<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Palo Alto &#8211; NamChauTech &#8211; NCT</title>
	<atom:link href="https://namchautech.com/thuong-hieu/palo-alto/feed/" rel="self" type="application/rss+xml" />
	<link>https://namchautech.com</link>
	<description></description>
	<lastBuildDate>Fri, 19 Sep 2025 08:01:57 +0000</lastBuildDate>
	<language>vi</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://namchautech.com/wp-content/uploads/2025/10/site-icon-100x100.png</url>
	<title>Palo Alto &#8211; NamChauTech &#8211; NCT</title>
	<link>https://namchautech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PaloAlto PA-820</title>
		<link>https://namchautech.com/product/paloalto-pa-820/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-820/</guid>

					<description><![CDATA[Classifies all applications, on all ports, all the time Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping Categorizes unidentified applications for policy control, threat forensics [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Classifies all applications, on all ports, all the time</strong></p>
<ul>
<li>Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed</li>
<li>Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping</li>
<li>Categorizes unidentified applications for policy control, threat forensics or App-ID<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> application identification technology development</li>
</ul>
<p><strong>Enforces security policies for any user, at any location</strong></p>
<ul>
<li>Deploys consistent policies to local and remote users running on the Windows®, Mac®&nbsp;OS X®, Linux®, Android<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> or Apple®&nbsp;iOS platforms</li>
<li>Enables agentless integration with Microsoft®&nbsp;Active Directory®&nbsp;and Terminal Services, LDAP, Novell®&nbsp;eDirectory<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> and Citrix®</li>
<li>Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information</li>
</ul>
<p><strong>Prevents known and unknown threats</strong></p>
<ul>
<li>Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed</li>
<li>Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing</li>
<li>Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection</li>
</ul>
<p>Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.</p>
<p>The controlling element of the Palo Alto Networks®&nbsp;PA-800 Series appliances is PAN-OS®&nbsp;security operat- ing system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<h3>Specification</h3>
<p>&nbsp;</p>
<figure class="wp-block-table is-style-stripes">
<table>
<tbody>
<tr>
<td class="has-text-align-center" data-align="center"><strong>STT</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Tính năng</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Palo Alto PA-820</strong></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>1</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Thông số kỹ thuật</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Firewall Throughput</td>
<td class="has-text-align-center" data-align="center">1.6 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Threat Prevention throughput</td>
<td class="has-text-align-center" data-align="center">800 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN throughput</td>
<td class="has-text-align-center" data-align="center">1.2 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">New sessions per second</td>
<td class="has-text-align-center" data-align="center">8300</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Maximum sessions</td>
<td class="has-text-align-center" data-align="center">128000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interfaces supported</td>
<td class="has-text-align-center" data-align="center">(4) 10/100/1000, (8) SFP</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Management I/O</td>
<td class="has-text-align-center" data-align="center">(1) 10/100/1000 out-of-band management port<br />(2) 10/100/1000 high availability<br />(1) RJ-45 console port<br />(1) USB<br />(1) Micro USB console</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Size</td>
<td class="has-text-align-center" data-align="center">1U, 19” standard rack (1.75” H x 14” D x 17.125” W)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Power Supply (Avg/Max Power Consumption)</td>
<td class="has-text-align-center" data-align="center">One fixed AC 200 W power supply</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Redundant Power Supply</td>
<td class="has-text-align-center" data-align="center">No</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Storage capacity</td>
<td class="has-text-align-center" data-align="center">240 GB SSD</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Hot-swappable fans</td>
<td class="has-text-align-center" data-align="center">No</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Power Comsumption</td>
<td class="has-text-align-center" data-align="center">Maximum: 120 W<br />Average: 41 W</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max BTU/hr</td>
<td class="has-text-align-center" data-align="center">256</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Input Voltage (Input Frequency)</td>
<td class="has-text-align-center" data-align="center">100–240VAC (50–60 Hz)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max Current Consumption</td>
<td class="has-text-align-center" data-align="center">1.0A @ 100VAC, 0.5A @ 240VAC (PA-820)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max Inrush Current</td>
<td class="has-text-align-center" data-align="center">0.4A @ 230VAC, 0.96A @ 120VAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Weight (Stand-Alone Device/ As Shipped)</td>
<td class="has-text-align-center" data-align="center">11 lbs / 18 lbs</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Safety</td>
<td class="has-text-align-center" data-align="center">cCSAus, CB</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">EMI</td>
<td class="has-text-align-center" data-align="center">FCC Class A, CE Class A, VCCI Class A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Certifications</td>
<td class="has-text-align-center" data-align="center">See https://www.paloaltonetworks.com/company/certifications.html</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Enviroment</td>
<td class="has-text-align-center" data-align="center">Operating temperature: 32° to 104° F, 0° to 40° C<br />Non-operating temperature: -4° to 158° F, -20° to 70° C</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Airflow</td>
<td class="has-text-align-center" data-align="center">Front to back</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>2</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Network Feature</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interface mode</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Routing</td>
<td class="has-text-align-center" data-align="center">OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, static<br />routing<br />Policy-based forwarding<br />Point-to-Point Protocol over Ethernet (PPPoE)<br />Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPv6</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)<br />Features: App-ID, User-ID, Content-ID, WildFire, and SSL decryption<br />SLAAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN</td>
<td class="has-text-align-center" data-align="center">Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key,<br />certificate-based authentication)<br />Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)<br />Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">VLANs</td>
<td class="has-text-align-center" data-align="center">802.1Q VLAN tags per device/per interface: 4,094/4,094</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Network Address Translation</td>
<td class="has-text-align-center" data-align="center">NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port<br />(port address translation)<br />NAT64, NPTv6<br />Additional NAT features: dynamic IP reservation, tunable dynamic<br />IP and port oversubscription</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">High Availability</td>
<td class="has-text-align-center" data-align="center">Active/Passive with no session synchronization<br />Failure detection: path monitoring, interface monitoring</td>
</tr>
</tbody>
</table>
</figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-500</title>
		<link>https://namchautech.com/product/paloalto-pa-500/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-500/</guid>

					<description><![CDATA[The Palo Alto Networks™ PA-500 is targeted at high speed firewall deployments for enterprise branch offices and medium size businesses. The PA-500 manages network traffic flows using dedicated computing resources for networking, security, threat prevention and management. The Palo Alto Networks enterprise firewall PA-500 is ideally suited for Internet gateway deployments within medium to large [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Palo Alto Networks<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA-500 is targeted at high speed firewall deployments for enterprise branch offices and medium size businesses. The PA-500 manages network traffic flows using dedicated computing resources for networking, security, threat prevention and management.</p>
<p>The Palo Alto Networks enterprise firewall PA-500 is ideally suited for Internet gateway deployments within medium to large branch offices and medium sized enterprises to ensure network security and threat prevention. The Palo Alto firewall PA-500 manages network traffic flows with high performance processing and dedicated memory for networking, security, threat prevention, URL filtering and management. Palo Alto Networks next-generation firewall’s high speed backplane smoothes the pathway between processors and the separation of data and control plane ensures that management access is always available, irrespective of the traffic load.</p>
<p>The high speed backplane is divided into separate data and control planes, thereby ensuring that management access is always available, irrespective of the traffic load. The controlling element of the PA-500 next-generation firewall is PAN-OS<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a security-specific operating system that allows organizations to safely enable applications using App-ID, User-ID, Content-ID, GlobalProtect and WildFire.</p>
<p><strong>Classify all applications, on all port, all the time with App-ID.</strong></p>
<ul>
<li>Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.</li>
<li>Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.</li>
<li>Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.</li>
</ul>
<p><strong>Extend safe application enablement policies to any user, at any location, with User-ID and GlobalProtect.</strong></p>
<ul>
<li>Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.</li>
<li>Integrate with NAC, 802.1X wireless and other non-standard user repositories with an XML API.</li>
<li>Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.</li>
</ul>
<p><strong>Protect against all threat—both known and unknown—with Content-ID and Wildfire</strong></p>
<ul>
<li>Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.</li>
<li>Limit unauthorized transfer of files and sensitive data, and control non-workrelated web surfing.</li>
<li>Identify unknown malware, analyze for more than 100 malicious behaviors, automatically create and deliver a signature in the next available update.</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-220R</title>
		<link>https://namchautech.com/product/paloalto-pa-220r/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-220r/</guid>

					<description><![CDATA[The PA-220R is a next-generation firewall appliance in a ruggedized form factor, providing rock-solid network security for severe environments, such as utility substations, power plants, manufacturing plants, oil and gas facilities, building management systems and healthcare networks. The controlling element of the Palo Alto Networks® PA-220R is PAN-OS® security operating system, which natively classifies all [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The PA-220R is a next-generation firewall appliance in a ruggedized form factor, providing rock-solid network security for severe environments, such as utility substations, power plants, manufacturing plants, oil and gas facilities, building management systems and healthcare networks.</p>
<p>The controlling element of the Palo Alto Networks® PA-220R is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<h3>Specification</h3>
<figure class="wp-block-table is-style-stripes">
<table>
<tbody>
<tr>
<td class="has-text-align-center" data-align="center"><strong>STT</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Tính năng</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Palo Alto PA-220R</strong></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>1</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Thông số kỹ thuật</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Firewall Throughput</td>
<td class="has-text-align-center" data-align="center">500/560 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Threat Prevention throughput</td>
<td class="has-text-align-center" data-align="center">150/260 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN throughput</td>
<td class="has-text-align-center" data-align="center">500 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">New sessions per second</td>
<td class="has-text-align-center" data-align="center">4200</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Maximum sessions</td>
<td class="has-text-align-center" data-align="center">64000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interfaces supported</td>
<td class="has-text-align-center" data-align="center">(6) 10/100/1000, (2) SFP</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Management I/O</td>
<td class="has-text-align-center" data-align="center">(1) 10/100/100 out-of-band management<br />(1) RJ-45 console<br />(1) USB, (1) Micro USB console</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Size</td>
<td class="has-text-align-center" data-align="center">2.0” H x 8.66” D x 9.25” W<br />Flexible mounting options including DIN rail, rack and wall mount</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Power Supply (Avg/Max Power Consumption)</td>
<td class="has-text-align-center" data-align="center">Dual DC power feeds (13 W/16 W)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Redundant Power Supply</td>
<td class="has-text-align-center" data-align="center">None</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Storage capacity</td>
<td class="has-text-align-center" data-align="center">32GB EMMC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Hot-swappable fans</td>
<td class="has-text-align-center" data-align="center">No</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max BTU/hr</td>
<td class="has-text-align-center" data-align="center">55</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Input Voltage (Input Frequency)</td>
<td class="has-text-align-center" data-align="center">12–48VDC 1.4A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max Current Consumption</td>
<td class="has-text-align-center" data-align="center">Firewall – 1.4A @ 12VDC<br />Max inrush current 4.9A @ 12VDC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Weight (Stand-Alone Device/ As Shipped)</td>
<td class="has-text-align-center" data-align="center">4.5 lbs / 6.0 lbs</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Safety</td>
<td class="has-text-align-center" data-align="center">TUV CB report and TUV NRTL</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">EMI</td>
<td class="has-text-align-center" data-align="center">FCC Class A, CE Class A, VCCI Class A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Certifications</td>
<td class="has-text-align-center" data-align="center">IEC 61850-3 and IEEE 1613 environmental and testing standards.<br />For more certifications, see:<br />https://www.paloaltonetworks.com/company/certifications.html</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Enviroment</td>
<td class="has-text-align-center" data-align="center">Operating temperature: -40° to 158° F, -40° to 70° C<br />Non-operating temperature: -40° to 167° F, -40° to 75° C<br />Passive cooling</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>2</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Network Feature</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interface mode</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Routing</td>
<td class="has-text-align-center" data-align="center">OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP,<br />static routing<br />Policy-based forwarding<br />Point-to-Point Protocol over Ethernet (PPPoE)<br />Multicast: PIM-SM, PIM-SSM, IGMP v1, v2 and v3</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPv6</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)<br />Features: App-ID, User-ID, Content-ID, WildFire and SSL<br />decryption<br />SLAAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN</td>
<td class="has-text-align-center" data-align="center">Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key,<br />certificate-based authentication)<br />Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)<br />Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">VLANs</td>
<td class="has-text-align-center" data-align="center">802.1Q VLAN tags per device/per interface: 4,094/4,094</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Network Address Translation</td>
<td class="has-text-align-center" data-align="center">NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port<br />(port address translation)<br />NAT64, NPTv6<br />Additional NAT features: dynamic IP reservation, tunable dynamic<br />IP and port oversubscription</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">High Availability</td>
<td class="has-text-align-center" data-align="center">Modes: active/active, active/passive<br />Failure detection: path monitoring, interface monitoring</td>
</tr>
</tbody>
</table>
</figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-220</title>
		<link>https://namchautech.com/product/paloalto-pa-220/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-220/</guid>

					<description><![CDATA[Classifies all applications, on all ports, all the time Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping Categorizes unidentified applications for policy control, threat forensics [&#8230;]]]></description>
										<content:encoded><![CDATA[<h3>Classifies all applications, on all ports, all the time</h3>
<ul>
<li>Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed</li>
<li>Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping</li>
<li>Categorizes unidentified applications for policy control, threat forensics or App-ID<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> application identification technology development</li>
</ul>
<h3>Enforces security policies for any user, at any location</h3>
<ul>
<li>Deploys consistent policies to local and remote users running on the Windows®, Mac®&nbsp;OS X®, Linux®, Android®, or Apple®&nbsp;iOS platforms</li>
<li>Enables agentless integration with Microsoft®&nbsp;Active Directory®&nbsp;and Terminal Services, LDAP, Novell®&nbsp;eDirectory<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> and Citrix®</li>
<li>Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information</li>
</ul>
<h3>Prevents known and unknown threats</h3>
<ul>
<li>Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed</li>
<li>Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing</li>
<li>Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection</li>
</ul>
<p>The controlling element of the Palo Alto Networks®&nbsp;PA-220 is PAN-OS®&nbsp;security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<h3>Highlights</h3>
<ul>
<li>High availability with active/active and active/passive modes</li>
<li>Redundant power input for increased reliability</li>
<li>Fan-less design</li>
<li>Simplified deployments of large numbers of firewalls through USB</li>
</ul>
<h3>Specification</h3>
<figure class="wp-block-table is-style-stripes">
<table>
<tbody>
<tr>
<td class="has-text-align-center" data-align="center"><strong>STT                                                                                     </strong></td>
<td class="has-text-align-center" data-align="center"><strong>Tính Năng</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Palo Alto PA-220</strong></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>1</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Thông số kỹ thuật</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Firewall Throughput</td>
<td class="has-text-align-center" data-align="center">580 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Threat Prevention throughput</td>
<td class="has-text-align-center" data-align="center">280 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN throughput</td>
<td class="has-text-align-center" data-align="center">500 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">New sessions per second</td>
<td class="has-text-align-center" data-align="center">4200</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Maximum sessions</td>
<td class="has-text-align-center" data-align="center">64000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interfaces supported</td>
<td class="has-text-align-center" data-align="center">(8) 10/100/1000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Management I/O</td>
<td class="has-text-align-center" data-align="center">(1) 10/100/100 out-of-band management<br />(1) RJ-45 console<br />(1) USB, (1) Micro USB console</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Size</td>
<td class="has-text-align-center" data-align="center">1.62″ H x 6.29″ D x 8.07″ W</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Power Supply (Avg/Max Power Consumption)</td>
<td class="has-text-align-center" data-align="center">Dual redundant 40 W</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Redundant Power Supply</td>
<td class="has-text-align-center" data-align="center">Yes (optional)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Storage capacity</td>
<td class="has-text-align-center" data-align="center">32GB EMMC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Hot-swappable fans</td>
<td class="has-text-align-center" data-align="center">No</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max BTU/hr</td>
<td class="has-text-align-center" data-align="center">102</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Input Voltage (Input Frequency)</td>
<td class="has-text-align-center" data-align="center">100-240VAC (50-60Hz)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max Current Consumption</td>
<td class="has-text-align-center" data-align="center">Firewall: 1.75A @ 12VDC<br />Power supply (AC side): 0.5A @ 100VAC, 0.2A @ 240VAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Weight (Stand-Alone Device/ As Shipped)</td>
<td class="has-text-align-center" data-align="center">3.0 lbs / 5.4 lbs</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Safety</td>
<td class="has-text-align-center" data-align="center">cCSAus, CB</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">EMI</td>
<td class="has-text-align-center" data-align="center">FCC Class B, CE Class B, VCCI Class B</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Certifications</td>
<td class="has-text-align-center" data-align="center">See https://www.paloaltonetworks.com/company/certifications.html</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Enviroment</td>
<td class="has-text-align-center" data-align="center">Operating temperature: 32° to 104° F, 0° to 40° C<br />Non-operating temperature: -4° to 158° F, -20° to 70° C<br />Passive cooling</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>2</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Network Feature</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interface Mode</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Routing</td>
<td class="has-text-align-center" data-align="center">OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP,<br />static routing<br />Policy-based forwarding<br />Point-to-Point Protocol over Ethernet (PPPoE)<br />Multicast: PIM-SM, PIM-SSM, IGMP v1, v2 and v3</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPv6</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)<br />Features: App-ID, User-ID, Content-ID, WildFire and SSL<br />decryption<br />SLAAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN</td>
<td class="has-text-align-center" data-align="center">Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key,<br />certificate-based authentication)<br />Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)<br />Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">VLANs</td>
<td class="has-text-align-center" data-align="center">802.1Q VLAN tags per device/per interface: 4,094/4,094</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Network Address Translation</td>
<td class="has-text-align-center" data-align="center">NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port<br />(port address translation)<br />NAT64, NPTv6<br />Additional NAT features: dynamic IP reservation, tunable dynamic<br />IP and port oversubscription</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">High Availability</td>
<td class="has-text-align-center" data-align="center">Modes: active/active, active/passive<br />Failure detection: path monitoring, interface monitoring</td>
</tr>
</tbody>
</table>
</figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-200</title>
		<link>https://namchautech.com/product/paloalto-pa-200/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-200/</guid>

					<description><![CDATA[The PA-200 is a true desktop-size platform that safely enables applications, users, and content in your enterprise branch offices at throughput speeds of up to 100 Mbps. Dedicated computing resources for the functional areas of networking, security, content inspection, and management ensure predictable firewall performance. The Palo Alto Networks™ PA-200 is targeted at high speed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The PA-200 is a true desktop-size platform that safely enables applications, users, and content in your enterprise branch offices at throughput speeds of up to 100 Mbps. Dedicated computing resources for the functional areas of networking, security, content inspection, and management ensure predictable firewall performance.</p>
<p>The Palo Alto Networks<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA-200 is targeted at high speed firewall deployments within distributed enterprise branch offices. The PA-200 manages network traffic flows using dedicated computing resources for networking, security, threat prevention and management.</p>
<p>The high speed backplane is divided into separate data and control planes, thereby ensuring that management access is always available, irrespective of the traffic load. The controlling element of the PA-200 next-generation firewall is PAN-OS<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a security-specific operating system that allows organizations to safely enable applications using App-ID, User-ID, Content-ID, GlobalProtect, and WildFire.</p>
<p><strong>Classify all applications, on all port, all the time with App-ID.</strong></p>
<ul>
<li>Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.</li>
<li>Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.</li>
<li>Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.</li>
</ul>
<p><strong>Extend safe application enablement policies to any user, at any location, with User-ID and GlobalProtect.</strong></p>
<ul>
<li>Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.</li>
<li>Integrate with NAC, 802.1X wireless and other non-standard user repositories with an XML API.</li>
<li>Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.</li>
</ul>
<p><strong>Protect against all threat—both known and unknown—with Content-ID and Wildfire</strong></p>
<ul>
<li>Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.</li>
<li>Limit unauthorized transfer of files and sensitive data, and control non-workrelated web surfing.</li>
<li>Identify unknown malware, analyze for more than 100 malicious behaviors, automatically create and deliver a signature in the next available update.</li>
</ul>
<p><strong>Specification</strong></p>
<figure class="wp-block-table is-style-stripes">
<table>
<tbody>
<tr>
<td class="has-text-align-center" data-align="center"><strong>STT</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Tính năng</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Palo Alto PA-200</strong></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center">1</td>
<td class="has-text-align-center" data-align="center"><strong>Thông số kỹ thuật</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Firewall Throughput (App-ID enable )</td>
<td class="has-text-align-center" data-align="center">100 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Threat Prevention throughput</td>
<td class="has-text-align-center" data-align="center">50 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN throughput</td>
<td class="has-text-align-center" data-align="center">50 Mbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">New sessions per second</td>
<td class="has-text-align-center" data-align="center">1000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Maximum sessions</td>
<td class="has-text-align-center" data-align="center">64000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interfaces supported</td>
<td class="has-text-align-center" data-align="center">(4) 10/100/1000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Management I/O</td>
<td class="has-text-align-center" data-align="center">(1) 10/100 out-of-band management port</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Size</td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Power Supply (Avg/Max Power Consumption)</td>
<td class="has-text-align-center" data-align="center">40W (20W/30W)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Redundant Power Supply</td>
<td class="has-text-align-center" data-align="center">None</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Storage Capacity</td>
<td class="has-text-align-center" data-align="center">16GB SSD</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Hot-swappable fans</td>
<td class="has-text-align-center" data-align="center">No</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max BTU/hr</td>
<td class="has-text-align-center" data-align="center">102</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Input Voltage (Input Frequency)</td>
<td class="has-text-align-center" data-align="center">100-240VAC (50-60Hz)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max Current Consumption</td>
<td class="has-text-align-center" data-align="center">3.3A @ 100VAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Mean Time Between Failure (MTBF)</td>
<td class="has-text-align-center" data-align="center">13 Years</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Weight (Stand-Alone Device/ As Shipped)</td>
<td class="has-text-align-center" data-align="center">2.8 lbs / 5.0 lbs</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Safety</td>
<td class="has-text-align-center" data-align="center">cCSAus, CB</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">EMI</td>
<td class="has-text-align-center" data-align="center">FCC Class B, CE Class B, VCCI Class B</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Certifications</td>
<td class="has-text-align-center" data-align="center">See https://www.paloaltonetworks.com/company/certifications.html</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Enviroment</td>
<td class="has-text-align-center" data-align="center">Operating temperature: 32° to 104° F, 0° to 40° C<br />Non-operating temperature: -4° to 158° F, -20° to 70° C</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center">2</td>
<td class="has-text-align-center" data-align="center"><strong>Network Features</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interface mode</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Routing</td>
<td class="has-text-align-center" data-align="center">OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP,<br />static routing<br />Policy-based forwarding<br />Point-to-Point Protocol over Ethernet (PPPoE)<br />Multicast: PIM-SM, PIM-SSM, IGMP v1, v2 and v3<br />Bidirectional Forwarding Detection (BFD)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPv6</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)<br />Features: App-ID, User-ID, Content-ID, WildFire and SSL<br />decryption<br />SLAAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">VLANs</td>
<td class="has-text-align-center" data-align="center">802.1Q VLAN tags per device/per interface: 4,094/4,094</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Network Address Translation</td>
<td class="has-text-align-center" data-align="center">NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port<br />(port address translation)<br />NAT64, NPTv6<br />Additional NAT features: dynamic IP reservation, tunable dynamic<br />IP and port oversubscription</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">High Availability</td>
<td class="has-text-align-center" data-align="center">Active/Passive with no session synchronization<br />Failure detection: path monitoring, interface monitoring</td>
</tr>
</tbody>
</table>
</figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-3250</title>
		<link>https://namchautech.com/product/paloalto-pa-3250/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-3250/</guid>

					<description><![CDATA[The Palo Alto Networks® PA-3200 Series next-generation firewalls are designed for data center and internet gateway deployments. This series is comprised of the PA-3220, PA-3250, and PA-3260 firewalls. These models provide flexibility in performance and redundancy to help you meet your deployment requirements. All models in this series provide next-generation security features to help you [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Palo Alto Networks® PA-3200 Series next-generation firewalls are designed for data center and internet gateway deployments. This series is comprised of the PA-3220, PA-3250, and PA-3260 firewalls. These models provide flexibility in performance and redundancy to help you meet your deployment requirements. All models in this series provide next-generation security features to help you secure your organization through advanced visibility and control of applications, users, and content.</p>
<h3>Specification</h3>
<figure class="wp-block-table is-style-stripes">
<table>
<tbody>
<tr>
<td class="has-text-align-center" data-align="center"><strong>STT</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Tính năng</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Palo Alto PA-3250</strong></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>1</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Thông số kỹ thuật</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Firewall Throughput</td>
<td class="has-text-align-center" data-align="center">6.6 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Threat Prevention throughput</td>
<td class="has-text-align-center" data-align="center">3 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN throughput</td>
<td class="has-text-align-center" data-align="center">3.2 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">New sessions per second</td>
<td class="has-text-align-center" data-align="center">82000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Maximum sessions</td>
<td class="has-text-align-center" data-align="center">2000000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interfaces supported</td>
<td class="has-text-align-center" data-align="center">(12) 10/100/1000<br />(8) 1G/10G SFP/SFP+</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Management I/O</td>
<td class="has-text-align-center" data-align="center">(1) 10/100/1000 out-of-band management port<br />(2) 10/100/1000 high availability<br />(1) 10G SFP+ high availability<br />(1) RJ-45 console port<br />(1) Micro USB</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Size</td>
<td class="has-text-align-center" data-align="center">2U, 19″ standard rack (3.5″ H x 20.53″ D x 17.34″ W )</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Power Supply (Avg/Max Power Consumption)</td>
<td class="has-text-align-center" data-align="center">Redundant 650-watt AC or DC (180/240)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Redundant Power Supply</td>
<td class="has-text-align-center" data-align="center">Yes</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Storage capacity</td>
<td class="has-text-align-center" data-align="center">240 GB SSD</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Hot-swappable fans</td>
<td class="has-text-align-center" data-align="center">Yes</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max BTU/hr</td>
<td class="has-text-align-center" data-align="center">819</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Input Voltage (Input Frequency)</td>
<td class="has-text-align-center" data-align="center">AC: 100–240VAC (50–60 Hz)<br />DC: -48V @ 4.7A, -60V @ 3.8A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max Current Consumption</td>
<td class="has-text-align-center" data-align="center">AC: 2.3A @ 100VAC, 1.0A @ 240VAC<br />DC:-48V @ 4.7A, -60V @ 3.8A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Mean Time Between Failure (MTBF)</td>
<td class="has-text-align-center" data-align="center">14 Years</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Weight (Stand-Alone Device/ As Shipped)</td>
<td class="has-text-align-center" data-align="center">29 lbs / 41.5 lbs</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Safety</td>
<td class="has-text-align-center" data-align="center">TUV CB report and TUV NRTL</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">EMI</td>
<td class="has-text-align-center" data-align="center">FCC Class A, CE Class A, VCCI Class A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Certifications</td>
<td class="has-text-align-center" data-align="center">See https://www.paloaltonetworks.com/company/certifications.html</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Enviroment</td>
<td class="has-text-align-center" data-align="center">Operating temperature: 32° to 122° F, 0° to 50° C<br />Non-operating temperature: -4° to 158° F, -20° to 70° C<br />Humidity tolerance: 10% to 90%<br />Maximum altitude: 10,000ft / 3,048m</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Airflow</td>
<td class="has-text-align-center" data-align="center">Front to back</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>2</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Network Feature</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interface mode</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Routing</td>
<td class="has-text-align-center" data-align="center">OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP,<br />static routing<br />Policy-based forwarding<br />Point-to-point protocol over Ethernet (PPPoE)<br />Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3<br />Bidirectional Forwarding Detection (BFD)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPv6</td>
<td class="has-text-align-center" data-align="center">L2, L3,tap, virtual Wire (transparent mode)<br />Features: App-ID, User-ID, Content-ID, WildFire, and SSL<br />decryption<br />SLAAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN</td>
<td class="has-text-align-center" data-align="center">Key exchange: manual key, IKEv1, and IKEv2 (pre-shared key,<br />certificate-based authentication)<br />Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)<br />Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-513</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">VLANs</td>
<td class="has-text-align-center" data-align="center">802.1Q VLAN tags per device/per interface: 4,094/4,094<br />Aggregate interfaces (802.3ad), LACP</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Network Address Translation</td>
<td class="has-text-align-center" data-align="center">NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port<br />(port address translation)<br />NAT64, NPTv6<br />Additional NAT features: dynamic IP reservation, tunable dynamic<br />IP and port oversubscription</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">High Availability</td>
<td class="has-text-align-center" data-align="center">Modes: active/active, active/passive<br />Failure detection: path monitoring, interface monitoring</td>
</tr>
</tbody>
</table>
</figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-3220</title>
		<link>https://namchautech.com/product/paloalto-pa-3220/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-3220/</guid>

					<description><![CDATA[The Palo Alto Networks® PA-3200 Series next-generation firewalls are designed for data center and internet gateway deployments. This series is comprised of the PA-3220, PA-3250, and PA-3260 firewalls. These models provide flexibility in performance and redundancy to help you meet your deployment requirements. All models in this series provide next-generation security features to help you [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Palo Alto Networks® PA-3200 Series next-generation firewalls are designed for data center and internet gateway deployments. This series is comprised of the PA-3220, PA-3250, and PA-3260 firewalls. These models provide flexibility in performance and redundancy to help you meet your deployment requirements. All models in this series provide next-generation security features to help you secure your organization through advanced visibility and control of applications, users, and content.</p>
<h3>Specification</h3>
<figure class="wp-block-table is-style-stripes">
<table>
<tbody>
<tr>
<td class="has-text-align-center" data-align="center"><strong>STT</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Tính Năng</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Palo Alto PA-3220</strong></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>1</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Thông số kỹ thuật</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Firewall Throughput</td>
<td class="has-text-align-center" data-align="center">5 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Threat Prevention throughput</td>
<td class="has-text-align-center" data-align="center">2.4 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN throughput</td>
<td class="has-text-align-center" data-align="center">2.7 Gbps</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">New sessions per second</td>
<td class="has-text-align-center" data-align="center">57000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Maximum sessions</td>
<td class="has-text-align-center" data-align="center">1000000</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interfaces supported</td>
<td class="has-text-align-center" data-align="center">(12) 10/100/1000<br />(4) 1G SFP<br />(4) 1G/10G SFP/SFP+</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Management I/O</td>
<td class="has-text-align-center" data-align="center">(1) 10/100/1000 out-of-band management port<br />(2) 10/100/1000 high availability<br />(1) 10G SFP+ high availability<br />(1) RJ-45 console port<br />(1) Micro USB</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Size</td>
<td class="has-text-align-center" data-align="center">2U, 19″ standard rack (3.5″ H x 20.53″ D x 17.34″ W )</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Power Supply (Avg/Max Power Consumption)</td>
<td class="has-text-align-center" data-align="center">Redundant 650-watt AC or DC (180/240)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Redundant Power Supply</td>
<td class="has-text-align-center" data-align="center">Yes</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Storage capacity</td>
<td class="has-text-align-center" data-align="center">240 GB SSD</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Hot-swappable fans</td>
<td class="has-text-align-center" data-align="center">Yes</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max BTU/hr</td>
<td class="has-text-align-center" data-align="center">819</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Input Voltage (Input Frequency)</td>
<td class="has-text-align-center" data-align="center">AC: 100–240VAC (50–60 Hz)<br />DC: -48V @ 4.7A, -60V @ 3.8A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Max Current Consumption</td>
<td class="has-text-align-center" data-align="center">AC: 2.3A @ 100VAC, 1.0A @ 240VAC<br />DC:-48V @ 4.7A, -60V @ 3.8A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Mean Time Between Failure (MTBF)</td>
<td class="has-text-align-center" data-align="center">14 Years</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Weight (Stand-Alone Device/ As Shipped)</td>
<td class="has-text-align-center" data-align="center">29 lbs / 41.5 lbs</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Safety</td>
<td class="has-text-align-center" data-align="center">TUV CB report and TUV NRTL</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">EMI</td>
<td class="has-text-align-center" data-align="center">FCC Class A, CE Class A, VCCI Class A</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Certifications</td>
<td class="has-text-align-center" data-align="center">See https://www.paloaltonetworks.com/company/certifications.html</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Enviroment</td>
<td class="has-text-align-center" data-align="center">Operating temperature: 32° to 122° F, 0° to 50° C<br />Non-operating temperature: -4° to 158° F, -20° to 70° C<br />Humidity tolerance: 10% to 90%<br />Maximum altitude: 10,000ft / 3,048m</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Airflow</td>
<td class="has-text-align-center" data-align="center">Front to back</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"><strong>2</strong></td>
<td class="has-text-align-center" data-align="center"><strong>Network Feature</strong></td>
<td class="has-text-align-center" data-align="center"></td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Interface mode</td>
<td class="has-text-align-center" data-align="center">L2, L3, tap, virtual wire (transparent mode)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Routing</td>
<td class="has-text-align-center" data-align="center">OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP,<br />static routing<br />Policy-based forwarding<br />Point-to-point protocol over Ethernet (PPPoE)<br />Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3<br />Bidirectional Forwarding Detection (BFD)</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPv6</td>
<td class="has-text-align-center" data-align="center">L2, L3,tap, virtual Wire (transparent mode)<br />Features: App-ID, User-ID, Content-ID, WildFire, and SSL<br />decryption<br />SLAAC</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">IPSec VPN</td>
<td class="has-text-align-center" data-align="center">Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key,<br />certificate-based authentication)<br />Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)<br />Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">VLANs</td>
<td class="has-text-align-center" data-align="center">802.1Q VLAN tags per device/per interface: 4,094/4,094</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">Network Address Translation</td>
<td class="has-text-align-center" data-align="center">NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port<br />(port address translation)<br />NAT64, NPTv6<br />Additional NAT features: dynamic IP reservation, tunable dynamic<br />IP and port oversubscription</td>
</tr>
<tr>
<td class="has-text-align-center" data-align="center"></td>
<td class="has-text-align-center" data-align="center">High Availability</td>
<td class="has-text-align-center" data-align="center">Modes: active/active, active/passive<br />Failure detection: path monitoring, interface monitoring</td>
</tr>
</tbody>
</table>
</figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-3060</title>
		<link>https://namchautech.com/product/paloalto-pa-3060/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-3060/</guid>

					<description><![CDATA[The Palo Alto Networks™ PA-3000 Series is comprised of three high performance platforms, the PA-3060, the PA-3050 and the PA-3020, which are targeted at high speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management. The controlling element of the PA-3000 Series [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Palo Alto Networks<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA-3000 Series is comprised of three high performance platforms, the PA-3060, the PA-3050 and the PA-3020, which are targeted at high speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management.</p>
<p>The controlling element of the PA-3000 Series is PAN-OS<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. The application, content, and user—in other words, the business elements that run your business—are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<p><strong>Classify all applications, on all port, all the time with App-ID.</strong></p>
<ul>
<li>Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.</li>
<li>Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.</li>
<li>Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.</li>
</ul>
<p><strong>Extend safe application enablement policies to any user, at any location, with User-ID and GlobalProtect.</strong></p>
<ul>
<li>Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.</li>
<li>Easily integrate firewall policies with NAC, 802.1X wireless, Proxies and NAC solutions.</li>
<li>Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.</li>
</ul>
<p><strong>Protect against all threat—both known and unknown—with Content-ID and Wildfire</strong></p>
<ul>
<li>Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.</li>
<li>Limit unauthorized transfer of files and sensitive data, and control non-workrelated web surfing.</li>
<li>Identify unknown malware, analyze for more than 230 malicious behaviors, automatically create and deliver a signature in the next available update.</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-3050</title>
		<link>https://namchautech.com/product/paloalto-pa-3050/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-3050/</guid>

					<description><![CDATA[The Palo Alto Networks™ PA-3000 Series is comprised of three high performance platforms, the PA-3060, the PA-3050 and the PA-3020, which are targeted at high speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management. The controlling element of the PA-3000 Series [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Palo Alto Networks<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA-3000 Series is comprised of three high performance platforms, the PA-3060, the PA-3050 and the PA-3020, which are targeted at high speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management.</p>
<p>The controlling element of the PA-3000 Series is PAN-OS<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. The application, content, and user—in other words, the business elements that run your business—are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<p><strong>Classify all applications, on all port, all the time with App-ID.</strong></p>
<ul>
<li>Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.</li>
<li>Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.</li>
<li>Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.</li>
</ul>
<p><strong>Extend safe application enablement policies to any user, at any location, with User-ID and GlobalProtect.</strong></p>
<ul>
<li>Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.</li>
<li>Easily integrate firewall policies with NAC, 802.1X wireless, Proxies and NAC solutions.</li>
<li>Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.</li>
</ul>
<p><strong>Protect against all threat—both known and unknown—with Content-ID and Wildfire</strong></p>
<ul>
<li>Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.</li>
<li>Limit unauthorized transfer of files and sensitive data, and control non-workrelated web surfing.</li>
<li>Identify unknown malware, analyze for more than 230 malicious behaviors, automatically create and deliver a signature in the next available update.</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PaloAlto PA-3020</title>
		<link>https://namchautech.com/product/paloalto-pa-3020/</link>
		
		<dc:creator><![CDATA[Long Nguyen]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 08:01:57 +0000</pubDate>
				<guid isPermaLink="false">https://new.namchautech.com/product/paloalto-pa-3020/</guid>

					<description><![CDATA[The Palo Alto Networks™ PA-3000 Series is comprised of three high performance platforms, the PA-3060, the PA-3050 and the PA-3020, which are targeted at high speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management. The controlling element of the PA-3000 Series [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Palo Alto Networks<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA-3000 Series is comprised of three high performance platforms, the PA-3060, the PA-3050 and the PA-3020, which are targeted at high speed Internet gateway deployments. The PA-3000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management.</p>
<p>The controlling element of the PA-3000 Series is PAN-OS<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. The application, content, and user—in other words, the business elements that run your business—are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<p><strong>Classify all applications, on all port, all the time with App-ID.</strong></p>
<ul>
<li>Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.</li>
<li>Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.</li>
<li>Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.</li>
</ul>
<p><strong>Extend safe application enablement policies to any user, at any location, with User-ID and GlobalProtect.</strong></p>
<ul>
<li>Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.</li>
<li>Easily integrate firewall policies with NAC, 802.1X wireless, Proxies and NAC solutions.</li>
<li>Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.</li>
</ul>
<p><strong>Protect against all threat—both known and unknown—with Content-ID and Wildfire</strong></p>
<ul>
<li>Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.</li>
<li>Limit unauthorized transfer of files and sensitive data, and control non-workrelated web surfing.</li>
<li>Identify unknown malware, analyze for more than 230 malicious behaviors, automatically create and deliver a signature in the next available update.</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
