*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM

Similar documents
Configuring PA Firewalls for a Layer 3 Deployment

About the VM-Series Firewall

Chapter 3 LAN Configuration

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X

VMware vcloud Air Networking Guide

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Implementing Cisco IOS Network Security

Creating a VPN with overlapping subnets

Configuring Global Protect SSL VPN with a user-defined port

About the VM-Series Firewall

PAN-OS Syslog Integration

Fortinet Network Security NSE4 test questions and answers:

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Availability Digest. Redundant Load Balancing for High Availability July 2013

IINS Implementing Cisco Network Security 3.0 (IINS)

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

PassGuide.PCNSE6 (48Q)

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Source-Connect Network Configuration Last updated May 2009

WildFire Cloud File Analysis

Security. TestOut Modules

Managing Enterprise Security with Cisco Security Manager

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Implementing Core Cisco ASA Security (SASAC)

Securing Networks with PIX and ASA

Cisco AnyConnect Secure Mobility Solution Guide

*TKtr *W4>K. Government of India itwm mitm Ministry of Labour & Employment W T HSlPT&llem. Directorate General of Mines Safety TENDER NOTICE

Cisco Certified Security Professional (CCSP)

Securing Networks with Cisco Routers and Switches ( )

Unified Services Routers

Check Point taps the power of virtualization to simplify security for private clouds

Network Configuration Settings

Set Up the VM-Series Firewall in AWS

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

icrosoft TMG Replacement with NetScaler

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Datasheet. Managed PoE+ Gigabit Switches with SFP. Models: ES-8-150W, ES W, ES W, ES W, ES W, ES W

Datasheet. Managed Gigabit Fiber Switch. Model: ES-12F. Non-Blocking Throughput Switching. High Performance and Low Latency

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Polycom. RealPresence Ready Firewall Traversal Tips

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

Unified Services Routers

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Datasheet. Managed Gigabit Switches with SFP. Models: ES-24-Lite, ES-48-Lite. Non-Blocking Throughput Switching Performance

NETASQ MIGRATING FROM V8 TO V9

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Next Generation Network Firewall

GB-OS Version 6.2. Configuring IPv6. Tel: Fax Web:

vcloud Director User's Guide

LAN TCP/IP and DHCP Setup

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Configuring the Transparent or Routed Firewall

BorderWare Firewall Server 7.1. Release Notes

Configuring Windows Server 2008 Network Infrastructure

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring GlobalProtect Tech Note PAN-OS 4.1

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

ETSF10 Part 3 Lect 2

Gigabit SSL VPN Security Router

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

Using IPsec VPN to provide communication between offices

NETASQ ACTIVE DIRECTORY INTEGRATION

Cisco ASA, PIX, and FWSM Firewall Handbook

AC 750. Wireless Dual Band ADSL2+ Modem Router. Highlights

Wireless Controller DWC-1000

McAfee NGFW Installation Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

WildFire Cloud File Analysis

How To Configure L2TP VPN Connection for MAC OS X client

Fortinet Certified Network Security Administrator

Use Domain Name System and IP Version 6

Chapter 11 Cloud Application Development

Gigabit Content Security Router

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

Certificate Management

Network Load Balancing

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Chapter 8 Router and Network Management

DIR-806A. Wireless AC750 Multi-Function Router. DUAL BAND Simultaneous operation in 5GHz band and 2.4GHz band, a/b/g/n/ac compatible

Fireware Essentials Exam Study Guide

McAfee Next Generation Firewall (NGFW) Administration Course

Web Interface Reference Guide Version 6.1

Savvius Insight Initial Configuration

Chapter 4 Customizing Your Network Settings

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

How To Orchestrate The Clouddusing Network With Andn

Cisco RV215W Wireless-N VPN Router

Transcription:

PA-3020 PA-850 PA-820 Feature Performance *Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM models please refer to hypervisor, cloud specific data sheet for associated performance App-ID firewall throughput 2 Gbps 1.9 Gbps 940 Mbps Threat prevention throughput 1 Gbps 780 Mbps 610 Mbps IPSec VPN throughput 500 Mbps 500 Mbps 400 Mbps Connections per second 50,000 9,500 8,300 Sessions Max sessions (IPv4 or IPv6) 250,000 197,000 130,000 Policies Security rules 2,500 1,500 1,500 Security rule schedules 256 256 256 NAT rules 3,000 3,000 3,000 Decryption rules 250 150 100 App override rules 250 100 100 QoS rules 1,000 250 100 Tunnel content inspection rules 500 250 100 Policy based forwarding rules 500 250 100 Captive portal rules 1,000 250 100 DoS protection rules 1,000 250 100 Security Zones Max security zones 40 40 30 Objects (addresses and services) Address objects 5,000 3,500 2,500 Address groups 500 350 250 Members per address group 2,500 2,500 2,500 Service objects 1,000 1,000 1,000 Service groups 250 250 250

Members per service group 500 500 500 FQDN address objects 2,000 2,000 2,000 Max IP addresses registered per system *Applies to IP addresses registered to dynamic address groups 5,000 2,500 1,000 Tags per IP address 32 32 32 Security Profiles Security profiles 150 150 100 App-ID Custom App-ID signatures 6,000 6,000 6,000 Shared custom App-IDs 512 512 512 Custom App-IDs (virtual system specific) 6,416 6,416 6,416 User-ID User-IP mappings (management plane) 512,000 512,000 512,000 User-IP mappings (data plane) 64,000 128,000 128,000 Active and unique groups used in policy 1,000 1,000 1,000 Number of agents 100 100 100 Monitored servers per agent 100 100 100 Maximum terminal services agents 400 400 400 SSL Decryption Max SSL inbound certificates 25 25 25 SSL certificate cache (forward proxy) 128 128 128 Max concurrent decryption sessions 7,936 19,200 12,800 URL Filtering Total entries for allow list, block list and custom categories 25,000 25,000 25,000 Max custom categories 2,849 2,849 2,849 Max custom categories (virtual system specific) 500 500 500 Dataplane cache size for URL filtering 20,000 10,000 10,000 Management plane dynamic cache size 1,000,000 1,000,000 1,000,000 Interfaces Mgmt - out-of-band 10/100/ 1000, RJ45 console Mgmt - 10/100/1000 high availability 2 2 2 null null

Mgmt - 40Gbps high availability NA NA NA Traffic - 10/100/1000 12 4 4 Traffic - 100/1000/10000 NA NA NA Traffic - 1Gbps SFP 8 4/8 8 Traffic - 10Gbps SFP+ NA 0/4 NA Traffic - 10Gbps XFP NA NA NA Traffic - 40Gbps QSFP NA NA NA 802.1q tags per device 4,094 4,094 4,094 802.1q tags per physical interface 4,094 4,094 4,094 Max interfaces (logical and physical) 1,024 1,024 1,024 Maximum aggregate interfaces 8 6 6 Virtual Routers Virtual routers 10 5 5 Virtual Wires Virtual wires 512 512 512 Virtual Systems Base virtual systems 1 1 1 Max virtual systems *Additional licenses are required for virtual system capacities above the base virtual systems capacity Routing IPv4 forwarding table size *Entries shared across virtual routers IPv6 forwarding table size *Entries shared across virtual routers 6 NA NA 2,500 5,000 5,000 2,500 5,000 5,000 System total forwarding table size 5,000 10,000 10,000 Max route maps per virtual router 50 50 50 Max routing peers (protocol dependent) 500 1,000 1,000 Static entries - DNS proxy 1,024 1,024 1,024 Bidirectional Forwarding Detection (BFD) Sessions 512 NA NA L2 Forwarding ARP table size per device 3,000 3,000 3,000 IPv6 neighbor table size 3,000 3,000 3,000 MAC table size per device 3,000 3,000 3,000 Max ARP entries per broadcast domain 3,000 3,000 3,000

Max MAC entries per broadcast domain 3,000 3,000 3,000 NAT Total NAT rule capacity 3,000 3,000 3,000 Max NAT rules (static) *Configuring static NAT rules to full capacity requires that no other NAT rule types are used. Max NAT rules (DIP) *Configuring DIP NAT rules to full capacity requires that no other NAT rule types are used. 3,000 3,000 3,000 2,000 3,000 3,000 Max NAT rules (DIPP) 400 3,000 3,000 Max translated IPs (DIP) 128,000 3,000 3,000 Max translated IPs (DIPP) *DIPP translated IP capacity is proportional to the DIPP pool oversubscription value. The capacity shown here is based on an oversubscription value of 1x. Default DIPP pool oversubscription *Source IP and source port reuse across concurrent sessions Address Assignment 800 400 400 2 2 2 DHCP servers 10 5 5 Max number of assigned addresses 64,000 64,000 64,000 High Availability Devices per cluster 2 2 2 Max virtual addresses 64 48 48 QoS Number of QoS policies 1,000 500 250 Physical interfaces supporting QoS 6 12 12 Clear text nodes per physical interface 31 31 31 DSCP marking by policy Yes Yes Yes Subinterfaces supported System limit System Limit IPSec VPN System Limit Site to site 3,000 2,000 2,000 Max IKE Peers 2,000 1,000 1,000 GlobalProtect Client VPN Max tunnels (SSL, IPSec, and IKE with XAUTH) 1,000 1,000 1,000

GlobalProtect Clientless VPN Max SSL tunnels 250 250 250 Multicast Replication (egress interfaces) 100 200 200 Routes 2,000 1,500 1,500 Product Notes End-of-sale NA NA NA