Description
Palo Alto 3200 Specifications:
- Manufacturer: Palo Alto
- Brand: Palo Alto Networks
- Product Line: Palo Alto Networks
- Model: PA-3200 series
Interface Modes
- L2, L3, tap, virtual wire (transparent mode)
Routing
- OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, static routing
- Policy-based forwarding
- Point-to-point protocol over Ethernet (PPPoE)
- Multicast: PIM-SM, PIM-SSM, IGMP v1, v2 and v3
SD-WAN
- Path quality measurement (jitter, packet loss, latency)
- Initial path selection (PBF)
- Dynamic path change
IPv6
- L2, L3,tap, virtual Wire (transparent mode)
- Features: App-ID™, User-ID™, Content-ID™, WildFire® and SSL decryption
- SLAAC
IPsec VPN
- Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key,certificate-based authentication)
- Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)
- Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512
VLANs
- 802.1q VLAN tags per device/per interface: 4,094/4,094
- Aggregate interfaces (802.3ad), LACP
Network Address Translation
- NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port (port address translation)
- NAT64, NPTv6
Additional NAT features:
- dynamic IP reservation, tunable dynamic
- IP and port oversubscription
High Availability
- Modes: active/active, active/passive
- Failure detection: path monitoring, interface monitoring
Palo Alto 3200 Series Security Features:
Classifies all applications, on all ports, all the time
- Identifies the application, regardless of port, encryp[1]tion (SSL or SSH) or evasive technique employed.
- Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping.
- Categorizes unidentified applications for policy control, threat forensics or App-ID™ technology development
Enforces security policies for any user, at any location
- Deploys consistent policies to local and remote users running on Windows®, Mac® OS X®, macOS®, Linux, Android®, or Apple® iOS platforms.
- Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell®eDirectory™ and Citrix®.
- Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions and any other source of user identity information.
Prevents known and unknown threats
- Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed.
- Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing.
- Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then
- automatically creates and delivers protection