10-14+ Days This item will be shipped directly from the manufacturer. Leadtime to shipment will be a minimum of 10-14 working days. Call for further shipping details.
-
(888) 912-3151
or
E-Mail
Brand:
Palo Alto Networks
MPN:
PAN-PA-5260-AC-OSS
Condition:
new
Returnable:
This Product Has Limited Exchange Privileges. For support on this product, please contact @ .
Palo Alto Networks PA-5200 Series of firewall appliances is comprised of the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway, and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.
FCC Class A certified, VCCI Class A ITE, CB, IEC 60950-1, cCSAus
Power
Power Device:
Internal power supply
Installed Qty:
2
Max Supported Qty:
2
Power Redundancy:
Yes
Voltage Required:
AC 120/230 V (50/60 Hz)
Power Consumption Operational:
870 Watt
Power Provided:
1200 Watt
Software / System Requirements
OS Provided:
PAN-OS
Environmental Parameters
Min Operating Temperature:
32 °F
Max Operating Temperature:
122 °F
Classifies all applications, on all ports, all the time It identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed. It uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. It also categorizes unidentified applications for policy control, threat forensics or App-ID application identification technology development.
Enforces security policies for any user, at any location It deploys consistent policies to local and remote users running on the Windows; Apple Mac OS X, macOS and iOS; Linux; and Android platforms. It enables agentless integration with Microsoft Active Directory and Terminal Services, LDAP, Novell eDirectory and Citrix. It also easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information.
Prevents known and unknown threats It blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed. It also limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing. It identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection.