routeprotocol.com

routeprotocol

  • Palo Altro EDU-110: User-ID

    Objectives Describe the four main components of User-ID Describe the differences between the integrated agent and the Windows-based agent Define the methods to map IP addresses to users Configure the PAN-OS integrated agent to ocnnect to monitored servers Configure the Windows-based agent to probe IP addresses for username information User-ID’s Purpose The purpose of User-ID…

  • Palo Alto EDU-110: Wildfire

    Objectives: Describe how a firewall works with WildFire Threat Intelligence Cloud Describe how WildFire analysis is used to update URL categories listed in the PAN-DB URL Filtering data Configure Session Information Settings to specify which type of session information will be sent to Wildfire Define a WildFire Analysis Profile Configure both the types of information…

  • Palo Alto EDU-110: Decryption

    Objectives: Describe the benefits of decrypting traffic Define the three decryption types that can be configured at the firewall Describe how a certificate chain of trust is used to authenticate a device, service, or person Configure an SSL Forward Proxy Review Traffic logs to determine whether SSL sessions are being decrypted Why decrypt network traffic?…

  • Palo Alto EDU-110: URL Filtering

    Objectives: Describe how the firewall uses PAN-DB database to filter user access to websites Configure a custom URL filtering profile to mimimise the number of blocked websites between trusted zones Configure safe search and logging options Configure access to only enterprise versions of SaaS applications The URL Filtering Feature Palo Alto networks maintns a PAN-DB…

  • Palo Alto EDU-110: Content-ID

    Objectives: Describe the seven different Security Policy Types Define the two predefined Vulnerability Protection Profiles Configure Security Profiles to rpevent virus and spyware infiltration Configure File Blocking Profiles to identify and control the flow of file types through the firewall Configure a DoS profile to help mitigate Layer 3 and Layer 4 protocol based attacks…

  • Palo Alto EDU-110: App-ID

    Objectives: Define application identification Describe four major technologies to help identify applications Configure application filters and application groups Detect unidentifeid applications that traverse the firewall Configure scheduling to Application ID What is an application? An application is a specific program or feature whose commuinications can be labeled, monitored and controlled Applications will include business tools…

  • Palo Alto EDU 110: Security and NAT Policies

    Objectives: Display and manage security policy rules Describe the difference between implicit and explicit rules Create a security policy Describe the difference between source and destination NAT Configure source NAT Configure destination NAT port forwarding Controlling Network Traffic All traffic flowing through the data plane of the Palo Alto firewall is checked against a security…

  • EDU-110: Palo Alto Interface Configuration

    Objectives: Describe flow logic of the next generation firewall Create a security zone Describe the differences between Tap, Virtual Wire, Layer 2 and Layer 3 Create and configure a virtual router Define a static default route Configure a VLAN interface Configure a loopback interface The flow logic of a next generation firewall The diagram above…

  • EDU-110: Initial Configuration of Palo Alto Firewall

    Objectives Connect to the firewall and login as admin Configure the network settings for the management interface port Describe the difference between the running configuration and the candidate configuration Configure dynamic firewall updates to update the applications and threats database Create a local firewall administrative account Access the firewall logs Access to the firewall The…

  • EDU-110: Security Operating Platform and Architecture

    Objectives: Describe the characteristics of the Security Operating Platform Describe the differences between single-pass architecture and parallel processing Describe the Zero Trust security model and how it relates to traffic moving through the network Cyber Attack Lifecycle Reconnaissance Attackers carefully plan their attacks: They identify and select targets, research them. Using phishing tatics or data…