Palo Alto Networks PA-3430 - Security appliance - 40GbE, 100GbE, 5GbE, 2.5GbE, 25GbE - front to back airflow - 1U - rack-mountable
- Brand
- PALO ALTO
- Product code
- PAN-PA-3430
- SKU
- IDH4TLGNJ7W13
- NGFW driven by machine learning
- Best score on the "Security Effectiveness" criterion in the NSS Labs 2019 NGFW test report, with 100% of bypasses blocked
- Extension of visibility and security to all devices, including unmanaged IoT devices, without deployment of additional sensors
- High availability with active/active and active/passive modes
- Predictable performance thanks to security services
- Simplified deployment of a large number of firewalls with Zero Touch Provisioning (ZTP)
- Centralized administration with Panorama network security management
Description
Centralized management and visibility
Centralized management, configuration and visibility for a multitude of distributed Palo Alto Networks NGFWs (regardless of location and scope) within a unified Panorama user interface. Simplified configuration sharing in Panorama using templates and device groups, and scalable log collection as requirements grow. Application Command Center (ACC) for in-depth visibility and comprehensive information on network traffic and threats.
Next-generation firewall driven by machine learning
Integrating machine learning (ML) into the firewall's DNA to provide inline, signature-free prevention against file-based attacks, while immediately identifying and blocking as-yet-unknown phishing attempts. Leverage cloud-based ML processes to instantly send signatures and instructions back to the NGFW. Automate policy recommendations to save time and reduce the risk of human error.
Identify and categorize all applications, on all ports, at any time, and fully inspect the L7 layer
Identification of applications traversing your network, regardless of port, protocol, bypass techniques or encryption (TLS/SSL), automatic discovery and securing of new applications to keep pace with the SaaS explosion, thanks to SaaS Security service subscription. Use the application, not the port, as the basis for all your secure activation and authorization policies (allow, deny, schedule, inspect, prioritize traffic, etc.). Ability to create custom App-ID tags for proprietary applications, or ask Palo Alto Networks to develop an App-ID for new applications. Identification of all payloads in the application (files, data models, etc.) to block malicious files and thwart data exfiltration attempts. Creation of standard and customized application usage reports (including SaaS applications) to provide an overview of all authorized and unauthorized SaaS traffic on your network. Integrated Policy Optimizer functionality for secure migration of existing L4-layer rules to App-ID-based rules, resulting in a more secure and manageable set of rules.
Enhanced user security, regardless of location or device, while adapting policies to user activity
Visibility, security policies, reporting and forensic analysis on users and groups, not just IP addresses. Simple integration with a wide range of repositories to leverage user information (wireless LAN controllers, VPNs, directory servers, SIEMs, proxies, etc.). Definition of DUGs (Dynamic User Groups) on the firewall to trigger rapid security actions without waiting for changes to be made to user directories. Application of consistent policies regardless of user location (office, home, travel, etc.) and devices used (iOS and Android mobile devices, macOS, Windows, Linux desktops, laptops, Citrix and Microsoft VDI, terminal servers, etc.). Multi-factor authentication (MFA) can be activated on the network layer, for any application and without any modification to it, to prevent corporate credentials from being entered on third-party websites and stolen credentials from being reused. Dynamic, behavior-based security actions to neutralize suspicious or malicious users. Authentication and authorization of user access, regardless of login location and identity store location, to accelerate the adoption of Zero Trust policies thanks to Cloud Identity Engine, a revolutionary cloud architecture optimizing identity-based security.
Block malicious activity hidden in encrypted traffic
Inspection and policy enforcement of encrypted inbound and outbound TLS/SSL traffic, as well as traffic using TLS 1.3 or HTTP/2. In-depth visibility of TLS traffic (amount of encrypted traffic, TLS/SSL versions, cipher suites, etc.) without decryption. Reduce risk by controlling the use of older TLS protocol versions, insecure cipher suites and misconfigured certificates. Simple deployment of decryption and use of integrated logs to resolve problems (e.g. certificates pinned to applications). Flexibly enable or disable decryption based on multiple criteria (URL category, source and destination zone, address, user, user group, device, port, etc.) for privacy and regulatory compliance. Possibility of creating a copy of decrypted traffic from the firewall (in other words, mirroring the decryption) and sending it to traffic collection tools for forensic analysis, historical retention or data loss prevention (DLP). Intelligent forwarding of all traffic (encrypted TLS, unencrypted TLS and non-TLS) to third-party security tools using Network Packet Broker functionality to optimize network performance and reduce operating expenses.
Maximize security investments and avoid disruption with AIOps
Recommendations tailored to each deployment strategy to reinforce the company's security posture and maximize security investments with AIOps for NGFW. Intelligent prediction of firewall health, performance and capacity issues based on ML tools powered by advanced telemetry data. Actionable information to help resolve anticipated disruptions.
Enable SD-WAN functionality
Easy adoption of SD-WAN by simple activation in your existing firewalls. SD-WAN natively integrated with security solution for secure deployment. Reduced latency, jitter and packet loss for exceptional user experiences.
Unique approach to packet processing via single-pass architecture
All threat- and content-related functions (network analysis, policy verification, application analysis and decryption, signature matching, etc.) are performed in a single pass. The result is a considerable reduction in the processor power required to run multiple functions on the same security appliance. Flow-based signature matching to analyze all signature traffic in a single pass, avoiding latency. Consistent, predictable performance when security services are activated.
| General | |
|---|---|
| Device type | Security appliance |
| Height (Rack Units) | 1U |
| Width | 43.6 cm |
| Depth | 35.9 cm |
| Height | 4.32 cm |
| Weight | 7 kg |
| Processor / Memory / Storage | |
| Hard Drive | SSD 480 GB x 1 |
| Networking | |
| Form factor | Rack-mountable |
| Airflow direction | Front to back airflow |
| Connectivity technology | Wired |
| Data Link Protocol | Gigabit Ethernet, 10 Gigabit Ethernet, 40 Gigabit Ethernet, 100 Gigabit Ethernet, 5 Gigabit Ethernet, 2.5 Gigabit Ethernet, 25 Gigabit Ethernet |
| Network / Transport Protocol | IPSec, PPPoE, IPv4 |
| Routing Protocol | RIP, BGP, IGMPv2, IGMP, OSPFv2, PIM-SM, static IP routing, IGMPv3, OSPFv3, PIM-SSM, Bidirectional Forwarding Detection (BFD) |
| Performance | Firewall throughput (HTTP):25.5 Gbps Firewall throughput (appmix):20.5 Gbps Threat prevention throughput (HTTP):9.2 Gbps Threat prevention throughput (appmix):10.5 Gbps VPN throughput (IPSec):12.2 Gbps |
| Capacity | Maximum number of sessions:2500000 New sessions per second:240000 Virtual systems (base):1 Virtual systems (maximum):11 VLAN tags per device:4094 VLAN tags per interface:4094 |
| Features | Firewall protection, VLAN support, Zero-touch provisioning (ZTP), policy based forwarding, SD-WAN support, Layer 7 Deep Packet Inspection (DPI), 5G Security, 5G MEC (multi-access edge computing) Security, GTP Security, SCTP Security, ML-Powered Next-Generation Firewall |
| Encryption Algorithm | Triple DES, MD5, SHA-1, 128-bit AES, 192-bit AES, 256-bit AES, IKEv2, IKEv1, SHA-256, SHA-384, SHA-512 |
| Compliant Standards | IEEE 802.1Q, IEEE 802.3ad (LACP) |
| Expansion / Connectivity | |
| Interfaces | 12 x 1/2.5/5/10GBase-T - RJ-45 10 x 1Gb Ethernet/10Gb Ethernet - SFP/SFP+ 4 x 25Gb Ethernet - SFP28 2 x 40Gb Ethernet/100Gb Ethernet - QSFP+/QSFP28 1 x 1000Base-T (management) - RJ-45 1 x 10Gb Ethernet (HA) - SFP+ 2 x 1000Base-T (HA) - RJ-45 1 x console - RJ-45 1 x management (USB) - micro-USB |
| Miscellaneous | |
| MTBF | 22 years |
| Compliant Standards | FCC Class A certified, CB, cTUVus, VCCI Class A |
| Power | |
| Power Device | Internal power supply - hot-plug |
| Installed Qty | 2 |
| Max Supported Qty | 2 |
| Power Redundancy | Yes |
| Voltage Required | AC 100-240 V |
| Power Consumption Operational | 155 Watt |
| Power Provided | 450 Watt |
| Software / System Requirements | |
| OS Provided | PAN-OS |
| Dimensions & Weight (Shipping) | |
| Shipping Weight | 11.3 kg |
| Manufacturer Warranty | |
| Service & Support | Limited warranty - 1 year |
| Environmental Parameters | |
| Min Operating Temperature | 0 °C |
| Max Operating Temperature | 50 °C |
| Humidity Range Operating | 10 - 90% |