<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Performance capabilities of Palo Alto 3000 Series Firewalls in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/performance-capabilities-of-palo-alto-3000-series-firewalls/m-p/34944#M25651</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PA-3000 firewalls will efficiently handle your described office requirements.&lt;/P&gt;&lt;P&gt;I can unicast you information on the capacities of the PA 3000 if you like, but your SE would be a great resource for this information as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also for DHCP, your method will work just fine, having DHCP pools on each configured sub-interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Dec 2013 16:40:11 GMT</pubDate>
    <dc:creator>tasonibare</dc:creator>
    <dc:date>2013-12-24T16:40:11Z</dc:date>
    <item>
      <title>Performance capabilities of Palo Alto 3000 Series Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-capabilities-of-palo-alto-3000-series-firewalls/m-p/34943#M25650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are currently building out our network infrastructure for a new office and have a question regarding the capabilities of the PA 3000 series firewalls. We want to use to be able to use two PA in high availability mode (active-passive) to do our routing, DHCP for different vlans, antivirus filtering, web filtering, vpn, potentially vlans, and active directory integration for the entire office. We will be implementing about 7 vlans (4 of them requiring DHCP); routing for an office of about 100 employees; internet connectivity for PCs, projectors, smart tvs, etc.; antivirus and other security features of the palo alto; ssl vpn; active directory integration for captive portal; and other items. Can anyone provide some insight on whether two PA 3000 firewalls will be able to handle this load? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if anyone has any ideas on the proper method to perform DHCP on 4 vlans via subinterfaces, that would be great. I assume that I define the layer 3 interface, create the subinterfaces with the proper tagged vlan, and then set up the DHCP pool tied to that specific subinterface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 19:55:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-capabilities-of-palo-alto-3000-series-firewalls/m-p/34943#M25650</guid>
      <dc:creator>MarkTan</dc:creator>
      <dc:date>2013-12-23T19:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: Performance capabilities of Palo Alto 3000 Series Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-capabilities-of-palo-alto-3000-series-firewalls/m-p/34944#M25651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PA-3000 firewalls will efficiently handle your described office requirements.&lt;/P&gt;&lt;P&gt;I can unicast you information on the capacities of the PA 3000 if you like, but your SE would be a great resource for this information as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also for DHCP, your method will work just fine, having DHCP pools on each configured sub-interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 16:40:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-capabilities-of-palo-alto-3000-series-firewalls/m-p/34944#M25651</guid>
      <dc:creator>tasonibare</dc:creator>
      <dc:date>2013-12-24T16:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: Performance capabilities of Palo Alto 3000 Series Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-capabilities-of-palo-alto-3000-series-firewalls/m-p/34945#M25652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the builtin DHCP in PA support logging of option82 information?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because then the log in PA would be complete with information on where the client is physically connected to the network (given that you in your access-switches also use ip-source verify and such to block spoofing clients).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 07:32:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-capabilities-of-palo-alto-3000-series-firewalls/m-p/34945#M25652</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2014-01-21T07:32:06Z</dc:date>
    </item>
  </channel>
</rss>

