Business
Palo Alto Networks PA-5410 main image
Roll over main image to zoom in. Click to open expanded view.
Palo Alto Networks PA-5410 - Image 1: Main

Palo Alto Networks PA-5410 - Security appliance - spare - 40GbE, 100GbE, 5GbE, 2.5GbE, 25GbE - front to back airflow - DC power - 2U - rack-mountable

Price:  

For pricing or to order this product:

Call our Sales Representatives

Mon-Fri 8am-6:30pm CST

E-Mail

Answer within 2 hours

Availability: 

10-14+ Days
This item will be shipped directly from the manufacturer.
Leadtime to shipment will be a minimum of 10-14 working days.
Call for further shipping details. - (888) 912-3151 or E-Mail

Brand: 

Palo Alto Networks

MPN: 

PAN-PA-5410-DC-SPR

Condition: 

new

Returnable: 

Yes

Marketing description is not available.
Palo Alto Networks PA-5410 - Security appliance - spare - 40GbE, 100GbE, 5GbE, 2.5GbE, 25GbE - front to back airflow - DC power - 2U - rack-mountable
General
Device Type:
  • Security appliance
Height (Rack Units):
  • 2U
Built-in Devices:
  • LED panel
Width:
  • 17.3 in
Depth:
  • 22.5 in
Height:
  • 3.4 in
Weight:
  • 35.27 lbs
Processor / Memory / Storage
Hard Drive:
  • SSD 480 GB x 2
Networking
Form Factor:
  • Rack-mountable
Airflow Direction:
  • Front to back airflow
Connectivity Technology:
  • Wired
Data Link Protocol:
  • Gigabit Ethernet, 10 Gigabit Ethernet, 40 Gigabit Ethernet, 100 Gigabit Ethernet, 5 Gigabit Ethernet, 2.5 Gigabit Ethernet, 25 Gigabit Ethernet
Network / Transport Protocol:
  • IPSec, PPPoE, DHCP, DNS, HTTP, IPv4, IPv6
Routing Protocol:
  • RIP, BGP, IGMPv2, IGMP, OSPFv2, PIM-SM, static IP routing, IGMPv3, OSPFv3, PIM-SSM, policy-based routing (PBR), Bidirectional Forwarding Detection (BFD)
Performance:
  • Firewall throughput (HTTP): 45.2 Gbps
  • Firewall throughput (appmix): 36.7 Gbps
  • Threat prevention throughput (HTTP): 23.5 Gbps
  • Threat prevention throughput (appmix): 22 Gbps
  • VPN throughput (IPSec): 21 Gbps
Capacity:
  • Maximum number of sessions: 4100000
  • New sessions per second: 246000
  • VLAN tags per device: 4094
  • VLAN tags per interface: 4094
  • Virtual systems (base): 10
  • Virtual systems (maximum): 20
Features:
  • Firewall protection, DHCP support, NAT support, VPN support, VLAN support, High Availability, URL filtering, anti-malware protection, web threat protection, LACP support, Data Loss Prevention (DLP), VLAN Tagging, SD-WAN support, Advanced Threat Protection (ATP), machine learning
Encryption Algorithm:
  • Triple DES, MD5, IKE, SSL, TLS, SHA-1, 128-bit AES, 192-bit AES, 256-bit AES, IKEv2, 256-bit SHA, 512-bit SHA, 384-bit SHA, TLS 1.3
Compliant Standards:
  • IEEE 802.1Q, IEEE 802.3ad (LACP)
Expansion / Connectivity
Interfaces:
  • 8 x 1/2.5/5/10GBase-T - RJ-45
  • 12 x 1Gb Ethernet/10Gb Ethernet - SFP/SFP+
  • 4 x 25Gb Ethernet - SFP28
  • 4 x 40Gb Ethernet/100Gb Ethernet - QSFP+/QSFP28
  • 1 x 1000Base-X (management) - SFP
  • 2 x 1 Gigabit Ethernet (High Availability) - SFP
  • 1 x 40Gb Ethernet (High Availability) - QSFP+
  • 1 x console - RJ-45
  • 1 x management (micro-USB) - micro-USB
Miscellaneous
MTBF:
  • 22 years
Compliant Standards:
  • FCC Class A certified, CB, cTUVus, VCCI Class A
Power
Power Device:
  • Internal power supply
Power Redundancy:
  • Yes
Voltage Required:
  • DC -48 - -60 V
Power Consumption Operational:
  • 630 Watt
Software / System Requirements
OS Provided:
  • PAN-OS
Dimensions & Weight (Shipping)
Shipping Weight:
  • 48.72 lbs
Manufacturer Warranty
Service & Support:
  • Limited warranty - 1 year
Environmental Parameters
Min Operating Temperature:
  • 32 °F
Max Operating Temperature:
  • 122 °F
Humidity Range Operating:
  • 10 - 90%
  • Next-generation firewall driven by machine learning
    Integrating machine learning (ML) into the firewall's DNA to provide inline, signature-free prevention against file-based attacks, while immediately identifying and blocking as-yet-unknown phishing attempts. Leveraging cloud-based ML processes to instantly send signatures and instructions back to the NGFW. Use behavioral analytics to detect IoT devices and recommend policies. This cloud service is natively integrated into the NGFW. Automate policy recommendations to save time and reduce the risk of human error.
  • Identify and categorize all applications, on all ports, at any time, and fully inspect Layer 7
    Identification of applications traversing your network, regardless of port, protocol, bypass techniques or encryption (TLS/SSL). Automatically discover and secure new applications to keep pace with the SaaS explosion, thanks to our SaaS Security subscription service. Use the application, not the port, as the basis for all your secure activation and authorization policies. Create custom App-ID tags for proprietary applications, or ask Palo Alto Networks to develop an App-ID for new applications. Identification of all payloads in the application to block malicious files and thwart data exfiltration attempts. Creation of standard and customized application usage reports (including SaaS applications) to provide an overview of all authorized and unauthorized SaaS traffic on your network. Integrated Policy Optimizer functionality for secure migration of existing Layer 4 rules to App-ID-based rules, resulting in a more secure and manageable set of rules.
  • Enhanced user security, regardless of location or device, while adapting policies to user activity
    Visibility, security policies, reporting and forensic analysis on users and groups, not just IP addresses. Easy integration with a wide range of repositories to leverage user information. Definition of DUGs (Dynamic User Groups) on the firewall to trigger rapid security actions without waiting for changes to be made to user directories. Application of consistent policies regardless of user location or devices used. Multi-factor authentication (MFA) can be activated on the network layer, for any application and without any application modification, to prevent the entry of corporate credentials on third-party websites and the reuse of stolen credentials. Dynamic, behavior-based security actions to neutralize suspicious or malicious users. Consistent and systematic authentication and authorization of user access, regardless of login location and identity store location, to accelerate the adoption of Zero Trust policies thanks to Cloud Identity Engine, a revolutionary cloud architecture optimizing identity-based security.
  • Block malicious activity hidden in encrypted traffic
    Inspection and policy enforcement of encrypted inbound and outbound TLS/SSL traffic, as well as traffic using TLS 1.3 or HTTP/2. In-depth visibility of TLS traffic without decryption. Reduce risk by controlling the use of older TLS protocol versions, insecure cipher suites and misconfigured certificates. Simple deployment of decryption and use of integrated logs to resolve problems. Flexibly enable or disable decryption based on multiple criteria for privacy and regulatory compliance. Create a copy of decrypted traffic from the firewall and send it to traffic collection tools for forensic analysis, historical retention or data loss prevention (DLP). Intelligent transfer of all traffic to third-party security tools using Network Packet Broker functionality to optimize network performance and reduce operating expenses.
  • Centralized management and visibility
    Centralized management, configuration and visibility for a multitude of distributed Palo Alto Networks NGFWs (regardless of location and scope) within a unified Panorama user interface. Simplified configuration sharing in Panorama using templates and device groups, and scalable log collection as requirements grow. Application Command Center (ACC) for in-depth visibility and comprehensive information on network traffic and threats.
  • Maximize security investments and avoid disruption with AIOps
    Recommendations tailored to each deployment strategy to reinforce the company's security posture and maximize security investments with AIOps for NGFW. Intelligent prediction of firewall health, performance and capacity issues based on ML tools powered by advanced telemetry data. Actionable information to help resolve anticipated disruptions.
  • Cloud security services for advanced threat detection and prevention
    Cyberattacks are constantly evolving, with up to 45,000 variants identified every 30 minutes, not to mention the multitude of vectors and advanced techniques used to propagate malicious payloads within your environment. In the face of this threat, siloed security products expose vulnerabilities and increase the management burden on security teams. They also create access and visibility inconsistencies that hamper business productivity. Perfectly integrated with next-generation firewalls, cloud security services draw on the collective strength of 80,000 customers to instantly coordinate Threat Intelligence and deploy protection against all threats, whatever their vector. The result is complete coverage of all your sites, and seamless security against the most advanced and stealthy threats.
S26615555 Palo Alto Networks PAN-PA-5410-DC-SPR 000000000000 Palo Alto Networks PA-5410 new
OutOfStock
Facebook icon Twitter icon YouTube icon Pinterest icon Instagram icon LinkedIn icon
©2000-2025 Howard Technology Solutions, a division of Howard Industries, Inc.
Discover Visa PayPal MasterCard American Express