Business
Palo Alto Networks PA-5410 (Voltage: AC 100-240 V (50/60 Hz)) main image
Roll over main image to zoom in. Click to open expanded view.
Palo Alto Networks PA-5410 (Voltage: AC 100-240 V (50/60 Hz)) - Image 1: Main

Palo Alto Networks PA-5410 - Security appliance - 40GbE, 100GbE, 25GbE, 5GbE, 2.5GbE - front to back airflow - 2U - rack-mountable (Voltage: AC 100-240 V (50/60 Hz))

Price:  

For pricing or to order this product:

Call our Sales Representatives

Mon-Fri 8am-6:30pm CST

E-Mail

Answer within 2 hours

Availability: 

10-14+ Days
This item will be shipped directly from the manufacturer.
Leadtime to shipment will be a minimum of 10-14 working days.
Call for further shipping details. - (888) 912-3151 or E-Mail

Brand: 

Palo Alto Networks

MPN: 

PAN-PA-5410-AC

Condition: 

new

Returnable: 

Yes

Marketing description is not available.
Palo Alto Networks PA-5410 - Security appliance - 40GbE, 100GbE, 25GbE, 5GbE, 2.5GbE - front to back airflow - 2U - rack-mountable (Voltage: AC 100-240 V (50/60 Hz))
General
Device Type:
  • Security appliance
Height (Rack Units):
  • 2U
Width:
  • 17.3 in
Depth:
  • 22.5 in
Height:
  • 3.4 in
Weight:
  • 35.27 lbs
Processor / Memory / Storage
Hard Drive:
  • SSD 480 GB x 2
Networking
Form Factor:
  • Rack-mountable
Airflow Direction:
  • Front to back airflow
Connectivity Technology:
  • Wired
Data Link Protocol:
  • Gigabit Ethernet, 10 Gigabit Ethernet, 40 Gigabit Ethernet, 100 Gigabit Ethernet, 25 Gigabit Ethernet, 5 Gigabit Ethernet, 2.5 Gigabit Ethernet
Network / Transport Protocol:
  • IPSec, PPPoE, DHCP, IPv4, IPv6
Routing Protocol:
  • BGP, static IP routing, Bidirectional Forwarding Detection (BFD), IGMP, IGMPv2, IGMPv3, OSPFv2, OSPFv3, PIM-SM, PIM-SSM, RIP
Performance:
  • Firewall throughput (HTTP): 45.2 Gbps
  • Firewall throughput (appmix): 36.7 Gbps
  • Threat prevention throughput (HTTP): 23.5 Gbps
  • Threat prevention throughput (appmix): 22 Gbps
  • VPN throughput (IPSec): 21 Gbps
Capacity:
  • Maximum number of sessions: 4100000
  • New sessions per second: 246000
  • VLAN tags per device: 4094
  • VLAN tags per interface: 4094
  • Virtual systems (base): 10
  • Virtual systems (maximum): 20
Features:
  • Policy based forwarding, DHCP support, NAT support, VLAN support, 5G Security, 5G MEC (multi-access edge computing) Security, GTP Security, SCTP Security, ML-Powered Next-Generation Firewall, IPv6 support
Encryption Algorithm:
  • 128-bit AES, 192-bit AES, 256-bit AES, IKEv1, IKEv2, MD5, SHA-1, SHA-256, SHA-384, SHA-512, Triple DES
Authentication Method:
  • Secure Shell (SSH)
Compliant Standards:
  • IEEE 802.1Q, IEEE 802.3ad (LACP), IEEE 802.1x
Expansion / Connectivity
Interfaces:
  • 8 x 1/2.5/5/10GBase-T - RJ-45
  • 10 x 1Gb Ethernet/10Gb Ethernet - SFP/SFP+
  • 4 x 25Gb Ethernet - SFP28
  • 2 x 40Gb Ethernet/100Gb Ethernet - QSFP+/QSFP28
  • 1 x 1000Base-X (management) - SFP
  • 1 x 40Gb Ethernet (High Availability) - QSFP+
  • 2 x 1 Gigabit Ethernet (High Availability) - SFP
  • 1 x console - RJ-45
  • 1 x management (USB) - micro-USB
Miscellaneous
MTBF:
  • 22 years
Compliant Standards:
  • FCC Class A certified, cTUVus, VCCI Class A, CB
Power
Power Device:
  • Internal power supply
Installed Qty:
  • 2
Max Supported Qty:
  • 2
Power Redundancy:
  • Yes
Voltage Required:
  • AC 100-240 V (50/60 Hz)
Power Consumption Operational:
  • 630 Watt
Software / System Requirements
OS Provided:
  • PAN-OS
Dimensions & Weight (Shipping)
Shipping Weight:
  • 48.72 lbs
Manufacturer Warranty
Service & Support:
  • Limited warranty - 1 year
Environmental Parameters
Min Operating Temperature:
  • 32 °F
Max Operating Temperature:
  • 122 °F
Humidity Range Operating:
  • 10 - 90%
  • Next-generation firewall driven by machine learning
    Integrating machine learning (ML) into the firewall's DNA to provide inline, signature-free prevention against file-based attacks, while immediately identifying and blocking as-yet-unknown phishing attempts. Leveraging cloud-based ML processes to instantly send signatures and instructions back to the NGFW. Use behavioral analytics to detect IoT devices and recommend policies. This cloud service is natively integrated into the NGFW. Automate policy recommendations to save time and reduce the risk of human error.
  • Identify and categorize all applications, on all ports, at any time, and fully inspect Layer 7
    Identification of applications traversing your network, regardless of port, protocol, bypass techniques or encryption (TLS/SSL). Automatically discover and secure new applications to keep pace with the SaaS explosion, thanks to our SaaS Security subscription service. Use the application, not the port, as the basis for all your secure activation and authorization policies. Create custom App-ID tags for proprietary applications, or ask Palo Alto Networks to develop an App-ID for new applications. Identification of all payloads in the application to block malicious files and thwart data exfiltration attempts. Creation of standard and customized application usage reports (including SaaS applications) to provide an overview of all authorized and unauthorized SaaS traffic on your network. Integrated Policy Optimizer functionality for secure migration of existing Layer 4 rules to App-ID-based rules, resulting in a more secure and manageable set of rules.
  • Enhanced user security, regardless of location or device, while adapting policies to user activity
    Visibility, security policies, reporting and forensic analysis on users and groups, not just IP addresses. Easy integration with a wide range of repositories to leverage user information. Definition of DUGs (Dynamic User Groups) on the firewall to trigger rapid security actions without waiting for changes to be made to user directories. Application of consistent policies regardless of user location or devices used. Multi-factor authentication (MFA) can be activated on the network layer, for any application and without any application modification, to prevent the entry of corporate credentials on third-party websites and the reuse of stolen credentials. Dynamic, behavior-based security actions to neutralize suspicious or malicious users. Consistent and systematic authentication and authorization of user access, regardless of login location and identity store location, to accelerate the adoption of Zero Trust policies thanks to Cloud Identity Engine, a revolutionary cloud architecture optimizing identity-based security.
  • Block malicious activity hidden in encrypted traffic
    Inspection and policy enforcement of encrypted inbound and outbound TLS/SSL traffic, as well as traffic using TLS 1.3 or HTTP/2. In-depth visibility of TLS traffic without decryption. Reduce risk by controlling the use of older TLS protocol versions, insecure cipher suites and misconfigured certificates. Simple deployment of decryption and use of integrated logs to resolve problems. Flexibly enable or disable decryption based on multiple criteria for privacy and regulatory compliance. Create a copy of decrypted traffic from the firewall and send it to traffic collection tools for forensic analysis, historical retention or data loss prevention (DLP). Intelligent transfer of all traffic to third-party security tools using Network Packet Broker functionality to optimize network performance and reduce operating expenses.
  • Centralized management and visibility
    Centralized management, configuration and visibility for a multitude of distributed Palo Alto Networks NGFWs (regardless of location and scope) within a unified Panorama user interface. Simplified configuration sharing in Panorama using templates and device groups, and scalable log collection as requirements grow. Application Command Center (ACC) for in-depth visibility and comprehensive information on network traffic and threats.
  • Maximize security investments and avoid disruption with AIOps
    Recommendations tailored to each deployment strategy to reinforce the company's security posture and maximize security investments with AIOps for NGFW. Intelligent prediction of firewall health, performance and capacity issues based on ML tools powered by advanced telemetry data. Actionable information to help resolve anticipated disruptions.
  • Cloud security services for advanced threat detection and prevention
    Cyberattacks are constantly evolving, with up to 45,000 variants identified every 30 minutes, not to mention the multitude of vectors and advanced techniques used to propagate malicious payloads within your environment. In the face of this threat, siloed security products expose vulnerabilities and increase the management burden on security teams. They also create access and visibility inconsistencies that hamper business productivity. Perfectly integrated with next-generation firewalls, cloud security services draw on the collective strength of 80,000 customers to instantly coordinate Threat Intelligence and deploy protection against all threats, whatever their vector. The result is complete coverage of all your sites, and seamless security against the most advanced and stealthy threats.
S26584446 Palo Alto Networks PAN-PA-5410-AC 000000000000 Palo Alto Networks PA-5410 (Voltage: AC 100-240 V (50/60 Hz)) new
OutOfStock
Facebook icon Twitter icon YouTube icon Pinterest icon Instagram icon LinkedIn icon
©2000-2025 Howard Technology Solutions, a division of Howard Industries, Inc.
Discover Visa PayPal MasterCard American Express