Pa 400 Series
Pa 400 Series
Pa 400 Series
PA-445
PA-410
PA-415
Firewall enables you to prevent unknown • Offers security in a desktop form factor
threats, see and secure everything—including the • Extends visibility and security to all devices,
including unmanaged IoT devices, without the
Internet of Things (IoT)—and reduce errors with need to deploy additional sensors
automatic policy recommendations.
• Supports high availability with active/active
and active/passive modes
• Delivers predictable performance with security
services
• Features a silent, fanless design with an optional
redundant power supply for branch and home
offices
• Simplifies deployment of large numbers of firewalls
with optional Zero Touch Provisioning (ZTP)
• Supports centralized administration with
Panorama network security management
Identifies and Categorizes All Applications, on All Ports, All the Time, with Full
Layer 7 Inspection
• Identifies the applications traversing your network irrespective of port, protocol, evasive tech-
niques, or encryption (TLS/SSL); in addition, automatically discovers and controls new applications
to keep pace with the SaaS explosion with a SaaS Security subscription.
• Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow,
deny, schedule, inspect, and apply traffic-shaping.
• Offers the ability to create custom App-ID tags for proprietary applications or request App-ID de-
velopment for new applications from Palo Alto Networks.
• Identifies all payload data within an application (e.g., files and data patterns) to block malicious
files and thwart exfiltration attempts.
• Creates standard and customized application usage reports, including software-as-a-service (SaaS)
reports that provide insight into all sanctioned and unsanctioned SaaS traffic on your network.
• Enables safe migration of legacy Layer 4 rule sets to App-ID-based rules with built-in Policy Opti-
mizer, giving you a rule set that is more secure and easier to manage.
Check out the App-ID tech brief for more information.
Enforces Security for Users at Any Location, on Any Device, While Adapting
Policy Based on User Activity
• Enables visibility, security policies, reporting, and forensics based on users and groups—not just IP
addresses.
• Easily integrates with a wide range of repositories to leverage user information: wireless LAN con-
trollers, VPNs, directory servers, SIEMs, proxies, and more.
• Allows you to define Dynamic User Groups (DUGs) on the firewall to take time-bound security ac-
tions without waiting for changes to be applied to user directories.
• Applies consistent policies irrespective of users’ locations (office, home, travel, etc.) and devices
(iOS and Android mobile devices; macOS, Windows, and Linux desktops and laptops; Citrix and
Microsoft VDI; and terminal servers).
• Prevents corporate credentials from leaking to third-party websites and prevents reuse of stolen
credentials by enabling multifactor authentication (MFA) at the network layer for any application
without any application changes.
• Provides dynamic security actions based on user behavior to restrict suspicious or malicious users.
• Consistently authenticates and authorizes your users, regardless of their location and where user
identity stores live, to quickly move toward a Zero Trust security posture with Cloud Identity En-
gine—an entirely new cloud-based architecture for identity-based security.
Check out the Cloud Identity Engine solution brief for more information.
Maximize Your Security Investment and Prevent Business Disruption with AIOps
• AIOps for NGFW delivers continuous best practice recommendations customized to your unique
deployment to strengthen your security posture and get the most out of your security investment.
• Intelligently predicts firewall health, performance, and capacity problems based on ML powered by
advanced telemetry data. It also provides actionable insights to resolve the predicted disruptions.
Management I/O
PA-410: 10/100/1000 out-of-band management port (1), RJ45 console port (1), USB port (2)
PA-415, PA-445 SFP/RJ45(1 GB) combo management port (1), RJ45 console port (1), USB port (2), Micro USB console port (1)
PA-440, PA-450, PA-460: 10/100/1000 out-of-band management port (1), RJ45 console port (1), USB port (2), Micro USB console port (1)
PA-410: 64 GB eMMC
PA-415, PA-440, PA-445, PA-450, PA-460: 128 GB eMMC
Power Supply (Avg/Max Power Consumption)
PA-415, PA-445: 150 W
PA-415, PA-440, PA-445: 29/34 W
PA-450, PA-460: 33/41 W
Max BTU/hr
PA-410: 78
PA-415, PA-440, PA-445: 117
PA-450, PA-460: 141
Input Voltage (Input Frequency)
100-240 VAC (50–60 Hz)
Max Current Consumption
PA-410: 1.5 A @ 12 VDC
PA-415, PA-440, PA-445: 2.9 A @ 12 VDC
PA-450, PA-460: 3.4 A @ 12 VDC
Max Inrush Current
PA-410: 2.1 A
PA-415, PA-440, PA-445: 3.3 A
PA-450, PA-460: 4.2 A
Dimensions
PA-410: 1.63" H x 6.42" D x 9.53" W
PA-415: 1.73" H x 13" D x 9" W
PA-445: 1.66" H x 13" D x 8.87" W
PA-440, PA-450, PA-460: 1.74" H x 8.83" D x 8.07" W
To learn more about the features and associated capacities of the PA-400 Series, please visit
paloaltonetworks.com/network-security/next-generation-firewall/pa-400-series.
3000 Tannery Way © 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 strata_ds_pa-400-series_112822
Support: +1.866.898.9087
www.paloaltonetworks.com