<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA-500 throughputs? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19673#M14362</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bob...You are correct in that throughput will vary depending on the type of traffic (SMTP, SSL, SMB, HTTP, etc) and the average packet size on your network.&amp;nbsp; If your network carries alot of zip compressed files, this will require more resource to unzip &amp;amp; scan.&amp;nbsp; So every network will be different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your description, we would need to handle 45Mbps (you also need to consider the traffic from internal to DMZ if you have a DMZ and factor it in).&amp;nbsp; Accounting for full duplex, we need to support 45Mbps in + 45Mbps out = 90Mbps total.&amp;nbsp; The PA500 offers 100Mbps&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;threat prevention throughput under the best condition so the PA500 is not the right fit.&amp;nbsp; The PA2020 offers 200Mbps threat prevention throughput which put us at 40-50% CPU usage from the start.&amp;nbsp; Then as you turn on policies &amp;amp; features, the CPU usage will increase as we would expect. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest looking at the PA2050 and contact your Palo Alto account team/partner for further discussion.&amp;nbsp; Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Mar 2012 03:50:47 GMT</pubDate>
    <dc:creator>rmonvon</dc:creator>
    <dc:date>2012-03-16T03:50:47Z</dc:date>
    <item>
      <title>PA-500 throughputs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19672#M14361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I realize that is a difficult question to answer.&amp;nbsp; What kind of maximum throughputs are people seeing with their PA-500s?&lt;/P&gt;&lt;P&gt;For example: I monitor our firewall (not a PA) using PRTG via SNMP and see a fairly constant 20 Mbps with some 30-45 minute spikes up to 35 Mbps.&amp;nbsp; Nights I see 30+ constantly (we are a boarding school and their is a lot of streaming).&amp;nbsp; Well under the PA-500 stats, but I want to have some room for growth.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 00:26:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19672#M14361</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2012-03-16T00:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 throughputs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19673#M14362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bob...You are correct in that throughput will vary depending on the type of traffic (SMTP, SSL, SMB, HTTP, etc) and the average packet size on your network.&amp;nbsp; If your network carries alot of zip compressed files, this will require more resource to unzip &amp;amp; scan.&amp;nbsp; So every network will be different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your description, we would need to handle 45Mbps (you also need to consider the traffic from internal to DMZ if you have a DMZ and factor it in).&amp;nbsp; Accounting for full duplex, we need to support 45Mbps in + 45Mbps out = 90Mbps total.&amp;nbsp; The PA500 offers 100Mbps&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;threat prevention throughput under the best condition so the PA500 is not the right fit.&amp;nbsp; The PA2020 offers 200Mbps threat prevention throughput which put us at 40-50% CPU usage from the start.&amp;nbsp; Then as you turn on policies &amp;amp; features, the CPU usage will increase as we would expect. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest looking at the PA2050 and contact your Palo Alto account team/partner for further discussion.&amp;nbsp; Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 03:50:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19673#M14362</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-03-16T03:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 throughputs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19674#M14363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank your for your reply.&amp;nbsp; A couple thoughts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our internet connection is limited to 40Mbps up and 40Mbps down at the ISP level Until Dec. when we will be changing our ISP.&amp;nbsp; So no matter what we will be limited to 40 Mbps up and down through Dec. 2012.&amp;nbsp; Probably a 50x10 or 100x10 after that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The high traffic is almost exclusively streaming in.&amp;nbsp; Our outbound traffic is very low (2-5 Mpbs).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As there are only a few high usage streaming sites/apps (Netflix, Youtube, etc), If I created a separate rule to NOT scan these high usage sites/apps from all of the scanning would this help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a non technical note:&amp;nbsp; The yearly renewal costs between the 500 and the 2020 are significant enough that it is going to make it VERY difficult to push through our budget.&amp;nbsp; Especially for an academic environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be speaking with my our presales engineer and sales people soon at which time I will place it in vwire mode, but any thoughts on the above would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 04:48:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19674#M14363</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2012-03-16T04:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 throughputs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19675#M14364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to tests made by NSS Labs the PA boxes performed 115% of stated performance mentioned in the datasheets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know if this is valid for the PA-500 since the test was performed on a 4xxx/5xxx box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another observation in these tests was that it basically didnt matter if you enabled/disabled scanning features such as the IDP, AV etc. As a sidenote higher throughput was observered when ALL features was enabled compared to when only one feature at a time was enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 05:47:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19675#M14364</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-03-16T05:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 throughputs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19676#M14365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're planning to increase your Internet bandwidth after Dec 2012, you would want to select the unit to support traffic for 2013 and beyond. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can define rule(s) not to scan certain traffic like NetFlix and that will help, but you run the security risk.&amp;nbsp; Well-known sites like Sony, Gmail, RSA have been compromised so it's best practice to guard against everything.&amp;nbsp; You may have heard of the Zero-Trust security model from Forrester.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also review our features (VPN, QoS, URL filtering, SSL decryption) and decide which features you plan to implement as they will require CPU &amp;amp; memory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, budget is always a consideration.&amp;nbsp; Maybe you're paying for URL subscription now that you can run on the PA device.&amp;nbsp; Typically, I find that we can save our customers quite a bit by doing so.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 13:49:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19676#M14365</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-03-16T13:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 throughputs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19677#M14366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to everyone in this thread.&amp;nbsp; Couple last, non technical, points:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I am trying my best to get away from a Watchguard I inherited.&amp;nbsp; The management is simply terrible, reporting is pretty much non existent etc.&lt;/LI&gt;&lt;LI&gt;I looked at Sonicwall, but who knows what it's future holds, and it seems it is a bit behind the times as for detecting apps.&amp;nbsp; Which, in&amp;nbsp; boarding school, with teenagers is a necessity!&lt;/LI&gt;&lt;LI&gt;It is probably not appropriate to go into the pricing on this board.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next step is to take it out of TAP mode!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all of your help,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 15:18:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-throughputs/m-p/19677#M14366</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2012-03-16T15:18:29Z</dc:date>
    </item>
  </channel>
</rss>

