Palo Alto Firewall - App ID Training Video with Lab
ฝัง
- เผยแพร่เมื่อ 27 ส.ค. 2019
- For complete Self-paced training materials visit nettechcloud.com
Trainer : Manoj Verma (CCIE # 43923)
COURSE : Palo Alto Firewall Configuration, Management and Troubleshooting - PAN 10
Course Description:
The Palo Alto Networks Firewall Configuration, Management and troubleshooting recorded training course will help you to:
Configure and manage the essential features of Palo Alto Networks Next-Generation Firewalls
Configure and manage Security and NAT policies
Application ID , User ID and Content ID
Configure and manage Threat Prevention strategies to block known and unknown threats
IPsec Site to Site and Remote access VPNs
High Availability Deployment
Packet Flow and Troubleshooting
This training is the most important course as it covers all the fundamentals to understand the Next-Generation Firewall from the ground up. Even experienced firewall engineers can take a lot out of this course as it includes, besides the architecture and management essentials, topics like Application Identification, Content ID (IPS, Anti-Virus/-Spyware, URL Filtering, File Blocking), SSL Decryption and User Identification which are all features usually not supported by legacy firewalls
“We not only explain the theory but how to use every feature in real life with practical demonstration and troubleshooting"
#FIREWALL #PALOALTO #NettechCloud
Best video on App-ID, maybe u should have covered App-ID override too.
Awesome...... Very helpful its worked .
thanks for resolving our doubts
Best way of teaching
well explained!! sir thanks for sharing....
Superb bro.Fantastic explanation.Keep Rock.
Awesome...... Very helpful its worked .....
Thanks for sharing....
Very indepth explanation.... thanks
Superb...👍
well explained Sir. Appreciate your effort!!
Very in-depth explanation.... thanks sir
Great video...
Excellent training
Awesome Sir
Well explained sir.. thanks
Well explained sir... very informative video
excellent sir
Thank you sir 😊
Most welcome
thanks Very much :)
Sir, Could you please clarify my query.
We currently do not do traffic decryption on the firewall for deep packet inspection. Can we safely consider converting eligible rules to application-based rules even though we don't do any traffic decryption on the perimeter firewall?
My concern is that since we don't decrypt traffic on the perimeter firewall we will not be able to accurately identify application traffic.
while traffic wants to pass through firewall what will match policy inside APP ID
thanks for resolving our doubts
Awesome...... Very helpful its worked .....
Well explained sir... very informative video
thanks for resolving our doubts