We serve end customers only, resellers please excuse...

Call us at 9395502416 for Special Deals
Call us at 9395502416 for Special Deals


Brand : Palo Alto Networks

Product Type : PAN-PA-460 – security appliance

Device Type : Security appliance

Form Factor : External

Hard Drive : 128 GB x 1

 Data Link Protocol : Ethernet, Fast Ethernet, Gigabit Ethernet

Performance : Firewall throughput (HTTP): 5.2 Gbps ¦ Firewall throughput (appmix): 4.7 Gbps ¦ Threat prevention throughput (HTTP): 2.4 Gbps ¦ Threat prevention throughput (appmix): 2.6 Gbps ¦ VPN throughput (IPSec): 3.1 Gbps

Capacity : Maximum number of sessions: 400000 ¦ New sessions per second: 74000 ¦ VLAN tags per device: 4094 ¦ VLAN tags per interface: 4094

Power : AC 100-240 V (50/60 Hz)

Dimensions (WxDxH) : 8.1 in x 8.8 in x 1.7 in

Weight : 5 lbs

Warranty : 3 Year

GST @18% is applicable.


Buy Palo Alto Networks PA-460 Firewall online at best affordable price in India. Firewallbazaar sales latest Palo Alto Networks Firewall at lowest price. We offer FREE Shipping and FREE Installation Available all over India.

Palo Alto Networks PA-460, Professional Subscription Bundle (Threat Prevention, Advanced URL Filtering, Wildfire, DNS Security) with Premium support, 1 year (12 months), term.

Machine Learning Powered Next Generation Firewalls 

Inserts machine learning in the center of the firewall to give inline signatureless attack prevention to record based attacks while recognizing and quickly halting never-before-seen phishing endeavors. 

Use cloud-based ML cycles to push zero-delay marks and directions back to the NGFW. Utilizations conduct analysis to distinguish web of things (IoT) devices and make strategy proposals; clouddelivered and locally incorporated help on the NGFW. 

Mechanizes strategy suggestions that save time and lessen the shot at human mistake. 

Assesses and applies strategy to TLS/SSL-encoded traffic, both inbound and outbound, including for traffic that utilizes TLS 1.3 and HTTP/2 

Offers rich visibility into TLS traffic, like measure of encoded traffic, TLS/SSL adaptations, figure suites, 

Empowers authority over utilization of inheritance TLS conventions, unreliable codes, and mistakenly arranged certs to mitigate risks.

Works with simple arrangement of decryption and allows you to utilize worked in logs to investigate issues, like applications with pinned certs. 

Allows you to empower or disable decryption flexibly dependent on URL classification and source and objective zone, address, client, user group, device, and port, for protection and administrative consistence purposes. 

Distinguishes and sorts all applications, on all ports, constantly, with full Layer 7 assessment 

Recognizes the applications navigating your organization independent of port, convention, methods, or encryption (TLS/SSL). 

Offers the capacity to make custom App-IDs for restrictive applications or solicitation App-ID improvement for new applications from Palo Alto Networks. 

Upholds security for clients at any area, on any gadget, while adjusting strategy because of client movement 

Empowers security strategies, detailing, and crime scene investigation dependent on clients and gatherings – not simply IP addresses. 

Effectively incorporates with a wide scope of storehouses to use client data: remote LAN regulators, VPNs, index servers, SIEMs and then some.