Request A Quote
- Availability:
- Vendor Direct Ship | ETA - Request A Quote | Email: sales@hssl.us | Call Us: +1 888 988 5472 |
Purchase Protection
Every Order is Protected By BuySafe
Our commitment to sustainability ensures that every purchase supports responsible operations and a healthier planet.
SSL Secure Payment
We make sure your orders are processed as quickly as possible - stocked products are shipped next business day - Vendor direct ship products are processed directly with vendors with vendor leadtime.
Express Shipping
Price Match Guarantee
Your payment is secure
Your privacy and security are our top priority. Our advanced encrypted payment system protects your information during every transaction.

Get expert help
Our team of experienced professionals is always ready to help.
Product Details
Overview:
Classifies all applications, on all ports, all the time
- Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
- Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
- Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development
Enforces security policies for any user, at any location
- Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms
- Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
- Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information
Prevents known and unknown threats
- Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
- Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
- Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
The controlling element of the Palo Alto® PA-220 is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.
Highlights
- High availability with active/active and active/passive modes
- Redundant power input for increased reliability
- Fan-less design
- Simplified deployments of large numbers of firewalls through USB
Networking Features:
The PA-220 supports a wide range of networking features that enable you to more easily integrate our security features into your existing network.
| Interface Modes | ||||||||||||||||||||||||
| L2, L3, Tap, Virtual wire (transparent mode) | ||||||||||||||||||||||||
| Routing | ||||||||||||||||||||||||
| OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, Static routing | ||||||||||||||||||||||||
| Policy-based forwarding | ||||||||||||||||||||||||
| Point-to-Point Protocol over Ethernet (PPPoE) | ||||||||||||||||||||||||
| Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3 | ||||||||||||||||||||||||
| Bidirectional Forwarding Detection (BFD) | ||||||||||||||||||||||||
| IPv6 | ||||||||||||||||||||||||
| L2, L3, Tap, Virtual wire (transparent mode) | ||||||||||||||||||||||||
| Features: App-ID, User-ID™, Content-ID™, WildFire™ and SSL | ||||||||||||||||||||||||
| SLAAC | ||||||||||||||||||||||||
| IPsec VPN | ||||||||||||||||||||||||
| Key exchange: Manual key, IKEv1 and IKEv2 (pre-shared key, certificate-based authentication) | ||||||||||||||||||||||||
| Encryption: 3DES, AES (128-bit, 192-bit, 256-bit) | ||||||||||||||||||||||||
| Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512 | ||||||||||||||||||||||||
| VLANs | ||||||||||||||||||||||||
| 802.1q VLAN tags per device/per interface: 4,094/4,094 | ||||||||||||||||||||||||
| Network Address Translation (NAT) | ||||||||||||||||||||||||
| NAT modes (IPv4): Static IP, dynamic IP, dynamic IP and port (port address translation) | ||||||||||||||||||||||||
| NAT64, NPTv6 | ||||||||||||||||||||||||
| Additional NAT features: Dynamic IP reservation, tunable dynamic IP and port oversubscription | ||||||||||||||||||||||||
| High Availability | ||||||||||||||||||||||||
| Modes: Active/Active, Active/Passive | ||||||||||||||||||||||||
| Failure detection: path monitoring, interface monitoring
Technical Specifications:
|
Shipping & Return
Return Policy
You need to have a Return Authorization (RA) number before returning any products to HSSL Technologies.
For a hard copy of this form and a shipping label, please include your request in the form below.
You can also request an RA online by submitting an RA Request via email. Once you have provided HSSL Technologies with the appropriate information, we will contact you with an assigned RA number.
Defective or DOA Products
DOA or defective products are returned for REPLACEMENT ONLY with the same product/model. Deviations from this policy may result in a 20% Returns Processing Service Charge.
- Defective products must be in the original factory carton with all original packing materials.
- The Return Authorization number must be on the shipping label, not the carton. Please do not write on the carton.
- Returns must be shipped freight prepaid. Products received freight collect, without an RA number, or not approved for return will be refused.
- Return Authorization numbers are valid for fourteen (14) days only. Products returned after expiration will be refused.
- HSSL credits are based on the purchase price or current price, whichever is lower.
General Return Terms
You may return most new, unopened items within 30 days of delivery for a full refund. We will also pay return shipping costs if the return is a result of our error (e.g., you received an incorrect or defective item).
You should expect to receive your refund within approximately six weeks of giving your package to the return shipper. This period includes:
- 5–10 business days for us to receive your return from the shipper
- 3–5 business days for us to process your return
- 5–10 business days for your bank to process the refund
If you need to return an item, please Contact Us with your order number and product details. We will respond quickly with instructions for returning items from your order.
Shipping Policy
We can ship to virtually any address in the world. Note that there are restrictions on some products, and certain products cannot be shipped to international destinations.
When you place an order, we will estimate shipping and delivery dates based on the availability of your items and the shipping options you select. Depending on the provider, estimated shipping dates may appear on the shipping quotes page.
Please also note that shipping rates for many items are weight-based. The weight of each item can be found on its product detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.
Has my order shipped?
Click the "My Account" link at the top right hand side of our site to check your orders status.
How do I change quantities or cancel an item in my order?
Click the "My Account" link at the top right hand side of our site to view orders you have placed. Then click the "Change quantities / cancel orders" link to find and edit your order. Please note that once an order has begun processing or has shipped, the order is no longer editable.
How do I track my order?
Click the "My Account" link at the top right hand side of our site to track your order.
My order never arrived.
Click the "My Account" link at the top right hand side of our site to track your order status. Be sure that all of the items in your order have shipped already. If you order displays your Package Tracking Numbers, check with the shipper to confirm that your packages were delivered. If your packages each show a status of "delivered", please contact customer service for assistance.
An item is missing from my shipment.
Click the "My Account" link at the top right hand side of our site to track your order status. Be sure that all of the items in your order have shipped already. If you order displays your Package Tracking Numbers, check with the shipper to confirm that your packages were delivered. If your packages each show a status of "delivered", please contact customer service for assistance.
My product is missing parts.
Click the "My Account" link at the top right hand side of our site to track your order status. Be sure that all of the items in your order have shipped already. If you order displays your Package Tracking Numbers, check with the shipper to confirm that your packages were delivered. If your packages each show a status of "delivered", please contact customer service for assistance.
When will my backorder arrive?
Backordered items are those which our suppliers are unable to predict when they will have more in stock, but as soon as they do, we will be able to ship the item to you.
Warranty
Why Choose HSSL?
We connect businesses with the right technology solutions to power growth, security, and efficiency.

Expertise
Backed by years of industry knowledge, our specialists understand the challenges modern businesses face.

Partnerships
We collaborate with top-tier technology providers to bring you innovative & high-performance products.

End-to-End Support
Our dedicated support ensures your systems stay optimized, secure, and ready for what’s next.

Scalable Solutions
Our adaptive approach ensures your IT infrastructure evolves seamlessly as your business expands.
Expert in IT & Security Solutions
At HSSL, we specialize in delivering cutting-edge IT infrastructure, cloud, and cybersecurity services that empower businesses to thrive in a digital-first world. Our trusted professionals provide reliable insights on:
-
Digital Transformation Strategy
Empowering businesses to adapt and grow through modern, secure, and scalable digital infrastructure.
-
Advanced Cybersecurity
Protecting your organization from digital threats with proactive monitoring and smart security frameworks.
-
Cloud & Infrastructure Management
Optimizing cloud performance and IT operations for seamless scalability and improved business agility.
-
Data Backup & Recovery
Ensuring business continuity through secure data management, automated backups, and rapid recovery solutions.
-
Network & Endpoint Solutions
Delivering secure, high-performance networking systems that keep your business connected and efficient.
-
Technology Consulting
Guiding organizations toward smarter IT investments and solutions that align with their long-term goals.
