Firewall Appliance

Our range of products include paloalto 7080 series firewall.

Paloalto 7080 Series Firewall

Request Callback

₹ 1000000 / Piece Get Latest Price

Product Brochure
Firewall throughput100 Gbps
Firewall IMIX Throughput1000 Mbps
Users supported3001+ users
VPN throughput20 Gbps
Firewall typeData center
WAN ports10+ ports
Concurrent VPN tunnels1000+ tunnels
Firewall throughput (HTTP/appmix)2600/700 Gbps
Threat Prevention throughput (DSRI enabled)3610 Gbps
Threat Prevention throughput (HTTP/appmix)4270/330 Gbps
IPsec VPN throughput5280 Gbps
New sessions per second64.56M
Max sessions320M
Virtual systems (base/max)725/225
100G-NPC (PA-7000-100G-NPC-A)SFP/SFP+ (80), QSFP+/QSFP28 (40)
20G-NPC XM Option 1: (PA-7000-20GQXM-NPC)QSFP+ (20), SFP+ (120)
20G-NPC XM Option 2: (PA-7000-20GXM-NPC)10/100/1000 (120), SFP (80), SFP+ (40)
Management I/O (second generation)SFP MGT (2), SFP HA1 (2), HSCI HA2/HA3 QSFP+/QSFP28 (2), RJ45 serial console (1), Micro USB serial c
Storage capacity (second generation)240 GB SSD system drive, RAID1 (2)
Storage options (first generation)120 GB SSD system drive (1), 1 TB default or 2 TB optional HDD on LPC, RAID1 (4)
SafetycTUVus, cCSAus, CB
EMIFCC Class A, CE Class A, VCCI Class A
CertificationsNEBS Level 3

Minimum order quantity: 1 Piece

Palo Alto Networks PA-7000 Series ML-Powered Next-Generation Firewalls enable enterprise-scale organizations and service providers to deploy security in high-performance environments, such as large data centers and high-bandwidth network perimeters. Designed to handle growing throughput needs for application-, user-, and device-generated data, these systems offer amazing performance, prevention capabilities to stop the most advanced cyberattacks, and high-throughput decryption to stop threats hiding under the veil of encryption. Built to maximize security-processing resource utilization and automatically scale as new computing power becomes available, the PA-7000 Series offers simplicity defined by a single-system approach to management and licensing.

Key Security Features:
Classifies all applications, on all ports, all the time:
  • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed. 
  • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping.
  • Categorizes unidentified applications for policy control, threat forensics or App-ID™ development.

Enforces security policies for any user, at any location:
  • Deploys consistent policies to local and remote users running on the Windows®, MacOS™, Linux®, Android®, or Apple® iOS platforms. 
  • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®. 
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information.
Extends native protection across all attack vectors with cloud-delivered security subscriptions
  • Threat Prevention—inspects all traffic to automatically block known vulnerabilities, malware, vulnerability exploits, spyware, command and control (C2), and custom intrusion prevention system (IPS) signatures.
  • WildFire® malware prevention—protects against unknown file-based threats, delivering automated prevention in seconds for most new threats across networks, endpoints, and clouds.
  • URL Filtering—prevents access to malicious sites and protects users against web-based threats. • DNS Security—detects and blocks known and unknown threats over DNS while predictive analytics disrupt attacks using DNS for C2 or data theft.
  • IoT Security—discovers all unmanaged devices in your network, identifies risks and vulnerabilities, and automates enforcement policies for your ML-Powered NGFW using a new Device-ID™ policy construct.
X

Contact Us

Jyoti Rohilla (Manager)
Vee Pee Infomatric Private Limited
8/2, Laxmi Nagar, East Guru Angad Nagar
New Delhi - 110092, Delhi, India

Get Directions
Send Email
Share: