Palo Alto User-ID™ enables you to identify all users on your network using a variety of techniques to ensure that you can identify users in all locations using a variety of access methods and operating systems, including Microsoft Windows, Apple iOS, Mac OS, Android, and Linux®/UNIX. Knowing who your users are instead of just their IP addresses enables.
0 Comments
To view Firewall Configuration Essentials 101 Course, please login to the Palo Alto Networks Learning Center.[Updating] 1. Palo Alto Networks Platforms The PA-500, PA-200, and VM-Series firewalls do not support virtual systems. High Availability and Aggregated interfaces are also only supported on higher models of the product. The even-numbered platforms are older platforms. The PA-4000 is End-of-Sale. The PA-3000 and PA-5000 models use superior hardware, such as Cavium chips and SSD for logging. The PA-7050 is a chassis architecture. The Control Plane has its own dual core processor, RAM, and hard drive. This processor is responsible for tasks such as management Ul, logging, and route updates.
2. Initial Access to the System
2.1 Initial Access to the System
2.3 Licensing and Software Updates 2.4 Account Administration 2.5 Administrative Controls CLI Mode:
CLI Tools:
3. Basic Interface Configuration 3.1 Security Zones 3.2 Interface Types
3.4 DHCP 3.5 Interface Management
4.1 Security Policy Overview 4.2 Security Policy Administration Security Zone Rules - Three types
4.3 Network Address Translation (NAT) Source NAT
Destination NAT 5. Basic App-ID Application Identification (App-ID) App-ID Overview Application Groups and Filters 6. Basic Content-ID Content-ID Overview Security Profiles Security Profile Administration Zone Protection Profile 7. Decryption Certificate management Outbound SSL Decryption Inbound SSL decryption Other Decryption Topics 8. Basic User-ID Configuring User-ID Mapping Users to Group Working with the Windoes User-ID Agent Mapping Users to IP Addresses: Syslog Integration 9. Site-to-Site VPNs Site-to Site and Client VPNs Site-to-Site VPN Configuring Site-to-Site Tunnels IPSec Troubleshooting 10. Management and Reporting Dashboard Basic Logging Viewing and Filtering Logs Basic Reports 11. Active/Passive High Availability Active/Passive High Availability Overview Active/Passive Configuration Managing Split Brain Monitoring Active/Active Overview 12. Panorama Panorama Overview Centralized Configuration and Deployment Centralized Logging and Reporting Role-Based Access Control
|
|