NETWORK SECURITY

Palo Alto Networks Best Practices – Administrative Access

This course provides a comprehensive guide to securing administrative access to Palo Alto Networks firewalls and Panorama devices. It highlights the importance of locking down administrative access to prevent unauthorized reconfiguration, malware distribution, and network breaches.

Participants will learn to plan, deploy, and maintain best practices for secure administrative access, including scanning administrative traffic for threats and securing access to management interfaces.

Course Summary

Best practices for secure administrative access to Palo Alto Networks firewalls and Panorama devices. Prevent unauthorized reconfiguration, malware distribution and harden management access.

Piotr Kaluzny

Instructor

 

Domain
Network Security
Vendor
Palo Alto Networks
Level
Intermediate
Duration
1.5 hours
Status
Complete
Key Learnings

Students will acquire crucial skills and in-depth knowledge necessary for the effective management and security of administrative access, such as:

  • Planning and preparing for secure management network deployment
  • Isolating management network and restricting access
  • Deploying secure administrative access with management interfaces
  • Understanding the implications of management traffic inspection
  • Implementing Role-Based Access Control (RBAC)
  • Maintaining and monitoring activities related to firewall management
Intended Audience

This course is designed for network security engineers, system administrators, IT professionals, and anyone responsible for managing and securing administrative access to Palo Alto Networks firewalls and Panorama devices.

Course Prerequisites

There are no formal prerequisites for this course. However, it is recommended that participants have a basic understanding of network security principles and familiarity with Palo Alto Networks products and configuration. Hands-on experience with deploying and managing network security devices will be beneficial.

Course Playlist

Introduction

0. Course Introduction

Plan

1. Secure Administrative Access

Deploy

2. Protecting the Management Network
3. Role-Based Access Control (RBAC)

Maintain

4. Monitoring Administrative Access