The Palo Alto Networks M-200 appliances are multi-function appliances that you can configure to function in Panorama Management mode, Panorama Management-only mode, Panorama Log Collector mode, or PAN-DB Private Cloud mode.
Palo Alto M-200 - Lab Unit - network management device - 10 GigE - 1U - rack-mountable (Voltage: AC 120/230 V (50 - 60 Hz))
- Network management device
Processor / Memory / Storage
Data Link Protocol:
- Ethernet, Fast Ethernet, Gigabit Ethernet, 10 Gigabit Ethernet
- Front to back airflow, reset button
- 4 (total) / 0 (free) x hot-swap
- 4 x 1000Base-T - RJ-45
- 1 x console - DB-9
- FCC Part 15, CISPR 32, EN 55032
- Internal power supply - hot-plug
- AC 120/230 V (50 - 60 Hz)
Power Consumption Operational:
Dimensions & Weight (Shipping)
Min Operating Temperature:
Max Operating Temperature:
Humidity Range Operating:
- Application Command Center (ACC)
Provides a visual summary of application, web, threat and data transfer activity displayed in a straightforward, easy to understand manner. Administrators can quickly learn more about the network activity by adding and removing filters in ACC with a click of the mouse.
Provides a comparative view of application activity (present vs. a past timeframe) across either multiple devices or a single device to help administrators pinpoint problematic network behavior.
- Policy-based application usage control
Using a policy editor with a familiar look and feel, administrators can develop, deploy and manage application usage control polices using a wide range of criteria such as: user and group, application, application category, application behavior or underlying technology.
- Shared policies
Deploy a set of global policies across a set of distributed firewalls. Local device administrators will be able to see these rules, but only a Panorama administrator can modify or remove them.
- Centralized update management
Customers can use Panorama to manage licenses and perform device or content updates.
- Application browser
Allows administrators to quickly research an application, its behavioral characteristics and underlying technology and then immediately translate the results into a security policy.
Detailed logs are collected locally, leveraging device storage and eliminating the requirement for centralized logging. Logs can be dynamically filtered on individual fields as well as through regular expressions.
More than 30 predefined reports can be used as is or modified and saved for future use. Reports can be exported to PDF and scheduled for email delivery.
No Reviews are available at this time