View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0321 - PAN 9.0 Virtual System (Part 2)

The video looks at different aspects and use-cases of Virtual System (VSYS) feature on Palo Alto firewall. The lab begins with creations of two VSYS; internet and guest, and their configuration to provide logical separation within a physical firewall. The remaining part of the labs covers more advanced use-cases of virtual routing, external zone, and shared gateway.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0321 - PAN 9.0 Virtual System (Part 1)

The video looks at different aspects and use-cases of Virtual System (VSYS) feature on Palo Alto firewall. The lab begins with creations of two VSYS; internet and guest, and their configuration to provide logical separation within a physical firewall. The remaining part of the labs covers more advanced use-cases of virtual routing, external zone, and shared gateway.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0320 - PAN 9.0 Tunnel Inspection (Part 3)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0320 - PAN 9.0 Tunnel Inspection (Part 2)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0320 - PAN 9.0 Tunnel Inspection (Part 1)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0319 - PAN 9.0 Zone and DoS Protection (Part 2)

The video takes you through features on Palo Alto firewall that protect you from various type of network attacks such as volumetric, protocol, and reconnaissance, using Zone and DoS protection. We will first look at Zone protection that provides protection at a zone-level, followed by DoS protection that protect a host or group of host.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0319 - PAN 9.0 Zone and DoS Protection (Part 1)

The video takes you through features on Palo Alto firewall that protect you from various type of network attacks such as volumetric, protocol, and reconnaissance, using Zone and DoS protection. We will first look at Zone protection that provides protection at a zone-level, followed by DoS protection that protect a host or group of host.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0318 - PAN 9.0 Wildfire

The video looks into file malware analysis on Palo Alto firewall with Wildfire. We will cover software subscription, auto updates, and required configuration to enable file analysis on security policy. There will be demonstrations of file submission to Wildfire public cloud on benign and malware test files.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0317 - PAN 9.0 File Type Filtering

The video looks into file type filtering capability on Palo Alto Firewall. We will demonstrate a quick way to enforce file type filtering by leveraging a default strict file profile. Customized file profile will be configured followed by file type exemption to help you further apply more granular control to meet your security policy.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0316 - PAN 9.0 DNS Security and SafeSearch (Part 2)

The video walks you through configuration of two security features; DNS Security and Safesearch, on Pal Alto Firewall. We will demonstrate how DNS security can help preventing users from visiting destinations with malicious domains, and with a use of sinkhole, we can discover a true source of DNS request. The second half covers a way to control user search engine result with Safesearch.

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - Security

Poll

Vote for the Next Video Series