Welcome to Camit Solutions
info@camit.in
Working Hour: 09:00 am - 5:00 pm

Course Details

PALO ALTO

 

 

   

 

 

 

 

 

 

   

 

   

Module 1: Platforms and Architecture


1. Understand meaning of next generation firewall [NGFW].
2. Introduction to different firewalls models in the market and market ranking of Palo Alto.
3. Parameters for deciding firewall for a network
4. Architecture of Palo-Alto OS and firewall platforms covering VM firewalls and hardware firewalls.
5. Application of various platforms suiting to different network environments.

 

Module 2: Initial Configuration


1. Introduction to WebUI and CLI of Palo Alto.
2. Configuration of initial parameters.
3. Setting up passwords.
4. Setting up of the basic network.

 

Module 3: Interface Configuration


1. Types of interfaces available in firewall.
2. Choosing type of interface for particular network design.
3. Configuring interfaces depending on network design.

 

Module 4: Security and NAT Policies


1. Types of security policies.
2. Configuration and logical design of policies

3. Order of processing the policies by the firewall.
4. Understanding and configuration of types of NAT- static, dynamic and PAT.


Module 5: App-ID


1. Understand TCP packets and how NGFW firewalls process them.
2. Drawbacks faced by traditional firewalls in understanding Layer-7 applications
3. Application awareness by Palo Alto
4. Configure App-ID in PAN-OS.


Module 6: Basic Content-ID


1. What is Content-ID?
2. Understanding SP3 architecture of PAN-OS for Content-ID.
3. Different profiles available in firewall for network security.
4. Application and design of profiles in security policies.


Module 7: URL Filtering


1. How URLs are filtered?
2. Understanding of URL filtering by PAN-OS.
3. Configuration of URL filtering.


Module 8: Decryption


1. Working of SSL.
2. Why SSL decryption is needed.
3. How PAN-OS does SSL decryption.


Module 9: WildFire


1. What is wildfire?
2. Why is Wildfire so important?
3. Understanding of wildfire reports.


Module 10: GlobalProtect and User-ID


1. Configure and manage GlobalProtect and User-ID to protect systems that are located outside of the data center perimeter.