Тёмный

Tutorial: Configuring Your Security Policy 

Palo Alto Networks LIVEcommunity
Подписаться 35 тыс.
Просмотров 38 тыс.
50% 1

View details at bit.ly/28JlJoc. Guidelines and best practices when building and reviewing your security policy. Let's take a closer look at zones, security profiles, and more. See more and learn more at live.paloalton...

Опубликовано:

 

5 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 17   
@RogueDire
@RogueDire 5 лет назад
Great video, I really would've loved to see more of "configuring security policy" best practices in terms of overall rule positioning i.e. top rules vs more specific or block rules etc. best practice to get started with a well structured sec policy and also cover more on app dependencies in a sec rule etc. thanks!
@sajjadanwer8908
@sajjadanwer8908 6 лет назад
Well - explained Sir , Thanks for making this wonderful video .
@PANgurus
@PANgurus 6 лет назад
thanks! :D
@delroyfletcher8089
@delroyfletcher8089 3 года назад
Is the 3rd WAN-connection rule allowing unsolicited inbound traffic from the internet?
@vindaniell1111
@vindaniell1111 3 года назад
I also think this allows unsolicited inbound traffic. Granted, only for approved apps but still not good.
@amerrasheed3986
@amerrasheed3986 7 лет назад
Great work
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 7 лет назад
Thanks for your comment! We're glad you found the video helpful!
@HughJass-jv2lt
@HughJass-jv2lt 3 года назад
13:00 Where that link to the *File Blocking* video you spoke of? lol
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 года назад
Here you go 😉: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-RsIDpTFAKKA.html
@christianalinas
@christianalinas 4 года назад
Awesome!!!!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Thank you! Feel free to check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@rastafariaanh1252
@rastafariaanh1252 3 года назад
Based on the policy match Palo Alto design + the rules order from the video ( with first rule with deny) , wouldn't all the traffic from the zones and subnets mentioned in the rules be Blocked by default, thus making the below rules to have no hits?
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 года назад
No, only the traffic that matches the applications configured in the blocked-apps-filter object will be denied by the first rule. Other traffic (read other applications) will not match this rule and will hit the below rules.
@rastafariaanh1252
@rastafariaanh1252 3 года назад
@@PaloAltoNetworksLiveCommunity but why? On the 1st policy look up, the matching is done based on src zone dst zone src ip dst ip + services .
@rastafariaanh1252
@rastafariaanh1252 3 года назад
@@PaloAltoNetworksLiveCommunity but why? On the 1st policy look up, the matching is done based on src zone dst zone src ip dst ip + services .
@muhammadikbalharahap3621
@muhammadikbalharahap3621 5 лет назад
I want to limit bandwidth, how to configure on palo alto 220 ?
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 5 лет назад
There are many things you can do to limit bandwidth. One way is with QoS. Please check out this video for more info: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-7fU91SZ5xDk.html
Далее
Tutorial: Auto-tagging & DNS Sinkhole
19:56
Просмотров 16 тыс.
Песня РАСПУТИН на русском!🔥
00:56
ЭТО НАСТОЯЩАЯ МАГИЯ😬😬😬
00:19
جزء الأول immo diagzone
2:37
Просмотров 7
Tutorial: Searching Through Logs: Where Do I Start?
15:00
How to Configure Security Policy in Palo Alto Firewall
29:14
#TheSASEShow: SASE is Groovy, Baby!
14:23
Просмотров 6 тыс.
Video Tutorial: Zone Protection Profiles
16:51
Просмотров 32 тыс.
Decrypting Decryption (Episode 24) Learning Happy Hour
34:34
Tutorial: How to Configure WildFire
11:20
Просмотров 25 тыс.
Песня РАСПУТИН на русском!🔥
00:56