Тёмный

Palo Alto Training | Panorama Device Groups 

Mode44
Подписаться 1,9 тыс.
Просмотров 6 тыс.
50% 1

Опубликовано:

 

28 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 17   
@grahammccann8554
@grahammccann8554 6 месяцев назад
Thank you for taking the time to make this video. It was easy to follow and understand the concepts.
@mode4480
@mode4480 6 месяцев назад
Thank you very much for watching!
@vedsachit604
@vedsachit604 Год назад
One of the best video on DG
@mode4480
@mode4480 Год назад
Thank you very much, I am glad that you found it helpful and I massively appreciate the comment!
@lifequestions5546
@lifequestions5546 10 месяцев назад
Well explained. Thank you.
@mode4480
@mode4480 10 месяцев назад
Thank you very much for watching!
@nfreddyyy
@nfreddyyy Год назад
Nice video! Great info and details. Cheers
@mode4480
@mode4480 Год назад
Thank you very much for watching!
@lorinczm
@lorinczm Год назад
great content, very informative, thanks!
@mode4480
@mode4480 Год назад
Thank you very much for watching!
@tsnazzle
@tsnazzle 11 месяцев назад
Question regarding your process at about 25:00. What if you used a variable in the reference template of the device group on the interface and then targeted any device using the variable? Would it use the correct IP for the specific firewall if you overwrite the variable in the template stack for that specific device like you show later in the video? Or would it use whatever the value is in the reference template?
@mode4480
@mode4480 11 месяцев назад
Hi, Reference templates are primarily used to reference the objects contained within them when writing policies. This is helpful as it populates the dropdown options. It's important to note that interfaces on the device don't really come into play here because the firewalls are zone-driven. The value seen in the reference template has no bearing on the value displayed in the template stack. The displayed value will initially be the variable as defined when you created it, and then it will change to the overridden value once you have updated it to the value you require, and then that overridden value will be pushed to the firewall. Hope this helps and thank you for watching!
@Syed-faraz-ahmad
@Syed-faraz-ahmad Год назад
Can you tell me if I see any action allow in logs but session end reason is aged out and application is incomplete , received bytes is 0 what need to check ..?
@mode4480
@mode4480 Год назад
Hi Syed, that is definitely getting no reply, of course if the traffic is UDP you would expect the aged-out but TCP should not be, I would look at routing, make sure that you are sending the traffic where it is supposed to go, for any external traffic (to the internet) make sure you have a NAT rule to cover that traffic so it knows how to reply, PBF can sometimes get in the way without us realising as it takes precedence over routing table or static routes, application incomplete is because you are getting no reply, you need around three or five packets to detect the application. Hope this helps. Thanks for watching!
@Syed-faraz-ahmad
@Syed-faraz-ahmad Год назад
Thank you so much I watch your video and learnt a lot. Keep the good work going 😊
Далее
Palo Alto Training | HIP Host Information Profiles
21:00
Palo Alto Firewall Configuration Step By Step | PCNSA
28:34
When to use Pre and Post Security Rules in Panorama
12:00
Panorama Device Groups Object Precedence
7:47
Просмотров 2,8 тыс.
Palo Alto URL Filtering and URL Categories
15:48
Просмотров 4,8 тыс.
What is Palo Alto Panorama?
5:09
Просмотров 27 тыс.
PALOALTO NETWORKS PANORAMA DEVICE GROUPS
1:10:41
Просмотров 6 тыс.