Mode44
Mode44
  • 106
  • 139 285
How to | HA Link and Path Monitoring | Palo Alto Networks Training
Configuring HA failover monitors differs based on the upstream devices, in some cases interface failure is enough but to be completely sure that you have all bases covered path monitor can also be configured so that in the even the path from one of your firewalls is compromised but the interface stays up your firewalls will still failover and connectivity would continue as needed.
#PaloAltoNetworks #HighAvailability #Failover #NetworkSecurity #PathMonitoring #LinkMonitoring #Firewall #Cybersecurity #NetworkRedundancy #BusinessContinuity #PaloAltoFirewall #HA #FailoverMechanisms #NetworkInfrastructure #PaloAltoHA
มุมมอง: 234

วีดีโอ

CyberKill Chain Mitigation | Palo Alto Networks | Part 2 | Delivery
มุมมอง 90หลายเดือนก่อน
💥 Don't forget to like, subscribe, and hit the notification bell to stay updated on the latest in cybersecurity tutorials and insights. The delivery phase of the Cyberkillchain, is when the attacker as completed their reconnaissance and has prepared the malware that is to the delivered to the target, with the exception of XDR or host defenses we can look to try and reduce this risk through the ...
Answer to Decryption Profile Question | How to create Decryption Profiles Palo Alto
มุมมอง 1303 หลายเดือนก่อน
A viewer asked about my decryption (mode44) profile that is used on one of the videos about DOH, when I looked at it to see what settings it had I found it to be ever so slightly insecure, so as a reply I have put this video together (very quickly) to show the profile and what it should ideally look like. #paloaltofirewall #ssldecryption #paloaltotraining #ssl #mitm
How to Factory Reset Palo Alto Firewall
มุมมอง 1834 หลายเดือนก่อน
Sometimes you just need to start again, this process removes all configuration and licenses from the device, useful if you need to re-purpose a firewall but essential if you are disposing of a firewall, the data contained on the firewall will range from simply giving away network infrastructure information to potentially handing over private keys for servers if you are using inbound SSL inspect...
CVE-2024-3661 TunnelVision | How to Mitigate on Palo Alto Firewalls
มุมมอง 2874 หลายเดือนก่อน
Quick video to address the ways of configuring Palo Alto Firewalls to aid in the fight against the TunnelVision vulnerability, not mean to be deep dive into the vulnerability at all, more of a quick way to check / alter the Globalprotect configurations to set your mind at ease. #cve20243661 #globalprotect #paloaltofirewall #paloaltonetworks #cybersecurityengineer #hacking
How to Stop Reconnaissance Attempts | Palo Alto Firewall Training
มุมมอง 2614 หลายเดือนก่อน
A look at the tools and configurations available to us in Palo Alto Networks Strata firewalls to help stop the first part of the Cyber Kill Chain sequence, Reconnaissance is normally done externally as an attacker starts to look for ways to compromise the target or simply to learn more about the platforms in use and if there are any potential open attack vectors. Port Scanning, IP sweeps, even ...
How to use Panorama Variables on Multiple Firewalls | palo alto firewall training
มุมมอง 3595 หลายเดือนก่อน
Panorama allows us to manage and monitor multiple firewalls from a single point, adding managed firewalls to a single stack allows us to control the network and device configurations on those devices, however you can soon end up with a lot of templates and stacks, adding multiple firewalls into a single stack can solve these problems, in this video we go into the pros and cons of multiple firew...
Site 2 Site VPN part 3 | Palo Alto Firewall Training | Ciphers and Certs
มุมมอง 1747 หลายเดือนก่อน
In part 3 (my 100th video) 🎉 We look at fixing the insecure Encryption and Authentication that I had for my IPSEC Tunnels. With that fixed we also switch the IKE from PSK to Certificate based authentication although this is done in a very basic way and only really suitable in a lab environment, it is more to demonstrate the base process and hopefully to expand on the config in later videos. We ...
Dynamic Routing Over VPN | Site 2 Site Part 2 | palo alto firewall training
มุมมอง 4217 หลายเดือนก่อน
Configuring Dynamic routing over IPSEC VPN on Palo Alto Firewalls. In this video we take the Site 2 Site VPN configuration and migrate from static routing to dynamic using BGP protocol with no downtime, BGP is the protocol you are most likely to find in enterprise environments for B2B (Business to Business) VPN's and where you are peering for ISP access and point to point with Azure or Aws clou...
Site 2 Site IPSEC VPN Intro to Post Quantum | Palo Alto Training
มุมมอง 2997 หลายเดือนก่อน
Site to Site IPSEC VPN although an old subject is still a fascinating one, and of course the security of these connections is always under attack, the ability to intercept a VPN could provide an attacker unlimited information and leverage against an individual or an organisation. In this series we are going to go right through IPSEC VPN and discuss how to make more secure as well as addressing ...
DNS Security IV Monitoring and Confirmation | Palo Alto Training
มุมมอง 1847 หลายเดือนก่อน
In the final installment we check to make sure that our DNS lookups are not going to suffer with latency related issues and failures, and how to adjust the timers should you need to, also a quick look at the ACC and the differences between 10.1 and 11.1 when it comes to configuring the timeouts on the latest security subscriptions such as Wildfire and URL Filtering. #paloaltonetworks #paloaltot...
DNS Security III | DNS Over TLS | Palo Alto Firewall Training
มุมมอง 2507 หลายเดือนก่อน
Following on from the previous video on DOH (DNS Over HTTPS) this video looks at how we deal with DOT (DNS over TLS), using QUAD9 DNS service to demonstrate not only the configuration but the difference in how the traffic is blocked and dealt with when traffic is decrypted to when it is not decrypted. Although I used Stubby client on this video I must say that I did not have any particular secu...
DNS Security II | DNS over HTTPS (DOH) | Palo Alto Firewall Training
มุมมอง 4817 หลายเดือนก่อน
DNS over HTTPS can be adopted to secure the DNS traffic from your users across the internet, and is a good idea, however bad actors and people with malicious intent can also use this mechanism to exfiltrate information from a compromised browser or to send users to a phishing site, and with the traffic being encrypted the firewall (and your defenses) are unable to intervene, in this video we lo...
DNS Security Subscription | Palo Alto Training | Stopping Malicious DNS Part one
มุมมอง 7867 หลายเดือนก่อน
Launching another series this time looking at DNS security subscription from Palo Alto, using cloud based detection and signatures to provide much greater security to users even before they have visited the sites. In this video we start with where it is configured and what licenses we need as well as some of the default actions and how to change default behavior to suit individual use case need...
Initial Config V | SSL Decryption | Palo Alto Training | Tutorial
มุมมอง 5987 หลายเดือนก่อน
In this installment we are going to quickly configure SSL decryption with a self-signed certificate, this is a quick and easy way of gaining a lot more visibility into network traffic, it assists URL Filtering and Threat Prevention efficiency and reduces false positives, we also discuss the need for not decrypting certain traffic for either privacy concerns or legal reasons. #paloaltonetworks #...
Initial Config IV | Palo Alto Training | DHCP DNS and QUIC
มุมมอง 2037 หลายเดือนก่อน
Initial Config IV | Palo Alto Training | DHCP DNS and QUIC
Initial Config III | Palo Alto Networks Training | Building Security Profiles
มุมมอง 2177 หลายเดือนก่อน
Initial Config III | Palo Alto Networks Training | Building Security Profiles
Initial Config 2 | Security Zones, Rules, NAT | Palo Alto Firewall Training
มุมมอง 2777 หลายเดือนก่อน
Initial Config 2 | Security Zones, Rules, NAT | Palo Alto Firewall Training
SSL TLS Profiles | Certificate Generation | Palo Alto Training
มุมมอง 9307 หลายเดือนก่อน
SSL TLS Profiles | Certificate Generation | Palo Alto Training
Initial Configuration | Palo Alto Firewalls | Not Unboxing Video
มุมมอง 6387 หลายเดือนก่อน
Initial Configuration | Palo Alto Firewalls | Not Unboxing Video
Protect Zones with L3 and L4 Header Inspection | Palo Alto Training
มุมมอง 3478 หลายเดือนก่อน
Protect Zones with L3 and L4 Header Inspection | Palo Alto Training
Palo Alto Training | Configuring GRE Point to Point Tunnels
มุมมอง 5358 หลายเดือนก่อน
Palo Alto Training | Configuring GRE Point to Point Tunnels
Command Line (CLI) to View Panorama Pushed Configurations | Palo Alto Training
มุมมอง 1K8 หลายเดือนก่อน
Command Line (CLI) to View Panorama Pushed Configurations | Palo Alto Training
Advanced Wildfire and File Blocking | Palo Alto Firewall Training
มุมมอง 4818 หลายเดือนก่อน
Advanced Wildfire and File Blocking | Palo Alto Firewall Training
Advanced Wildfire | Palo Alto Training
มุมมอง 1K8 หลายเดือนก่อน
Advanced Wildfire | Palo Alto Training
URL Filtering Wildcards | Palo Alto Training
มุมมอง 1K9 หลายเดือนก่อน
URL Filtering Wildcards | Palo Alto Training
Palo Alto Training | Response Pages URL Filtering and an appeal!
มุมมอง 1.3K9 หลายเดือนก่อน
Palo Alto Training | Response Pages URL Filtering and an appeal!
Palo Alto Firewall Training | Software Deployment Through Panorama
มุมมอง 3309 หลายเดือนก่อน
Palo Alto Firewall Training | Software Deployment Through Panorama
Palo Alto Training | Interface Management Profile
มุมมอง 5149 หลายเดือนก่อน
Palo Alto Training | Interface Management Profile
Anti Spyware Explanation | Palo Alto Networks Training [Threat Prevention]
มุมมอง 37210 หลายเดือนก่อน
Anti Spyware Explanation | Palo Alto Networks Training [Threat Prevention]

ความคิดเห็น

  • @benedictagyemang3862
    @benedictagyemang3862 11 วันที่ผ่านมา

    Thanks for the details of this video, your contents are top notch.

  • @benedictagyemang3862
    @benedictagyemang3862 11 วันที่ผ่านมา

    Nice videos as always, this serving as a great refresher for me, thank you for your amazing job.

  • @benedictagyemang3862
    @benedictagyemang3862 11 วันที่ผ่านมา

    This is great, I just got a job on a PaloAlto migration and your youtube videos are going to help me a lot. I will donate to your channel.

    • @mode4480
      @mode4480 11 วันที่ผ่านมา

      Hi Wow, thank you! I am glad it helped so much, thank you as always for watching!

    • @benedictagyemang3862
      @benedictagyemang3862 11 วันที่ผ่านมา

      you are very welcome!

  • @benedictagyemang3862
    @benedictagyemang3862 13 วันที่ผ่านมา

    I found out about your amazing TH-cam blog and I am very happy I came here. I am heading to your website to learn more about what you do. Thank you!

    • @mode4480
      @mode4480 12 วันที่ผ่านมา

      Hi, Thank you for the awesome comment! and thank you for watching!

  • @seththomas3194
    @seththomas3194 16 วันที่ผ่านมา

    IDK, I never get a log entry in the Threat log. Also, if you are blocking quic, it just give a quic error on the browser, most any. So, something aint working the same on 11.2...

    • @mode4480
      @mode4480 16 วันที่ผ่านมา

      Hi I can honestly say that I have never seen a quic error, I suppose if the browser was now trying to force quic instead of falling back that may happen, but that would be browser side not firewall side, interesting though, I will have to look into it more, can you describe the setup you are using to get those results? Thank you for watching!

  • @silent1837
    @silent1837 18 วันที่ผ่านมา

    Thank you for such a brilliant video. Its been a while since I have worked on Palos. This was perfect refresher for me 🙂

    • @mode4480
      @mode4480 17 วันที่ผ่านมา

      Hi, Thank you for the awesome comment! and thank you for watching!

  • @baaaaaaaaaaaaaaaan2066
    @baaaaaaaaaaaaaaaan2066 23 วันที่ผ่านมา

    Thanks Mate, is the process still the same when downgrading HA Firewalls? Can we go directly to the CLI and roll back?

    • @mode4480
      @mode4480 23 วันที่ผ่านมา

      Hi As long as you check and take into account any downgrade restrictions/version control from Palo Alto in upgrade/downgraded considerations docs then yes. Thank you for watching!

  • @PaulEbee-q2d
    @PaulEbee-q2d 25 วันที่ผ่านมา

    Sir its very useful......:) becoz i perviously worked on fortinet firewalls thats bit diff we can easily copy paste the command in fortigate

    • @mode4480
      @mode4480 25 วันที่ผ่านมา

      Hi, Glad it helped, I have never worked on Fortinet firewalls to be honest so a bit of a mystery to me! Thank you for watching!

  • @Fizadigital
    @Fizadigital หลายเดือนก่อน

    Thank you :)

    • @mode4480
      @mode4480 หลายเดือนก่อน

      Thank you for watching!

  • @Fizadigital
    @Fizadigital หลายเดือนก่อน

    thank you so much Bro for your good explanation, but i wounder why you have sinkhold all categories, I usually sinkhole all default block categories only.

    • @mode4480
      @mode4480 หลายเดือนก่อน

      Hi That is a really good question and really does get to the problem I see with a lot of security practice today, so the categories vary in the potential for malicious traffic, and with this variance comes the need to put the standards and best practice docs largely to one side, I sinkhole the default-paloalto-dns because it is a Palo provided list of malicious or undesirable domains, and as such is best to sinkhole for reporting as well as security purposes, I would also suggest that C&C domains should be blocked as they serve no purpose, the same can be said for Grayware, Malware and Phishing, Parked domains are a grey area and while not really a 100 percent security risk you may want to block it if you were in a high security government organization just in case, but if you are in a low security environment you may not be that bothered, and the extra reporting and logging could just be noise that you want to tune out, same really for Ad tracking, these drop cookies and actively follow users so depending on your security stance I guess that would also be open to interpretation, However when it comes to things like proxy Avoidance and Anonymizers, if this profile was to added to corporate network access then I cannot see why you would want to allow a user to encrypt their traffic and avoid the vast majority of security measures that are in place, but where this profile is added to Guest networks you would most likely allow it as users are more often than not going to be VPN'd back to their corporate networks and will need that traffic allowed. Finally Newly Registered Domains, in todays hyperscaling cloud environments where DNS is crucial and services can be brought online using newly created domains or local domains, you would weigh up the quantity, if there is only a few then the exceptions list could be the way to go, but if there are likely to an exponential amount then you may want to accept the risks with New Domains, reducing the admin overhead. Hope this helps!

  • @hydensikk3041
    @hydensikk3041 หลายเดือนก่อน

    thank you for this wonderful video! just a question though, do you have DNS Security license or just the Threat Prevention license in this video?

    • @mode4480
      @mode4480 หลายเดือนก่อน

      Hi, I have the DNS security Subscription in this video. Thank you for watching!

    • @matthewisaac6895
      @matthewisaac6895 11 วันที่ผ่านมา

      @@mode4480 Both licenses can provide these DNS controls, but I think the difference is that the DNS security subscription provides a real-time DNS threat DB update service, whereas with the ordinary threat prevention sub you are limited to the once a day update through the threat prevention signature update? Don't quote me on that but thats from what I can deduce so far, it's not exactly that clear.

    • @mode4480
      @mode4480 11 วันที่ผ่านมา

      Hi, Yes the cloud subscriptions can be a little difficult to understand is it is not very clear at all, I have had a look and come up with the following, Threat Prevention - Locally accessed through Anti-Virus and Wildfire Updates DNS Security - Cloud based analysis and ML as well as DGA/DNS tunneling etc Advanced DNS Security - All DNS Responses are sent to cloud for analysis, on PANOS 11.2 and above there are extra features for Hijacking and Domain Misconfiguration detection, ML and realtime analysis That is what I get from the documentation, hopefully that is somewhere near!

  • @Slavey
    @Slavey หลายเดือนก่อน

    Thank you, clear explanation, however I still cannot find how a way to use variables created in different template.

    • @mode4480
      @mode4480 หลายเดือนก่อน

      Once the variable is created in a template the template is the object that is reused then the variable can be assigned a different value depending on the device that template is attached to, as far as I am aware there is no "global" variable type in panorama that could be used independently across templates. Hope this helps and thank you for watching!

  • @rubberduck_proyect
    @rubberduck_proyect หลายเดือนก่อน

    thank you for share this content, well done

    • @mode4480
      @mode4480 หลายเดือนก่อน

      Thank you for watching!

  • @edwardguzinski9853
    @edwardguzinski9853 2 หลายเดือนก่อน

    So is the difference between an interzone and universal rule that with an interzone, the traffic only flows one way (Source Zone A to Dest Zone B but B can't go back to A) but with a universal one it's bidirectional?

    • @mode4480
      @mode4480 2 หลายเดือนก่อน

      Hi, Within the Palo Alto firewall there are two types of traffic flow with regard to zones, either intrazone or interzone, so if we had a rule with A,B and C zones in both the source and the destination a universal rule would allow intrazone traffic to flow (in this case A to A, B to B, C to C) and interzone traffic, A to B or C if we were to use interzone rule type A to A would not be permitted and if we use intrazone rule type, A to A would be permitted but A to B would not. Also when creating intrazone rules the destination zone is greyed out in the policy making the security policy a little easier to read. Hope this helps, and thank you for watching!

  • @popescusilviu9948
    @popescusilviu9948 2 หลายเดือนก่อน

    Hello! How did you configure the syslog server profile for xsoar, if you can help me.

    • @mode4480
      @mode4480 2 หลายเดือนก่อน

      Hi, I will go back over the config and see if I can put together a quick video showing the configs, do you mean the integration on XSOAR to listen for the logs or the Syslog profile on the firewall or both ? I will try and cover both sides, not sure when it will be but I will try and get one soon. Thank you for watching!

    • @popescusilviu9948
      @popescusilviu9948 2 หลายเดือนก่อน

      @@mode4480 thank you for your quick response. I figured what was configured from the previous video. Another question would be if I can do this with a panorama integration, or just with the firewall?

    • @mode4480
      @mode4480 2 หลายเดือนก่อน

      Hi, Yes, if you were to send the call to Panorama it would populate the list and then that would be updated on all the managed firewalls using that dynamic address group, the log action however that triggers the chain of events would have to come from a firewall, or potentially if you had log collectors configured and they were forwarding to XSOAR, but due to the fact that they do that in a batch fashion and not in real time that wouldn't be as reactive as from the firewalls. Hope that helps!

  • @nikhil23911
    @nikhil23911 3 หลายเดือนก่อน

    Neat explanation. Subscribved for more videos on PAlo alto FW

    • @mode4480
      @mode4480 3 หลายเดือนก่อน

      Thank you very much for watching!

  • @grahammccann8554
    @grahammccann8554 3 หลายเดือนก่อน

    Thank you for taking the time to made this easy to follow video.

  • @ramboyadas
    @ramboyadas 4 หลายเดือนก่อน

    Hi, Amazing content. Thanks for sharing your insights. Just a quick question, what is the configuration for Mode44 Decryt Profile? It doesn't appear on any DNS videos. 😐 Thank you.

    • @mode4480
      @mode4480 3 หลายเดือนก่อน

      Hi, Sorry for the delay, I thought I'd make a quick video to go through the decrypt profile, hope it helps! Thank you for watching!

  • @Josellv_
    @Josellv_ 4 หลายเดือนก่อน

    Hi there! I'm have issue with our visitors' network. We need to display custom response pages for prohibited websites based on the URL Filtering Profile and its rules. While blocking works perfectly, the custom response pages for HTTPS sites result in an ERR_CONNECTION_RESET error.

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Hi, Are you doing SSL decryption? this can be the cause of the issue you are seeing, just thinking about this, you will also see this if you are sending the handshake to the CTD for inspection, as this stops the connection at the handshake if it is in violation of security policy, this then sends a HTTP Reset and will not serve a response page, this setting can be found under the Setup>Session menu, scroll to the bottom and click on the SSL Decryption Settings. Thank you for watching!

  • @iridion68
    @iridion68 4 หลายเดือนก่อน

    @mode44 Great work you do, do you have any videos about GP and DUO MFA using the integration in PAN? There is little information but it's variable, the options mentioned in some sources from 4 years ago are no longer available. It would be very interesting because it's a bit complicated to find information about the whole process.

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Hi, Thank you for the compliment! I don't at the moment, but I setup DUO a long time ago for 2-factor into my XSOAR instance, I can certainly look into it and see what I can put together.

  • @TomasYepez
    @TomasYepez 4 หลายเดือนก่อน

    You cut the video at minute 9:24, what problem did you have? I assume that the firewall went down and it took you an hour to recover it, If so, please tell us the error and how to recover it or avoid it?

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Hi, Thank you for watching so closely! I think that you must be looking at the last login time and session expire times in the bottom left hand corner of the webui, these are the only time signatures I can see displayed on the video, these are not reflective of the actual time the video was shot just the last time logged in, the only thing I can think is that possibly one firewall was set to GMT and one to UTC (UTC does not have summertime) to account for the hour difference, that video was a long time ago now but I certainly don't remember any hour long recovery session, at 9:24 I am failing over the firewalls, as long as the HA is good (which it was) and the sessions were building there is very little that could go wrong. Thanks for watching!

  • @unetlan4220
    @unetlan4220 4 หลายเดือนก่อน

    good work mate. keep it going.... how come you transition from Mode44 to fashion44 :) whats story behind? and other question. PA with DNS proxy in cooperation with X-forward-for? any practical info? as dns proxy, there will be no log from the real IP. any efficient way to find out who is the original requestor. im getting alot of logs hitting sinkhole and would like to know the real originator. thanks in advance

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Fashion44 :) is there something I have missed? lol

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      For the DNS question what I would do is ensure that the sinkhole address is in a zone that means the traffic has to pass through the firewall to get to it, create a rule and log on that or simply run a report for hosts using the sinkhole address for normal traffic say SSL for example, the initial DNS query and DNS security logs will show the proxy as it is the proxy making the DNS lookup but there will also be the hosts that have been given the sinkhole address trying to use it to get out. Hope that is helpful!

  • @anuragdixit87
    @anuragdixit87 4 หลายเดือนก่อน

    my Question related to is it also decrypting Data inside packets ??? if yes then how Financial sites become secure ...anyone can fetch confidential data inside packet ..

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Hi, This is more a question of policy, essentially (if I understand your question correctly) SSL decryption rests on the premise that people using a corporate network agree to having their traffic decrypted for inspection purpose based on the fact that they are using somebody else's equipment and infrastructure for work related purposes as opposed to private personal use, so the onus in that case would be on the user to moderate their behavior against what they know is going to be seen, however when it comes to financial information and other privileged data such as health and medical for instance there are multiple laws governing the ability to decrypt this traffic and in every case I am aware of it is deemed illegal and can not be done, therefore the situation would never arise, that is why the no-decrypt policy is as important as decrypt policy. SSL decryption does mean that the traffic would pass through the firewall in plain text so we control what data gets decrypted to ensure the balance of security for users privacy and security and the company providing the infrastructure to the employee / sanctioned user. Hope that helps!

  • @lifequestions5546
    @lifequestions5546 4 หลายเดือนก่อน

    Thank you for the great video. Just quick feedback, there is a static background in the audio. Hope your next video will be crystal clear 🙂

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Yep, totally, I heard that on the first pass through but when I checked the final render it seemed to have disappeared, obviously not, will try harder!

  • @soyyo3332
    @soyyo3332 4 หลายเดือนก่อน

    This is very helpful - subscribed

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Thank you for watching, and a big thank you for subscribing!

    • @soyyo3332
      @soyyo3332 4 หลายเดือนก่อน

      @@mode4480 no problem - i work in healthcare and we have palo alto firewalls in our environment HA pair with panorama I want to take my PCNSE any good recommendations on study material?

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      I would use Tom Piens Book "Mastering Palo Alto networks", and of course the training can be found on Palo Alto's own Beacon platform, it is a good cert to get, good luck with it!

  • @lifequestions5546
    @lifequestions5546 4 หลายเดือนก่อน

    Another great video. Thanks.

    • @mode4480
      @mode4480 4 หลายเดือนก่อน

      Thank you very much!

  • @AmitSingh-wk1yy
    @AmitSingh-wk1yy 5 หลายเดือนก่อน

    best video

    • @mode4480
      @mode4480 5 หลายเดือนก่อน

      Awesome, thank you very much for watching!

  • @grahammccann8554
    @grahammccann8554 5 หลายเดือนก่อน

    Excellent video! It provided a comprehensive overview of the pros and cons. Thanks for dedicating your time to creating such valuable content.

    • @mode4480
      @mode4480 5 หลายเดือนก่อน

      Thank you very much for watching!

  • @luisescobar8688
    @luisescobar8688 5 หลายเดือนก่อน

    To do the downgrade (rollback case) is it the same process?

    • @luisescobar8688
      @luisescobar8688 5 หลายเดือนก่อน

      Thanks for the video, it is perfectly explained the upgrade

    • @mode4480
      @mode4480 5 หลายเดือนก่อน

      There are some other considerations depending on how far back you are going, but as a general rule yes, an example of the downgrade advice from Palo for 10.2 to 10.1 for instance can be found here, docs.paloaltonetworks.com/pan-os/10-2/pan-os-upgrade/upgrade-pan-os/upgradedowngrade-considerations#idabba79e8-9c44-4360-b961-db7f118df20a ( I really need to shorten the URLS but I think sometimes they look dodgy ) let me know if you think a video on downgrade would be useful and I can put one together. Thank you very much for watching!

  • @DavidWhatfor
    @DavidWhatfor 5 หลายเดือนก่อน

    Been using PAs for coming on 10 years, jus started to use Panorama and having incredible issues with address groups not updating. Takes a few attempts but have to check everytime now before I can confidently go bac to user and ask them to check working without making myself look like a fool :-( So frustrating but glad we are not alone in this issue.

    • @mode4480
      @mode4480 5 หลายเดือนก่อน

      I feel your pain! there must be an underlying issue somewhere in the device-group that is causing this, I wonder if it is the inheritance? If you get to the bottom of it please share as Panorama is awesome but does come with it's quirks :-) Thank you for watching!

  • @grahammccann8554
    @grahammccann8554 5 หลายเดือนก่อน

    Thank you for taking the time to make this video. It was easy to follow and understand the concepts.

    • @mode4480
      @mode4480 5 หลายเดือนก่อน

      Thank you very much for watching!

  • @SentinelBerean
    @SentinelBerean 5 หลายเดือนก่อน

    This is the best triaining video specifically for this cert that I've seen

    • @mode4480
      @mode4480 5 หลายเดือนก่อน

      Thank you for watching! XSOAR and by extension XSIAM are awesome platforms, these videos are getting a little old now but I am glad they are still helping

  • @robertoospina10
    @robertoospina10 6 หลายเดือนก่อน

    Excellent!

    • @mode4480
      @mode4480 6 หลายเดือนก่อน

      Thank you for watching !

  • @shafeequem4177
    @shafeequem4177 6 หลายเดือนก่อน

    While performing Panorama upgrade you starting with secondary node first but when upgrading firewall you starting with primary node, is there any reason please ?.

    • @mode4480
      @mode4480 6 หลายเดือนก่อน

      Hi When upgrading firewalls there has to be the sessions that are running through that firewall to consider, so in that case I would failover the firewalls to check that there is no issues with traffic while we still have a working known good firewall, this is not the case with Panorama, Panorama is not in the traffic path and therefore we do not have the same considerations as with firewalls, so in this case I would (and have) confirmed that the Panoramas are in sync, check that the firewalls that are connected to one are also showing connected to the other in the HA pair, there is some telemetry between the firewalls and Panorama and so there is some need to make sure that we miss as little information as possible during the upgrade, but for me the most important thing is that the Panorama's are in sync and have the same configuration on both. I have said on other videos that really the process followed is up to the engineer completing the task, for instance simply upgrading the Primary firewall then the secondary would work in theory, but it would be risky, it is the risk tolerance of the engineer and the business that often determines the upgrade procedures, or content updates etc. Hope this helps.

  • @rahulchanda-s7x
    @rahulchanda-s7x 6 หลายเดือนก่อน

    Very Helpful video. Sincere Thnaks.

    • @mode4480
      @mode4480 6 หลายเดือนก่อน

      Thank you for watching!

  • @pravindalvi5533
    @pravindalvi5533 6 หลายเดือนก่อน

    Congratulations for 100th video, great knowledge 🎉

    • @mode4480
      @mode4480 6 หลายเดือนก่อน

      Thank you for watching !

  • @tommorse6614
    @tommorse6614 6 หลายเดือนก่อน

    Nice video, except you didn't explain why the logs would show a verdict of malicious but then shows it as Allowed. When and where do I look to see if it blocked the malicious file. I have a lot of those and cant understand why. Makes no sense to me. I understand maybe the rule allows the connection, but once a file is determined maliscous, shou'd show as blocked

    • @mode4480
      @mode4480 6 หลายเดือนก่อน

      Hi I will admit there is some grey area here that I have not looked into fully since the video, the truth of the matter is that some files that were given the verdict of malicious were then given an allow action but when the file itself was examined although it had completed there was no content to the file, whereas there were other files that did have the action of block, these were exclusively informational severity however. It is worth noting that even in the official Wildfire example from Palo Alto the idea seems to be that once a malicious verdict is determined this allows an admin to block the user involved by virtue of receiving a log of the event, the "Zero day" protection is then based on the fact that a Wildfire signature will be created for the file and that will be available almost immediately based on Wildfire update settings (real-time or 15 minutes are the only ones that make sense) and through Anti-Virus updates at whatever frequency you have them set, meaning that any further occurrences of the malicious file would then be blocked based on signature, these are all provided that the action for the varying signature sources within the Anti-Virus profile are set to do so. Now the question is does this actually provide the Zero-Day protection claimed? well it sort of does but it still requires at least one machine to become infected, there is in version 11.0 and above the option to hold for Wildfire signature lookup which would make more sense to stop even the first person becoming infected, and you could create a log forwarding profile that has a tagging action to block users that trigger Wildfire or Threat log entries to add them to a dynamic block group but you would still have that first infection. The Document with the official Palo Alto Wildfire example can be found here docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-example Hope this helps!

    • @tommorse6614
      @tommorse6614 6 หลายเดือนก่อน

      Excellent answer and video. I think the confusion for us is that the session goes through and if it already has a threat signature (threat ID) of any kind, Palo does whatever your security profiles are set to, so you may see a malicious verdict but then its allowed. If you search threat logs, you will find that Palo has already taken an action on the sessions threat pass, so that threat may have been a medium vulnerability with the action of allow for example. So its only new or unknown threats that Wildfire has newly identified with a new signature that it will take a wildfire action based on the anti-virus profile wildfire settings @@mode4480

    • @mode4480
      @mode4480 6 หลายเดือนก่อน

      I think you answered that better than me!

  • @zacragoonath
    @zacragoonath 7 หลายเดือนก่อน

    appreciate it. The steps were easy to follow

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Thank you for watching!

  • @lifequestions5546
    @lifequestions5546 7 หลายเดือนก่อน

    Congratulation on getting to 100th video. It has been great watching most of your videos. Very insightful and technically sound.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Hey, Thank you, it has been a long journey, hopefully get to move more into automation and Prisma soon!

  • @TomWhi
    @TomWhi 7 หลายเดือนก่อน

    It’s interesting to see the v11 bug with the redistribution, then going into panorama to see the devices not being shown as out of sync, I thought it was only Fortigates riddled with that many bugs across products!

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      I really wish it was only Fortigates lol, in fairness to Palo the version 11 box is still quite an early release, they don't seem to get into their stride until around the xx.6.x versions, but yes there are multiple bugs to be found, as a rule if I cannot get something to work through the Webui I tend to try command line, it usually solves the problem, it is odd that you have to commit to Panorama for the templates to be set as out-of-sync and a little annoying too, hopefully they will fix it in a later version.

    • @TomWhi
      @TomWhi 7 หลายเดือนก่อน

      @@mode4480 yeah I'd agree I'd never really look to deploy anything on an FG that's before an x.4 release but still find little annoying things in later releases too. It was good to see the BGP process though even though the bugs 👍

  • @TomWhi
    @TomWhi 7 หลายเดือนก่อน

    This is a brilliantly well described video. I'm new to Palo and Panorama so having resources like these are very important to me, I'll look forward to trying this out in my own lab now i've got more of an understanding where to start. I've already bookmarked my next video to watch and subscribed to learn more. Thanks again.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Hi Thank you for the awesome comment! I hope my other videos help too.

  • @dheenadayalan2933
    @dheenadayalan2933 7 หลายเดือนก่อน

    does palo allow first time to download the 0 day malware ? and only send a copy to wildfire or it will block at the first time and send it wildfire ? i am wounding palo allow or deny the very first time traffic which is 0 day and no reference DB. thanks

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Hi Once Wildfire has executed the sample that has been sent which it can do in multiple environments it can then send a verdict to the firewall, if this verdict is malicious in any way then the firewall should block the traffic, the signature of the sample is then downloaded to the firewall in the Wildfire update and eventually the Threat Content Updates.

  • @jairathor5820
    @jairathor5820 7 หลายเดือนก่อน

    Can you help me understand why logs are generated for policy verification realted to src hip and dst hip target negate no

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Hi, I am not quite sure what you are asking ?

  • @0xRakan
    @0xRakan 7 หลายเดือนก่อน

    Is there a way to allow only one directory and block anything else? For example, I want to allow x.x.x.x which will be automatically redirected to x.x.x.x/index.php which I want to allow but block anything besides this index.php

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Hi Good question, I have had a quick look this morning at this, the issue is that the top level has to be permitted or the initial connection will, of course, be blocked, this means that you would have to create two custom categories one to allow the traffic and one to block all other traffic, this would need a full site map to be loaded into the Palo though as , for instance, a wordpress site would have artifacts required for correct rendering in sub-directories like wp-content for example, I did have mixed success with this, I then tried adding the category as a destination for an Allow rule and a Block rule respectively, this did not work, there was simply not enough control. You should be able to achieve this with the two custom category method but as I say they would have to be very comprehensive. As a note I was testing using standard navigation and not against a redirect however the request still comes from the client in both cases. Hope this helps a little!

  • @lifequestions5546
    @lifequestions5546 7 หลายเดือนก่อน

    Thank you. Another great video.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Thank you for watching!

    • @TomWhi
      @TomWhi 7 หลายเดือนก่อน

      Thanks for the information. I always like to point people to the National Cyber Security Center website when talking about VPNs because they have good advice for people unsure what to set for their tunnels. They reference the gcm suite and a legacy profile… ncsc encryption standards is a good search 👍🏼

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Yes, absolutely, there is a lot of good info out there on security standards etc, and it is always good to read up on the latest recommendations, I think all videos should point out that the "click here and there" part of the narrative is simply the mechanics in making the configuration work on the platform, the type of configuration usually differs due to multiple variables that will never exist in a lab and of course even in real life my environment won't be the same as yours requirement wise. I also use ( and have contributed too) CIS and found that a lot of vendors including Palo Alto use them in their BPA mechanisms. NCSC Website www.ncsc.gov.uk/ CIS Website www.cisecurity.org/ Report a Security incident report.ncsc.gov.uk/

  • @JosephJohnson-sq4bu
    @JosephJohnson-sq4bu 7 หลายเดือนก่อน

    very helpful guides as always

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Thank you!

  • @lifequestions5546
    @lifequestions5546 7 หลายเดือนก่อน

    Excellent! Very easy to understand.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Thank you for watching !

  • @lifequestions5546
    @lifequestions5546 7 หลายเดือนก่อน

    Thanks for a great video.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Thank you for watching!

  • @lifequestions5546
    @lifequestions5546 7 หลายเดือนก่อน

    Thank you for great lab. Regarding "quic" I think it should also deny quic udp port 80 and 443.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      That is a very good point, indeed yes UDP port 80 and 443 should be blocked, I will make sure it goes into the decrypting DOH video!

    • @lifequestions5546
      @lifequestions5546 7 หลายเดือนก่อน

      @@mode4480 If I can request, address DoT and DNScrypt as in PAN-OS 10.2 Nebula and different treatment in PAN-OS 11.1.1 Cosmos. Thank you. If it gets too long. May split them into 2 videos.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Hi It is on the list to do, so watch out for it soon!

  • @lifequestions5546
    @lifequestions5546 7 หลายเดือนก่อน

    How does the URL Filtering can cause potential DoS attack when applies to the inbound rule? Mind explaining a bit? Thanks.

    • @mode4480
      @mode4480 7 หลายเดือนก่อน

      Hi No problem at all, there are two reasons why you wouldn't have URL filtering on an inbound rule, the first one is because it wouldn't really be required, if you were hosting a web server in a DMZ for instance you would tend to control access through a security rule and a NAT rule potentially controlling sessions either through session distribution NAT or a downstream loadbalancer, in any case the access would not be controlled through URL filtering, the second reason was more what I was referring to in the video, there was a bug that relied on a misconfiguration of URL filtering on inbound rules where response pages were configured, this meant an attacker could (in theory) continually make requests to the firewall using a spoofed IP of their intended victim, then with enough requests and bandwidth their victim would get continual traffic from your firewall as the firewall serves the response pages, ultimately leading to either degraded service at the victim side or DOS, and this attack would appear to come from your firewall IP. Hope that made sense, thank you again for your continued support!

    • @lifequestions5546
      @lifequestions5546 7 หลายเดือนก่อน

      @@mode4480 Thank you.