Description
Palo Alto 7000 Series Specifications:
- Manufacturer: Palo Alto
- Brand: Palo Alto Networks
- Product Line: Palo Alto Networks
- Model: PA-7000 series
- Interface Modes: L2, L3, tap, virtual wire (transparent mode)
- Routing: OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, static routing
Policy-based forwarding
Point-to-point protocol over Ethernet (PPPoE) and DHCP supported for dynamic address assignment
Bidirectional Forwarding Detection (BFD) - Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3
- SD-WAN: Path quality measurement (jitter, packet loss, latency)
Initial path selection (PBF)
Dynamic path change - IPv6: L2, L3, tap, virtual wire (transparent mode)
- Features: App-ID, User-ID, Content-ID, WildFire, and SSL Decryption
SLAAc - IPsec VPN Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key, certificate-based authentication)
- Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)
- Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512
GlobalProtect large-scale VPN for simplified configuration and management - VLANs: 802.1Q VLAN tags per device/per interface: 4,094/4,094
Aggregate interfaces (802.3ad) intra-card and/or inter-card, and LACP - NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port (port address translation)
NAT64, NPTv6 - Additional NAT features: dynamic IP reservation, tunable dynamic IP and port oversubscription
- High Availability Modes: active/active, active/passive, HA clustering
- Failure detection: path monitoring, interface monitoring
Palo Alto 7000 Series Key Security Features:
Classifies all applications, on all ports, all the time
- Identifies the application, regardless of port, encryp[1]tion (SSL or SSH), or evasive technique employed. • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping.
- Categorizes unidentified applications for policy control, threat forensics or App-ID™ development.
Enforces security policies for any user, at any location
- Deploys consistent policies to local and remote users running on the Windows®, MacOS™, Linux®, Android®, or Apple® iOS platforms.
- Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®.
- Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information.
Prevents known and unknown threats
- Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed.
- Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing.
- Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection.
- Threat prevention throughput is measured with App-ID, User-ID, IPS, antivirus, anti-spyware and Disable Server Response Inspection(DSRI) features enabled
- Throughput is measured with 64Kb HTTP transactions
- Connections per second is measured with 4Kb HTTP transactions