Compare Firewall Products
PA-220 & PA-800 Series:
(1) Optical/Copper transceivers are sold separately.
PA 3200 Series:
(1) VM-Series performance will vary based on underlying
virtualization infrastructure (hypervisor/cloud). Refer to the
individual datasheets for detailed performance and testing
information.
(2) Adding virtual systems to the base quantity requires a
separately purchased license.
(3) Optical/Copper transceivers are sold separately.
PA 5200 Series:
(1) VM-Series performance will vary based on underlying
virtualization infrastructure (hypervisor/cloud). Refer to the
individual datasheets for detailed performance and testing
information.
(2) Adding virtual systems to the base quantity requires a
separately purchased license.
(3) Optical/Copper transceivers are sold separately.
PA 7000 Series:
(1) VM-Series performance will vary based on underlying
virtualization infrastructure (hypervisor/cloud). Refer to the
individual datasheets for detailed performance and testing
information.
(2) Adding virtual systems to the base quantity requires a
separately purchased license.
(3) New sessions per second and max session capacity for PA-7000
Series specified with 100G-NPCs.
(4) Optical/Copper transceivers are sold separately.
Key Features:
| Next-Generation Firewall | Supported Across All Models |
|---|---|
| Deep visibility and granular control for thousands of applications; ability to create custom applications; ability to manage unknown traffic based on policy | |
| User identification and control: VPNs, WLAN controllers, captive portal, proxies, Active Directory, eDirectory, Exchange, Terminal Services, syslog parsing, XML API | |
| Granular SSL decryption and inspection (inbound and outbound); per-policy SSH control (inbound and outbound) | |
| Networking: dynamic routing (RIP, OSPF, BGP, multiprotocol BGP), DHCP, DNS, NAT, route redistribution, ECMP, LLDP, BFD, tunnel content inspection | |
| QoS: policy-based traffic shaping (priority, guaranteed, maximum) per application, per user, per tunnel, based on DSCP classification | |
| Virtual systems: logical, separately managed firewall instances within a single physical firewall, with each virtual system’s traffic kept separate | |
| Zone-based network segmentation and zone protection; DoS protection against flooding of new sessions | |
| Threat Prevention (subscription required) | |
| In-line malware prevention automatically enforced through payload-based signatures, updated daily | |
| Vulnerability-based protections against exploits and evasive techniques on network and application layers, including port scans, buffer overflows, packet fragmentation, and obfuscation | |
| Command-and-control (C2) activity stopped from exfiltrating data or delivering secondary malware payloads; infected hosts identified through DNS sinkholing | |
| URL Filtering (subscription required) | |
| Automatic prevention of web-based attacks, including phishing links in emails, phishing sites, HTTP-based C2, and pages that carry exploit kits | |
| Ability to stop in-process credential phishing | |
| Custom URL categories, alerts, and notification pages | |
| WildFire malware prevention (subscription required) | |
| Detection of zero-day malware and exploits with layered, complementary analysis techniques | |
| Automated prevention in as few as five minutes across networks, endpoints, and clouds | |
| Community-based data for protection, including more than 30,000 subscribers | |
| AutoFocus threat intelligence (subscription required) | |
| Contextualization and classification of attacks, including malware family, adversary, and campaign, to speed triage and response efforts | |
| Rich, globally correlated threat analysis sourced from WildFire | |
| Third-party threat intelligence for automated prevention | |
| DNS Security (subscription required) | |
| Automatically prevent tens of millions of malicious domains identified with realtime analysis and continuously growing global threat intelligence | |
| Quickly detect C2 or data theft employing DNS tunneling with machine learning-powered analysis | |
| Automate dynamic response to find infected machines and quickly respond in policy | |
| File and data filtering | |
| Bidirectional control over the unauthorised transfer of file types and Social Security numbers, credit card numbers, and custom data patterns | |
| GlobalProtect network security for endpoints (subscription required) | |
| Remote access VPN (SSL, IPsec, clientless); mobile threat prevention and policy enforcement based on apps, users, content, device, and device state | |
| BYOD: app-level VPN for user privacy | |
| Panorama network security management (subscription required for managing multiple firewalls | |
| Intuitive policy control with applications, users, threats, advanced malware prevention, URLs, file types, and data patterns all in the same policy | |
| Actionable insight into traffic and threats with Application Command Center (ACC); fully customizable reporting | |
| Aggregated logging and event correlation | |
| Consistent scalable management of up to 30,000 hardware and all VM-Series firewalls; role-based access control; logical and hierarchical device groups; and templates | |
| GUI, CLI, XML-based REST API | |



