Pa 3400 Series
Pa 3400 Series
PA-3430 PA-3440
Highlights
PA-3400 Series
• World’s first ML-Powered NGFW
• Ten-time Leader in the Gartner ® Magic
Quadrant ™ for Network Firewalls
Palo Alto Networks PA-3400 Series ML-Powered • Leader in the Forrester Wave™: Enterprise
Firewalls, Q3 2020
NGFWs—comprising the PA-3440, PA-3430,
• Highest Security Effectiveness score in
PA-3420, and PA-3410—target high-speed internet
the 2019 NSS Labs NGFW Test Report,
gateway deployments. The PA-3400 Series with 100% of evasions blocked
appliances secure all traffic. • Extends visibility and security to all
devices, including unmanaged IoT
devices, without the need to deploy
additional sensors
• Supports high availability with active/
active and active/passive modes
• Delivers predictable performance with
security services
• Simplifies deployment of large numbers
of firewalls with Zero Touch Provisioning
(ZTP)
• Supports centralized administration with
Panorama™ network security management
Identifies and Categorizes All Applications, on All Ports, All the Time, with Full
Layer 7 Inspection
• Identifies the applications traversing your network irrespective of port, protocol, evasive techniques,
or encryption (TLS/SSL). In addition, it automatically discovers and controls new applications to keep
pace with the SaaS explosion with SaaS Security subscription.
• Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow,
deny, schedule, inspect, and apply traffic-shaping.
• Offers the ability to create custom App-ID™ tags for proprietary applications or request App-ID
development for new applications from Palo Alto Networks.
• Identifies all payload data within the application (e.g., files and data patterns) to block malicious files
and thwart data exfiltration attempts.
• Creates standard and customized application usage reports, including software-as-a-service (SaaS)
reports that provide insight into all sanctioned and unsanctioned SaaS traffic on your network.
• Enables safe migration of legacy Layer 4 rule sets to App-ID-based rules with built-in Policy
Optimizer, giving you a rule set that is more secure and easier to manage.
• Check out the App-ID tech brief for more information.
Enforces Security for Users at Any Location, on Any Device, While Adapting
Policy Based on User Activity
• Enables visibility, security policies, reporting, and forensics based on users and groups—not just IP
addresses.
• Easily integrates with a wide range of repositories to leverage user information: wireless LAN c
ontrollers,
VPNs, directory servers, SIEMs, proxies, and more.
• Allows you to define Dynamic User Groups (DUGs) on the firewall to take time-bound security actions
without waiting for changes to be applied to user directories.
• Applies consistent policies irrespective of users’ locations (office, home, travel, etc.) and devices (iOS
and Android® mobile devices, macOS®, Windows®, Linux desktops, laptops; Citrix and Microsoft VDI
and Terminal Servers).
• Prevents corporate credentials from leaking to third-party websites and prevents reuse of stolen
credentials by enabling multi-factor authentication (MFA) at the network layer for any application
without any application changes.
• Provides dynamic security actions based on user behavior to restrict suspicious or malicious users.
• Consistently authenticates and authorizes your users, regardless of location and where user identity
stores live, to quickly move towards a Zero Trust security posture with Cloud Identity Engine—an
entirely new cloud-based architecture for identity-based security. Check out the Cloud Identity
Engine solution brief for more information.
Maximize Your Security Investment and Prevent Business Disruption with AIOps
• AIOps for NGFW delivers continuous best practice recommendations customized to your unique de-
ployment to strengthen your security posture and get the most out of your security investment.
• Intelligently predicts firewall health, performance and capacity problems based on ML powered by
advanced telemetry data. It also provides actionable insights to resolve the predicted disruptions.
Firewall throughput (HTTP/appmix)* 30.2/24 Gbps 25.5/20.5 Gbps 20.8/16.9 Gbps 14.5/11.6 Gbps
Threat Prevention throughput (HTTP/
11.0/12.8 Gbps 9.2/10.5 Gbps 7.6/8.7 Gbps 5.2/5.9 Gbps
appmix)†
IPsec VPN throughput‡ 14.5 Gbps 12.2 Gbps 9.9 Gbps 6.8 Gbps
* Firewall throughput is measured with App-ID and logging enabled, utilizing 64 KB HTTP/appmix transactions.
† Threat Prevention throughput is measured with App-ID, IPS, antivirus, antispyware, WildFire, DNS Security, file blocking, and logging
enabled, utilizing 64 KB HTTP/appmix transactions.
‡ IPsec VPN throughput is measured with 64 KB HTTP transactions and logging enabled.
§ New sessions per second is measured with application-override, utilizing 1 byte HTTP transactions.
|| Adding virtual systems over base quantity requires a separately purchased license.
Interface Modes
Routing
OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, static routing
Policy-based forwarding
NAT64, NPTv6
Additional NAT features: dynamic IP reservation, tunable dynamic IP and port oversubscription
High Availability
To view additional information about the features and associated capacities of the PA-3400 Series,
please visit paloaltonetworks.com/network-security/next-generation firewall/pa-3400-series.
3000 Tannery Way © 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 strata_ds_pa-3400-series_032122
Support: +1.866.898.9087
www.paloaltonetworks.com