visibility Tools

  • Integrated web interface, CLI or central management (Panorama)
  • Multi-language user interface
  • Syslog, Netflow v9 and SNMP v2/v3
  • XML-based REST API
  • Graphical summary of applications, URL categories, threats and data (ACC)
  • View, filter and export traffic, threat, WildFire, URL, and data filtering logs
  • Fully customizable reporting


คุณกำลังรีวิว: Paloaltonetworks PA-500

คุณจะให้คะแนนสินค้านี้อย่างไร? *

  1 2 3 4 5