• $149.99
  • Free 30-day Returns
  • Price alert
    Shop it at NeweggBusiness.

    Meet Your Seller

    Palo Alto PA-220 Next-Gen Firewall 750-000128-00F in Rack Mount with Power Sup

    REFURBISHED Product Type
    • High availability with active/active and active/passive modes
    • Redundant power input for increased reliability
    • Fan-less design
    • Simplified deployments of large numbers of firewalls through USB
    +
    +
    Overview
    Specs
    Reviews
    avatar

    Any questions? Our AI beta will help you find out quickly.

    Classifies all applications, on all ports, all the time
    Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
    Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
    Categorizes unidentified applications for policy control, threat forensics or App-ID application identification technology development
    Enforces security policies for any user, at any location
    Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms
    Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory and Citrix®
    Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information
    Prevents known and unknown threats
    Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
    Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
    Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
    The controlling element of the Palo Alto Networks® PA-220 is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user in other words, the business elements that run your business are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.

    Warranty & Returns

    Warranty, Returns, And Additional Information

    Warranty

    • Please contact the Seller directly for warranty information. Warranty information may also be found on the Manufacturer's website.
    • CONTACT

    Return Policies

    • Return for refund within: 30 days
    • Return for replacement within: non-replaceable
    • This item is covered by VILARGE75 Return Policy

    Manufacturer Contact Info

    LOADING...