NETWORK SECURITY

Palo Alto Networks Firewall – Traffic Control

Designed for current or future network security professionals, this course covers the essential aspects of the most important firewall component: security policy. It focuses on understanding policy processing, components, and rule management. You will also learn how to leverage the firewall’s capabilities to safely enable applications, protect network assets from threats, and enhance business productivity.

By the end of this course, you will have a deep understanding of how to configure and manage security policy effectively to ensure optimal network security and resource allocation.

Course Summary

Understand and deploy security policy on Palo Alto Networks Firewalls for optimal network protection and efficiency.

Piotr Kaluzny

Instructor

 

Domain
Network Security
Vendor
Palo Alto Networks
Level
Intermediate
Duration
3 hours
Status
Complete
Key Learnings

By the end of this course, participants will be able to:

  • Understand the structure and components of a Palo Alto Networks Firewall security policy
  • Explore policy processing and rule evaluation
  • Create and manage security policy rules
  • Configure logging options and analyze traffic logs
  • Understand ID engines (App-ID, User-ID, Device-ID) for advanced policy management
  • Safely enable applications for optimized resource allocation
Intended Audience

This course is designed for network security professionals, firewall administrators, and IT specialists who manage or will manage Palo Alto Networks Firewalls. It is also ideal for anyone looking to enhance their knowledge and skills in reading and understanding firewall security policy rules, such as auditors and testers.

Course Prerequisites

Students should be familiar with the Palo Alto Networks Firewall GUI and be able to perform firewall initialization and initial system setup. Knowledge of interface configuration is also required to ensure a smooth learning experience.

Course Playlist

Introduction

0. Course Introduction

Security Policy

1. Understanding Security Policy
2. Managing Objects
3. Logging

ID Engines

4. App-ID
5. User-ID
6. Deploying User-ID
7. Introduction to Device-ID