VM-Series (22 vCPU, 56 GB)
NEW
VM-Series (32vCPU, 56 GB)
App-ID firewall throughput | 28 Gbps (SR-IOV) |
Threat prevention throughput | 20 Gbps |
Connections per second | 120,000 |
Max sessions (IPv4 or IPv6) | 10,000,000 |
Technical specifications
table {
width: 100%;
border: 1px solid #ddd;
border-collapse: collapse;
}
td {
padding: 6px;
border: 1px solid #ddd;
}
width: 100%;
border: 1px solid #ddd;
border-collapse: collapse;
}
td {
padding: 6px;
border: 1px solid #ddd;
}
Performance
App-ID firewall throughput | 28 Gbps (SR-IOV) |
Threat prevention throughput | 20 Gbps |
IPSec VPN throughput | 6 Gbps |
Connections per second | 120,000 |
Sessions
Max sessions (IPv4 or IPv6) | 10,000,000 |
Policies
Security rules | 20,000 |
Security rule schedules | 256 |
NAT rules | 15,000 |
Decryption rules | 2,000 |
App override rules | 2,000 |
Tunnel content inspection rules | 2,000 |
SD-WAN rules | 300 |
Policy based forwarding rules | 2,000 |
Captive portal rules | 2,000 |
DoS protection rules | 1,000 |
Security Zones
Max security zones | 200 |
Objects (addresses and services)
Address objects | 40,000 |
Address groups | 4,000 |
Members per address group | 2,500 |
Service objects | 5,000 |
Service groups | 250 |
Members per service group | 500 |
FQDN address objects | 2,000 |
Max DAG IP addresses* | 300,000 |
Tags per IP address | 32 |
Security Profiles
Security profiles | 750 |
App-ID
Custom App-ID signatures | 6,000 |
Shared custom App-IDs | 512 |
Custom App-IDs (virtual system specific) | 6,416 |
User-ID
IP-User mappings (management plane) | 512,000 |
IP-User mappings (data plane) | 512,000 |
Active and unique groups used in policy* | 10,000 |
Number of User-ID agents | 100 |
Monitored servers for User-ID | 100 |
Terminal server agents | 2,500 |
Tags per User* | 32 |
SSL Decryption
Max SSL inbound certificates | 1,000 |
SSL certificate cache (forward proxy) | 8,000 |
Max concurrent decryption sessions | 100,000 |
Decryption Port Mirror | Yes |
Network Packet Broker* | check Customer Support Portal |
HSM Supported | Yes |
URL Filtering
Total entries for allow list, block list and custom categories | 100,000 |
Max custom categories | 2,849 |
Max custom categories (virtual system specific) | 500 |
Dataplane cache size for URL filtering | 250,000 |
Management plane dynamic cache size | 600,000 |
EDL
Max number of custom lists | 30 |
Max number of IPs per system | 50,000 |
Max number of DNS Domains per system | 2,000,000 |
Max number of URL per system | 100,000 |
Shortest check interval (min) | 5 |
Interfaces
Mgmt - out-of-band | NA |
Mgmt - 10/100/1000 high availability | NA |
Mgmt - 40Gbps high availability | NA |
Mgmt - 10Gbps high availability | NA |
Traffic - 10/100/1000 | NA |
Traffic - 10M/100M/1G/2.5G/5G* | NA |
Traffic - 100/1000/10000 | NA |
Traffic - 1Gbps SFP | NA |
Traffic - 10Gbps SFP+ | NA |
Traffic - 25Gbps SFP28 | NA |
Traffic - 40/100Gbps QSFP+/QSFP28 | NA |
802.1q tags per device | 4,094 |
802.1q tags per physical interface | 4,094 |
Max interfaces (logical and physical) | 4,096 |
Maximum aggregate interfaces | NA |
Maximum SD-WAN virtual interfaces | 1,000 |
Power Over Ethernet
PoE Enabled Interfaces | NA |
PoE Interface Speed | NA |
Total Power Budget | NA |
Max Power per single port | NA |
Cellular Interface
5G | NA |
Virtual Routers
Virtual routers | 125 |
Virtual Wires
Virtual wires | 12 |
Virtual Systems
Base virtual systems | 1 |
Max virtual systems* | NA |
Routing
IPv4 forwarding table size* | 100,000 |
IPv6 forwarding table size* | 100,000 |
System total forwarding table size | 100,000 |
Max route maps per virtual router | 50 |
Max routing peers (protocol dependent) | 1,000 |
Static entries - DNS proxy | 1,024 |
Bidirectional Forwarding Detection (BFD) Sessions | 1,024 |
L2 Forwarding
ARP table size per device | 128,000 |
IPv6 neighbor table size | 128,000 |
MAC table size per device | 128,000 |
Max ARP entries per broadcast domain | 128,000 |
Max MAC entries per broadcast domain | 128,000 |
NAT
Total NAT rule capacity | 8,000 |
Max NAT rules (static)* | 8,000 |
Max NAT rules (DIP)* | 8,000 |
Max NAT rules (DIPP) | 2,000 |
Max translated IPs (DIP) | 160,000 |
Max translated IPs (DIPP)* | 2,000 |
Default DIPP pool oversubscription* | 8 |
Address Assignment
DHCP servers | 125 |
DHCP relays* | 500 |
Max number of assigned addresses | 64,000 |
High Availability
Devices supported | 2 |
Max virtual addresses | 4,096 |
QoS
Number of QoS policies | 4,000 |
Physical interfaces supporting QoS | 12 |
Clear text nodes per physical interface | 63 |
DSCP marking by policy | Yes |
Subinterfaces supported | NA |
IPSec VPN
Max IKE Peers | 2,000 |
Site to site (with proxy id) | 8,000 |
SD-WAN IPSec tunnels | 2,000 |
GlobalProtect Client VPN
Max tunnels (SSL, IPSec, and IKE with XAUTH) | 12,000 |
GlobalProtect Clientless VPN
Max SSL tunnels | 2,500 |
Multicast
Replication (egress interfaces) | 1,000 |
Routes | 4,000 |
Product Notes
End-of-sale | NA |
Subscriptions
Strata Cloud Manager |
Manage your Palo Alto Networks Next-Generation Firewalls (NGFW) from Strata Cloud Manager. This cloud-delivered, AI-powered security solution allows seamless management of your advanced ML-powered NGFWs, alongside Prisma Access deployments, through a single, streamlined user interface. Strata Cloud Manager has two licensing tiers: Strata Cloud Manager Essentials and Strata Cloud Manager Pro. This unified structure streamlines the deployment of network security offerings, including AIOps for NGFW, Autonomous Digital Experience Management (ADEM), cloud management functionality, and Strata Logging Service.
|
IoT Security |
The IoT Security solution works with next-generation firewalls to dynamically discover and maintain a real-time inventory of the IoT devices on your network. Through AI and machine-learning algorithms, the IoT Security solution achieves a high level of accuracy, even classifying IoT device types encountered for the first time. And because it’s dynamic, your IoT device inventory is always up to date. IoT Security also provides the automatic generation of policy recommendations to control IoT device traffic, as well as the automatic creation of IoT device attributes for use in firewall policies.
|
SD-WAN |
Provides intelligent and dynamic path selection on top of the industry-leading security that PAN-OS software already delivers. Managed by Panorama, the SD-WAN implementation includes:
|
Threat Prevention |
Threat Prevention provides:
|
Advanced Threat Prevention |
In addition to all of the features included with Threat Prevention, the Advanced Threat Prevention subscription provides an inline cloud-based threat detection and prevention engine, leveraging deep learning models trained on high fidelity threat intelligence gathered by Palo Alto Networks, to defend your network from evasive and unknown command-and-control (C2) threats by inspecting all network traffic.
|
DNS Security |
Provides enhanced DNS sinkholing capabilities by querying DNS Security, an extensible cloud-based service capable of generating DNS signatures using advanced predictive analytics and machine learning. This service provides full access to the continuously expanding DNS-based threat intelligence produced by Palo Alto Networks.
To set up DNS Security, you must first purchase and install a Threat Prevention license.
|
Advanced DNS Security |
In addition to all of the features included with DNS Security, the Advanced DNS Security subscription provides access to the Advanced DNS Security cloud, which operates cloud-based domain detection engines that inspect changes to DNS responses. This enables NGFWs to detect and categorize hijacked and misconfigured domains in real-time to block malicious activity.
|
URL Filtering |
Provides the ability to not only control web-access, but how users interact with online content based on dynamic URL categories. You can also prevent credential theft by controlling the sites to which users can submit their corporate credentials.
To set up URL Filtering, you must purchase and install a subscription for the supported URL filtering database, PAN-DB. With PAN-DB, you can set up access to the PAN-DB public cloud or to the PAN-DB private cloud.
URL Filtering is no longer available as a standalone subscription. All URL Filtering features are included with the Advanced URL Filtering subscription.
|
Advanced URL Filtering |
Advanced URL Filtering uses a cloud-based ML-powered web security engine to perform ML-based inspection of web traffic in real-time. This reduces reliance on URL databases and out-of-band web crawling to detect and prevent advanced, file-less web-based attacks including targeted phishing, web-delivered malware and exploits, command-and-control, social engineering, and other types of web attacks.
|
WildFire |
Although basic WildFire® support is included as part of the Threat Prevention license, the WildFire subscription service provides enhanced services for organizations that require immediate coverage for threats, frequent WildFire signature updates, advanced file type forwarding (APK, PDF, Microsoft Office, and Java Applet), as well as the ability to upload files using the WildFire API. A WildFire subscription is also required if your firewalls will be forwarding files to an on-premise WF-500 appliance.
|
Advanced WildFire |
Advanced WildFire is a subscription offering that provides access to Intelligent Run-time Memory Analysis: a cloud-based advanced analysis engine that complements static and dynamic analysis, to detect and prevent evasive malware threats. By leveraging a cloud-based detection infrastructure, Intelligent Run-time Memory Analysis detection engines operate a wide array of detection mechanisms to target these highly-evasive malware.
|
AutoFocus |
Provides a graphical analysis of firewall traffic logs and identifies potential risks to your network using threat intelligence from the AutoFocus portal. With an active license, you can also open an AutoFocus search based on logs recorded on the firewall.
|
Strata Logging Service |
Provides cloud-based, centralized log storage and aggregation. The Strata Logging Service is required or highly-recommended to support several other cloud-delivered services, including Cortex XDR, IoT Security, and Prisma Access, and Traps management service.
|
GlobalProtect Gateway |
Provides mobility solutions and/or large-scale VPN capabilities. By default, you can deploy GlobalProtect portals and gateways (without HIP checks) without a license. If you want to use advanced GlobalProtect features (HIP checks and related content updates, the GlobalProtect Mobile App, IPv6 connections, or a GlobalProtect Clientless VPN) you will need a GlobalProtect Gateway license for each gateway.
|
Virtual Systems |
This is a perpetual license, and is required to enable support for multiple virtual systems on PA-3200 Series firewalls. In addition, you must purchase a Virtual Systems license if you want to increase the number of virtual systems beyond the base number provided by default on PA-400 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, and PA-7000 Series firewalls (the base number varies by platform). The PA-220 and PA-800 Series firewalls do not support virtual systems.
PAN-OS 11.1.2 and earlier releasesThe multiple virtual systems are not supported on VM- Series firewalls.
PAN-OS 11.1.3 and later releasesThe multiple virtual systems are supported on VM-Series firewalls.
|
Enterprise Data Loss Prevention (DLP)
|
Provides cloud-based protection against unauthorized access, misuse, extraction, and sharing of sensitive information. Enterprise DLP provides a single engine for accurate detection and consistent policy enforcement for sensitive data at rest and in motion using machine learning-based data classification, hundreds of data patterns using regular expressions or keywords, and data profiles using Boolean logic to scan for collective types of data.
|
SaaS Security Inline
|
The SaaS Security solution works with Strata Logging Service to discover all of the SaaS applications in use on your network. SaaS Security Inline can discover thousands of Shadow IT applications and their users and usage details. SaaS Security Inline also enforces SaaS policy rule recommendations seamlessly across your existing Palo Alto Networks firewalls. App-ID Cloud Engine (ACE) also requires SaaS Security Inline.
|