Palo Alto Networks training provides the next-generation firewall knowledge you need to secure your network and safely enable applications. This course feature lecture and hands-on labs, you will learn to install, configure, manage and troubleshoot Palo Alto Networks firewalls, gaining the skills and expertise needed to protect your organization from the most advanced cybersecurity attacks.

Platforms and Architecture

  • Single Pass Architecture
  • Flow Logic
  • Designing your PAN in the Network

Initial Configuration

  • Initial Access to the PAN and Account Administration
  • Overview of Dashboard and Configuration Management
  • Licensing and Software Updates

Interface Configuration

  • Security Zones
  • Layer2, Layer3, Virtual Wire and Tap
  • Sub Interfaces and virtual routers

IP Routing

  • Static and Default Routing
  • Routing with OSPF and BGP
  • Policy Based Forwarding

Security and NAT policies

  • Security Policy configuration
  • Filtering based on Protocol and Port
  • Overview of Application Inspection
  • Filtering based on Applications
  • Creating Service Objects
  • Creating Service Groups
  • Testing Security Rules
  • Network Address Translation (Source and Destination)

SSL Decryption

  • Certificate management
  • Creating and Installing Certificate
  • Decryption policy
  • Application database and Categories

URL Filtering

  • URL Filtering (Block and Continue)
  • Custom Block page and URL Category

File Blocking (Google Mail)

  • Firewall Policy and Profile
  • Decryption Policy
  • Testing File Blocking
  • Monitoring File Blocking
  • Monitoring Decryption
  • Testing when changing the file type

Anti Virus

  • Anti-Virus Profile and Firewall policy
  • Decryption Policy
  • Testing Anti-Virus Blocking (Non-Secure, Secure web pages)

Site to Site VPN

  • Configuring Site to Site VPN (Ipsec Tunnels)
  • VPN configuration Between CISCO Router and Palo Alto

User Identification using Active Directory (without an Agent)

  • Configuration on Active Directory Domain Controller
  • User Identification Configuration on PAN appliance
  • Creating security policies
  • Testing and Monitoring
  • Considerations when using User-ID

Captive Portal

  • Review of LDAP profile and Authentication Profile
  • User Identification
  • Security and Captive Policies
  • testing and Monitoring

Management, Reporting, and Logging

  • Log Forwarding (SyslogServer) and SNMP
  • Viewing Traffic Reports for top Talkers and Applications
Download Course Brochure
Enquiry Now
   I Authorise Ducat India to contact me with updates & notifications via email, SMS, WhstaApp, and voice call. This Consent will override any registration for DNC/NDNC