Тёмный

PALOALTO NETWORKS PANORAMA TEMPLATES 

Firewall Life
Подписаться 1,2 тыс.
Просмотров 9 тыс.
50% 1

Through the Device and Network tabs, you can deploy a common base configuration to multiple firewalls that require similar settings using a template or a template stack (a combination of templates). When managing firewall configurations with Panorama, you use a combination of device groups (to manage shared policies and objects) and templates (to manage shared device and network settings).

Опубликовано:

 

12 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 41   
@kasunperera4296
@kasunperera4296 Год назад
Great explanation BTW are you a Sri Lankan, your accent is so sri lankan
@TheSurmukh
@TheSurmukh 2 года назад
Easy way to understand . Thanks for the upload
@firewalllife
@firewalllife 2 года назад
Thanks for the feedback. It really helps to improve contents.
@damindawt
@damindawt Год назад
Very good explanation mate. Very helpful
@firewalllife
@firewalllife Год назад
Thanks for the valuable feedback.
@mustafashake8565
@mustafashake8565 2 года назад
Good explanation Mahesh, Its's very helpful
@firewalllife
@firewalllife 2 года назад
Thank you so much for your valuable comment. It really helps.
@srinu1230
@srinu1230 2 года назад
Awesome explanation Bro, Its's Crystal clear and very helpful. Keep it up bro, Humble request you to make more videos like this... Thanks in Advance :)
@firewalllife
@firewalllife 2 года назад
Thank you so much for your valuable comment.
@srinu1230
@srinu1230 2 года назад
​@@firewalllife Hi At 24:50 you said Template stack is just a container and we don't do any config changes in Template stack but i guess its wrong. We can make Config changes in Template Stacks. I mean we can override Template config in Template stack.
@tanip5498
@tanip5498 2 года назад
Good explanation and it’s very useful
@firewalllife
@firewalllife 2 года назад
Thank you so much for the appreciation. It helps!
@info-canada9357
@info-canada9357 2 года назад
very useful and nice explanation. keep it up bro. thanks
@firewalllife
@firewalllife 2 года назад
You are most welcome
@chandimaediriweera4816
@chandimaediriweera4816 Год назад
Thank you for the video
@firewalllife
@firewalllife Год назад
Thank you for your valuable feedback.
@fcanripendra
@fcanripendra Год назад
very well explained, thanks.
@firewalllife
@firewalllife Год назад
Thanks for your valuable comment.
@boh70326
@boh70326 Год назад
Wow amazing channel, thanks mate . Any suggestions on how to pass PCNSA? Cheers
@firewalllife
@firewalllife Год назад
Thank you for your valuable feedback. Contact me via official email of the channel.
@sandeepkumaryadav2344
@sandeepkumaryadav2344 Год назад
Awesome, Awesome, Awesome
@firewalllife
@firewalllife Год назад
Thank you for the feedback. It really helps.
@rizwanrafeek3811
@rizwanrafeek3811 2 года назад
I have got a PAN 3020 chassis in production and want to migrate its configuration to chassis 820 device, there is no easy way import configuration from 3020 chassis to 820 chassis? In Cisco ASA, it is just matter of 10 to 15 minutes I could migrate the configuration from one firewall to another firewall. In paloalto is is nightmare and there is no assurance one could migrate from older chassis to newer chassis on Paloalto. Administration is nightmare in paloalto.
@firewalllife
@firewalllife 2 года назад
Thank you for your query. It really helps to improve my contents. I highly suggest you to use Palo Alto migration tool, now available under the name “Expedition”.. You can easily migrate configurations between different models of Palo Alto + Different firewall vendor such as Checkpoint to Palo Alto.
@rizwanrafeek3811
@rizwanrafeek3811 2 года назад
@@firewalllife Yes, I downloaded Expedition and installed on Linux box and I have yet to figure out how to use Expedition. You sounded very much like you are from Sri Lanka.
@firewalllife
@firewalllife 2 года назад
@@rizwanrafeek3811 Great!. If you need me to do a demo on Palo Alto Expedition please let me know. Yes Thanks.
@rizwanrafeek3811
@rizwanrafeek3811 2 года назад
@@firewalllife I wonder you have used Expedition to migrate configuration to Paloalto ? That would be awesome if you do a demo on Expedition. I have got installed successfully version 20.04, but no clue on how to make use of it.
@arlonrando
@arlonrando 2 года назад
Struggling .. have to configure my first PA-410 with Panorama 10.1. PA is registered in Panorama and connected, same firmware. Tried for testing simplest template in a stack and assigned to that PA-410, just with one Eth1 to add interface and ip address. But error messagees no matter how i trie .. seigh! Tuesday date with support. Annoying.
@prashanthb1937
@prashanthb1937 2 года назад
Hi Mahesh, using Variables we can add the IP's for interfaces or add different configurations for each firewall using variables $IP, Can you add those to this video if possible.
@firewalllife
@firewalllife 2 года назад
Thank you for your valuable comment. We will upload with requested addition asap.
@Adam-ty3zz
@Adam-ty3zz 2 года назад
Do you have more trainings for Palo Alto
@firewalllife
@firewalllife 2 года назад
You can suggest any required topic. Thank for your valuable comment.
@boh70326
@boh70326 Год назад
@@firewalllife application filters and tags in production))
@firewalllife
@firewalllife Год назад
@@boh70326 Thank you for your valuable feedback.
@dhananjay3974
@dhananjay3974 2 года назад
Very well Explained Sir I have one doubt below, In our environment we do configuration in template and push to Device directly however in this vedeo in Template stack scenario we Pushed to Stack. In template also we have option to pushed to multiple firewalls then is there need of template stack? Sir What is the difference in both cases and which method is better ?
@firewalllife
@firewalllife Год назад
Actually this is a template behavior change happened starting from PAN OS 8.1.. Previous PAN OS versions behavior was to assign managed devices to templates but starting from PAN OS 8.1 you can assign managed devices to template stacks instead of templates. Please refer to below Palo Alto official document. docs.paloaltonetworks.com/pan-os/8-1/pan-os-release-notes/pan-os-8-1-release-information/changes-to-default-behavior/panorama-changes
@dhananjay3974
@dhananjay3974 Год назад
Oh I see thank you very much sir for reply I got it now 🙂
@firewalllife
@firewalllife Год назад
@@dhananjay3974 Thanks for your valuable contribution towards building a collaborative environment for Palo Alto knowledge sharing.
@simpletalks4639
@simpletalks4639 Год назад
Hi Can we push the configuration changes through the tamplate stack?
@firewalllife
@firewalllife Год назад
Yes. This behavior started from PAN OS 8.1. Previous PAN OS versions templates were used to push configuration changes.
@firewalllife
@firewalllife Год назад
Thank you so much for your contribution.
Далее
PALOALTO NETWORKS PANORAMA DEVICE GROUPS
1:10:41
Просмотров 5 тыс.
Palo Alto BGP Over IPSec Configuration Part 1
41:32
Просмотров 9 тыс.
Как подписать? 😂 #shorts
00:10
Просмотров 706 тыс.
Palo Alto Training | Panorama Device Groups
42:48
Просмотров 6 тыс.
INE Free Course: Palo Alto Firewall Basics
1:07:09
Просмотров 151 тыс.
Palo Alto Training | Panorama Template Variables
15:30
Просмотров 3,1 тыс.
NEVER install these programs on your PC... EVER!!!
19:26
Panorama Local Log Collector Configuration
35:59
Palo Alto Firewall Training | Panorama Templates
28:27