Next-Generation Firewall |
Supported Across All Models |
Deep visibility and granular control for thousands of applications; ability to create custom applications; ability to manage unknown traffic based on policy |
|
User identification and control: VPNs, WLAN controllers, captive portal, proxies, Active Directory, eDirectory, Exchange, Terminal Services, syslog parsing, XML API |
|
Granular SSL decryption and inspection (inbound and outbound); per-policy SSH control (inbound and outbound) |
|
Networking: dynamic routing (RIP, OSPF, BGP, multiprotocol BGP), DHCP, DNS, NAT, route redistribution, ECMP, LLDP, BFD, tunnel content inspection |
|
QoS: policy-based traffic shaping (priority, guaranteed, maximum) per application, per user, per tunnel, based on DSCP classification |
|
Virtual systems: logical, separately managed firewall instances within a single physical firewall, with each virtual system’s traffic kept separate |
|
Zone-based network segmentation and zone protection; DoS protection against flooding of new sessions |
|
In-line malware prevention automatically enforced through payload-based signatures, updated daily |
|
Vulnerability-based protections against exploits and evasive techniques on network and application layers, including port scans, buffer overflows, packet fragmentation, and obfuscation |
|
Command-and-control (C2) activity stopped from exfiltrating data or delivering secondary malware payloads; infected hosts identified through DNS sinkholing |
|
Automatic prevention of web-based attacks, including phishing links in emails, phishing sites, HTTP-based C2, and pages that carry exploit kits |
|
Ability to stop in-process credential phishing |
|
Custom URL categories, alerts, and notification pages |
|
Detection of zero-day malware and exploits with layered, complementary analysis techniques |
|
Automated prevention in as few as five minutes across networks, endpoints, and clouds |
|
Community-based data for protection, including more than 30,000 subscribers |
|
Contextualization and classification of attacks, including malware family, adversary, and campaign, to speed triage and response efforts |
|
Rich, globally correlated threat analysis sourced from WildFire |
|
Third-party threat intelligence for automated prevention |
|
Automatically prevent tens of millions of malicious domains identified with realtime analysis and continuously growing global threat intelligence |
|
Quickly detect C2 or data theft employing DNS tunneling with machine learning-powered analysis |
|
Automate dynamic response to find infected machines and quickly respond in policy |
|
Bidirectional control over the unauthorized transfer of file types and Social Security numbers, credit card numbers, and custom data patterns |
|
Remote access VPN (SSL, IPsec, clientless); mobile threat prevention and policy enforcement based on apps, users, content, device, and device state |
|
BYOD: app-level VPN for user privacy |
|
Intuitive policy control with applications, users, threats, advanced malware prevention, URLs, file types, and data patterns all in the same policy |
|
Actionable insight into traffic and threats with Application Command Center (ACC); fully customizable reporting |
|
Aggregated logging and event correlation |
|
Consistent scalable management of up to 30,000 hardware and all VM-Series firewalls; role-based access control; logical and hierarchical device groups; and templates |
|
GUI, CLI, XML-based REST API |
|