Palo Alto PA-5400 Series firewalls

The Palo Alto Networks PA-5400 Series of ML-powered next-generation firewalls-PA-5410, PA-5420, PA-5430, PA-5440, and PA-5445-are ideal for high-speed data center, internet gateway, and service provider deployments. PA-5400 appliances secure all traffic, including encrypted traffic.

As the world’s first ML-based next-generation firewall platform, it prevents unknown threats, provides transparent, secure handling of all network traffic-including IoT devices-and reduces human error with automatic policy recommendations.

The controlling element of the PA-5400 Series is PAN-OS-the same software that powers all Palo Alto Networks NGFWs. PAN-OS natively classifies all traffic-including applications, threats, and content-and then ties it to users regardless of location or device type. Applications, content, and users-the pillars of your business-form the basis of your security policies, strengthening your security posture and reducing incident response time.

Palo Alto PA-5400 Series pricing

On this page you will find detailed specifications for each model.

For list prices and license bundles, visit the central price list and send us your RFQ: Go to the central price list.

ML-powered next-generation firewall

Machine learning is embedded at the core of the firewall to provide real-time, signatureless prevention for file-based attacks while identifying and instantly stopping never-before-seen phishing attempts.

Uses cloud-delivered ML processes to push immediate signatures and instructions back to the NGFW without delay.

Applies behavioral analysis to identify IoT devices and generate policy recommendations, this cloud-delivered capability is natively integrated with the NGFW.

Provides automated policy recommendations to save time and reduce the chance of human error.

Comprehensive application identification and classification-on any port, any time-with full Layer 7 inspection

Identifies applications traversing the network regardless of port, protocol, evasion technique, or encryption (SSL/TLS). It also automatically discovers and manages new applications to keep pace with the SaaS explosion via the SaaS Security subscription.

Uses the application-not the port-as the basis for every allow policy decision: allow, deny, schedule, inspect, and shape.

Enables creation of custom App-ID tags for your own applications or requesting new App-IDs from Palo Alto Networks.

Identifies all data within the application (e.g., files and data patterns) to block malicious files and stop data exfiltration attempts.

Generates standard and customized application-usage reports, including SaaS reports, providing insight into sanctioned and unsanctioned SaaS traffic in your network.

Allows safe migration of legacy Layer 4 rulebases to App-ID-based rules using the built-in Policy Optimizer, making your rulebase more secure and easier to manage.

Protect user devices anywhere with flexible, activity-aware policies

Provides visibility, security policies, reporting, and forensics based on users and groups-not just IP addresses.

Easily integrates with a wide range of repositories to leverage user information: WLAN controllers, VPNs, directory servers, SIEMs, proxies, and more.

Enables creation of dynamic user groups (DUGs) on the firewall to take time-bound security actions without waiting for directory updates.

Applies consistent policies regardless of user location (office, home, travel, etc.) and device (iOS and Android mobile devices, macOS, Windows, Linux desktops, Citrix and Microsoft VDI, terminal servers).

Prevents corporate credentials from leaking to third-party websites and stops reuse of stolen credentials by enabling MFA at the network layer for any application-without changes to the app.

Takes dynamic security actions based on user behavior to restrict suspicious or malicious users.

Consistently authenticates and authorizes users regardless of location or where identity is stored, accelerating a Zero Trust posture with Cloud Identity Engine-a fully cloud-based, identity-centric security architecture.

Preventing malicious activity in encrypted traffic

Inspects and applies policy to SSL/TLS-encrypted traffic-both inbound and outbound-including TLS 1.3 and HTTP/2.

Provides detailed visibility into TLS traffic (e.g., encrypted traffic volume, SSL/TLS versions, cipher suites) without decryption.

Controls the use of legacy TLS protocols, insecure ciphers, and misconfigured certificates to mitigate risk.

Simplifies decryption deployment and provides built-in logs to troubleshoot issues (e.g., apps with pinned certificates).

Enables flexible decryption policies by URL category, source/destination zone, address, user, user group, device, or port-for privacy and regulatory compliance.

Allows copying decrypted traffic (decryption mirroring) from the firewall to traffic collection tools for forensics, historical analysis, or data loss prevention (DLP).

Enables intelligent forwarding of all traffic (decrypted TLS, non-decrypted TLS, and non-TLS) to third-party security tools via a network packet broker-optimizing performance and reducing operational costs.

AI-powered unified management and operations with Strata Cloud Manager

Prevent network outages: Predict deployment health and proactively identify capacity bottlenecks up to 7 days in advance using predictive analytics to avoid operational disruptions.

Strengthen security in real time: AI-driven policy analysis and real-time compliance checks against industry and Palo Alto Networks best practices.

Simple, consistent security management: Manage configurations and policies across SASE, hardware and software firewalls, and all security services to ensure consistency and reduce operational overhead.

Built-in web proxy support for the next-generation firewall

Unify firewall and proxy capabilities on a single platform and manage them centrally to create and enforce policies.

Supports explicit proxy with PAC files as well as transparent proxying.

Explicit proxy can be advantageous for on-premises deployments or architectures without a default route.

Explicit proxy supports Kerberos- and SAML-based authentication.

Transparent proxy setup is simplified-without WCCP or authentication.

Best-in-class cloud-delivered security services powered by Precision AI

The typical enterprise attack surface has expanded significantly with hybrid work, cloud, IoT, and the proliferation of SaaS. Meanwhile, adversaries have easy access to attacker-friendly tools and resources. Traditional network security approaches are no longer sufficient.

Palo Alto Networks cloud-delivered security services provide real-time, best-in-class protection to secure users, devices, and data across the network-regardless of location.

Advanced Threat Prevention: Stops known and unknown exploits, malware, spyware, and C2 threats-including up to 60% more injection attacks and 48% more highly evasive C2 traffic than traditional IPS-delivering industry-first zero-day prevention.

Advanced WildFire: Ensures safe file access with the industry’s largest malware prevention engine, stopping up to 22% more unknown malware and converting detection to prevention up to 180× faster than competitors.

Advanced URL Filtering: Secures web access and blocks up to 40% more threats in real time than legacy database filters-preventing known and unknown phishing and stopping up to 88% of malicious URLs at least 48 hours earlier than competitors.

Advanced DNS Security: Protects DNS traffic and blocks advanced DNS-layer threats (including DNS hijacking) in real time, with twice the DNS threat coverage of competitors.

Next-Generation CASB: Discovers and controls all SaaS usage on the network, with visibility into 60,000+ SaaS apps and data protection across 28+ API integrations.

IoT Security: Secures the extended OT/IoT surface and protects every industry-specific connected device with the industry’s most comprehensive Zero Trust approach-discovering up to 90% of devices within 48 hours.

A unique single-pass approach to packet processing

Performs networking, policy lookup, application decoding, and signature matching for all threats and content in a single pass. This significantly reduces the processing overhead required to deliver multiple functions within one security device.

Avoids introducing latency by scanning traffic for all signatures in a single pass using stream-based, uniform signature matching.

Delivers consistent and predictable performance even when security subscriptions are enabled. (The “Threat Prevention throughput” value in Table 1 was measured with multiple subscriptions enabled.)

SD-WAN functionality

Enables simple adoption of SD-WAN by turning it on directly on existing firewalls.

Delivers secure SD-WAN natively integrated with industry-leading security.

Provides an excellent user experience by minimizing latency, jitter, and packet loss.

PA-5400 Series performance and capacities
PA-5410 PA-5420 PA-5430 PA-5440 PA-5445
Firewall throughput 52 Gbps 70 Gbps 80 Gbps 85 Gbps 90 Gbps
Threat Prevention throughput 35 Gbps 50 Gbps 60 Gbps 70 Gbps 77 Gbps
IPsec VPN throughput 20 Gbps 28 Gbps 42 Gbps 58 Gbps 64 Gbps
Maximum concurrent sessions 5M 7M 9M 20M 48M
New sessions per second 270,000 370,000 380,000 390,000 449,000
Virtual systems (base/max) 10/20 15/65 25/125 25/225 25/225

Click here to select products.