Тёмный

Palo Alto SSL Inbound Inspection with Let's Encrypt Certificate [2024] 

NETSums
Подписаться 3,5 тыс.
Просмотров 2 тыс.
50% 1

Наука

Опубликовано:

 

28 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 17   
@yummyummy8662003
@yummyummy8662003 4 месяца назад
Hi Ricardo, thanks for the another quality video on palo. The details in the video shows your hands on experience on the platform. I would suggest to have couple of videos on global protect where you can show the Wireshark capture when internal gateway and external gateways are in use and to clearly distinguish how the tunnel is being created and packet details when connecting to external gateway along with traffic flow to specific destination with split tunnel configuration options
@andrey-qx7kg
@andrey-qx7kg 2 месяца назад
God bless you man! This is the most detailed guide what I've seen .
@netsums
@netsums 2 месяца назад
Glad you liked it!
@fantasycuber5056
@fantasycuber5056 7 месяцев назад
I really like the way you go about explaining things with a practical for everything unlike others Keep up the good work
@netsums
@netsums 7 месяцев назад
Thank you for the nice comment, I'm glad you like the videos!
@mohammedqureshi995
@mohammedqureshi995 7 месяцев назад
Another great video appreciate for providing such a great information very interesting and interactive.
@netsums
@netsums 7 месяцев назад
Glad you enjoyed it, thanks for the comment.
@zs8850
@zs8850 5 месяцев назад
Awesome video!
@netsums
@netsums 5 месяцев назад
Thank you, I'm glad you liked it!
@Killa_krayon917
@Killa_krayon917 2 месяца назад
This was great and informative. I am hoping to deploy this very soon. Does the Palo encrypt the data once it has inspected it and sends it to the final destination? I'll search the PA KBs in support but I'm just wondering how the last leg of data is handled. For topics I would like to see a video on HA Active / Active with shared resources and converged NAT table to eliminate the need for Source NAT when a resource is available via two external gateways.
@netsums
@netsums 2 месяца назад
Thank you for your video suggestion. And yes, the Palo Alto encrypts the data again going to the server. It doesn't do SSL offloading.
@kalibygomes3443
@kalibygomes3443 7 месяцев назад
Excelente conteúdo, obrigado!
@netsums
@netsums 7 месяцев назад
Obrigado também pelo comentário! 😊
@르브론시몬스
@르브론시몬스 7 месяцев назад
hi Please produce a panorama duplication guide video and a panorama duplication log setup video.
@victorb9157
@victorb9157 Месяц назад
Hi, Did I missed something - there is no need to setup NAT for server inside?
@netsums
@netsums Месяц назад
Hi. In my lab, my internet router does the NAT for the server. But yes, either you have a server that is accessible through the internet (public IP), or some device needs to do NAT. It can be the Palo Alto firewall, but it doesn't have to be.
@victorb9157
@victorb9157 Месяц назад
In case of NAT on PA in Decryption Policy you should specify the preNAT port (in case you changed it e.g. 8443 -> 443) and preNAT IP (e.g. outside interface public IP) in address field. It may be not that obvious. Moreover you can omit the destination IP address and it will work - PA will just check the Certificate in Dec. Profile.
Далее
Palo Alto - Temporarily Block Attackers [2024]
16:25
Просмотров 2,1 тыс.
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
GlobalProtect Internal Gateway with SAML/OKTA [2024]
19:51
Palo Alto URL Filtering and URL Categories
15:48
Просмотров 4,8 тыс.
Quick and Easy Local SSL Certificates for Your Homelab!
12:08
Гаджет из даркнета 📦
0:45
Просмотров 350 тыс.
Какой iPhone купить в 2025 году?
12:10