Palo Alto PA-400 Series firewalls

The Palo Alto Networks PA-400 Series next-generation firewalls (NGFWs) comprise the following models: PA-410, PA-415, PA-415-5G, PA-440, PA-445, PA-450, PA-455, PA-455-5G, and PA-460. These models deliver ML-powered NGFW capabilities to distributed enterprise branch offices, retail locations, and midsize businesses.

As the world’s first ML-based next-generation firewall, the platform prevents unknown threats, provides transparent and secure handling of all network traffic, including IoT devices-and reduces the chance of human error with automatic policy recommendations.

The controlling element of the PA-400 Series is PAN-OS-the same software that powers all Palo Alto Networks NGFWs. PAN-OS natively classifies all traffic-applications, threats, and content-and then ties that traffic to the user regardless of location or device type. Applications, content, and users-the pillars of your business-form the basis of your security policies, improving your overall security posture and reducing incident response time.

Palo Alto PA-400 Series pricing

On this page you will find detailed specifications for each model.

For list prices and license bundles, visit the central price list and send us your RFQ: Go to the central price list.

ML-powered next-generation firewall

ML is embedded in the core of the firewall to provide real-time, signatureless prevention for file-based attacks while identifying and instantly stopping never-before-seen phishing attempts.

Uses cloud-delivered ML processes to push immediate signatures and instructions back to the NGFW without delay.

Applies behavioral analysis to identify IoT devices and generate policy recommendations, this cloud-delivered capability is natively integrated with the NGFW.

Provides automated policy recommendations to save time and reduce the chance of human error.

Comprehensive application identification and classification-on any port, any time-with full Layer 7 inspection

Identifies applications traversing the network regardless of port, protocol, evasion technique, or encryption (SSL/TLS). It also automatically discovers and manages new applications to keep pace with the SaaS explosion via the SaaS Security subscription.

Uses the application, not the port-as the basis for every allow policy decision: allow, deny, schedule, inspect, and shape.

Enables creation of custom App-ID tags for your own applications or requesting new App-IDs from Palo Alto Networks.

Identifies all data packets within the application (e.g., files and data patterns) to block malicious files and stop data exfiltration attempts.

Generates standard and customized application usage reports, including SaaS reports, providing insight into sanctioned and unsanctioned SaaS traffic in your network.

Allows safe migration of legacy Layer 4 rulebases to App-ID-based rules using the built-in Policy Optimizer, making your rulebase more secure and easier to manage.

Protect user devices anywhere with flexible, activity-aware policies

Provides visibility, security policies, reporting, and forensics based on users and groups-not just IP addresses.

Easily integrates with a wide range of repositories to leverage user information: WLAN controllers, VPNs, directory servers, SIEMs, proxies, and more.

Enables creation of dynamic user groups (DUGs) on the firewall to take time-bound security actions without waiting for directory updates.

Applies consistent policies regardless of user location (office, home, travel, etc.) and device (iOS and Android mobile devices, macOS, Windows, Linux desktops, Citrix and Microsoft VDI, terminal servers).

Prevents corporate credentials from leaking to third-party websites and stops reuse of stolen credentials by enabling MFA at the network layer for any application, without requiring changes to the app.

Takes dynamic security actions based on user behavior to restrict suspicious or malicious users.

Consistently authenticates and authorizes users regardless of location or where identity is stored, accelerating a Zero Trust posture with Cloud Identity Engine-a fully cloud-based, identity-centric security architecture.

Preventing malicious activity in encrypted traffic

Inspects and applies policy to SSL/TLS-encrypted traffic-both inbound and outbound-including TLS 1.3 and HTTP/2.

Provides detailed visibility into TLS traffic (e.g., amount of encrypted traffic, SSL/TLS versions, cipher suites) without decryption.

Controls the use of legacy TLS protocols, insecure ciphers, and misconfigured certificates to mitigate risk.

Simplifies decryption deployment and provides built-in logs to troubleshoot issues (e.g., apps with pinned certificates).

Enables flexible decryption policies by URL category, source/destination zone, address, user, user group, device, or port-for privacy and regulatory compliance.

Allows making a copy of decrypted traffic (decryption mirroring) from the firewall and sending it to traffic collection tools for forensics, historical analysis, or data loss prevention (DLP).

Enables intelligent forwarding of all traffic (decrypted TLS, non-decrypted TLS, and non-TLS) to third-party security tools via a network packet broker, optimizing performance and reducing operational cost.

Centralized management and visibility

Centralized management, configuration, and visibility for multiple distributed Palo Alto Networks NGFWs (regardless of location and size) through Panorama-a unified network security management interface.

Simplifies sharing configurations via Panorama using templates and device groups, and scales log collection as needs grow.

Lets users gain deep visibility and rich insights into network traffic and threats through the Application Command Center (ACC).

AI-powered unified management and operations with Strata Cloud Manager

Prevent network outages: Predict deployment health and proactively identify capacity bottlenecks up to 7 days in advance using predictive analytics to avoid operational disruptions.

Strengthen security in real time: AI-driven policy analysis and real-time compliance checks against industry and Palo Alto Networks best practices.

Simple, consistent security management: Manage configurations and policies across SASE, hardware and software firewalls, and all security services to ensure consistency and reduce operational overhead.

Best-in-class cloud-delivered security services powered by Precision AI

The typical enterprise attack surface has expanded significantly with hybrid work, cloud, IoT, and the proliferation of SaaS. The threat landscape is more intense as adversaries gain easy access to attacker-friendly tools and resources. Traditional network security approaches are no longer sufficient.

Palo Alto Networks cloud-delivered security services provide real-time, best-in-class protection to secure users, devices, and data across the network-regardless of location.

These services harness the power of Precision AI in real time to prevent new and unknown threats. Backed by shared threat intelligence from over 70,000 customers worldwide, they detect emerging dangers and respond proactively. Seamless integration with NGFW and SASE eliminates security gaps and provides single-pane-of-glass management.

Services include:

Advanced Threat Prevention: Stops known and unknown exploits, malware, spyware, and C2 threats-including up to 60% more injection attacks and 48% more highly evasive C2 traffic than traditional IPS-delivering industry-first zero-day prevention.

Advanced WildFire: Ensures safe file access with the industry’s largest malware prevention engine, stopping up to 22% more unknown malware and converting detection to prevention up to 180x faster than competitors.

Advanced URL Filtering: Secures web access and blocks up to 40% more threats in real time than legacy database filters-preventing known and unknown phishing, and stopping up to 88% of malicious URLs at least 48 hours before competitors.

Advanced DNS Security: Protects DNS traffic and blocks advanced DNS-layer threats (including DNS hijacking) in real time, with twice the DNS threat coverage of competitors.

Next-Generation CASB: Discovers and controls all SaaS usage on the network, with visibility into 60,000+ SaaS apps and data protection across 28+ API integrations.

IoT Security: Secures the extended OT/IoT surface and protects every industry-specific connected device with the industry’s most comprehensive Zero Trust approach-discovering up to 90% of devices within 48 hours.

A unique single-pass approach to packet processing

Performs networking, policy lookup, application decoding, and signature matching for all threats and content in a single pass. This significantly reduces the processing overhead required to deliver multiple functions within one security device.

Avoids introducing latency by scanning traffic for all signatures in a single pass using stream-based, uniform signature matching.

Delivers consistent and predictable performance even when security subscriptions are enabled. (The “Threat prevention throughput” value in Table 1 was measured with multiple subscriptions enabled.)

SD-WAN functionality

Enables simple adoption of SD-WAN by turning it on directly on existing firewalls.

Delivers secure SD-WAN natively integrated with industry-leading security.

Provides an excellent user experience by minimizing latency, jitter, and packet loss.

PA-400 Series performance and capacities
PA-410 PA-415 PA-415-5G PA-440 PA-445 PA-450 PA-455 PA-455-5G PA-460
Firewall throughput 1.4 Gbps 1.5 Gbps 1.5 Gbps 2.6 Gbps 2.7 Gbps 3.3 Gbps 3.6 Gbps 3.2 Gbps 4.6 Gbps
Threat prevention throughput 0.8 Gbps 0.8 Gbps 0.8 Gbps 1.2 Gbps 1.25 Gbps 2.1 Gbps 2.3 Gbps 1.8 Gbps 3 Gbps
IPsec VPN throughput 0.65 Gbps 0.65 Gbps 0.65 Gbps 1.1 Gbps 1.1 Gbps 1.7 Gbps 1.8 Gbps 650 Mbps 2.3 Gbps
Maximum concurrent sessions 64,000 64,000 64,000 200,000 200,000 300,000 300,000 300,000 400,000
New sessions per second 11,000 11,000 11,400 34,000 34,000 48,000 56,000 48,000 67,000
Virtual systems (base/max) 1/1 1/1 1/1 1/2 1/2 1/5 1/5 1/5 1/5

Click here to select products.