NETWORK SECURITY

Palo Alto Networks Firewall – Traffic Control

Designed for current or future network security professionals, this course covers the essential aspects of the most important firewall component: security policy. It focuses on understanding policy processing, components, and rule management. You will also learn how to leverage the firewall’s capabilities to safely enable applications, protect network assets from threats, and enhance business productivity.

By the end of this course, you will have a deep understanding of how to configure and manage security policy effectively to ensure optimal network security and resource allocation.

Course Summary

Understand and deploy security policy on Palo Alto Networks Firewalls for optimal network protection and efficiency.

Piotr Kaluzny

Instructor

 

Domain
Network Security
Vendor
Palo Alto Networks
Status
Complete
Duration
3 hours
Complexity
Key Learnings
  • Understand the structure and components of a Palo Alto Networks Firewall security policy
  • Explore policy processing and rule evaluation
  • Create and manage security policy rules
  • Configure logging options and analyze traffic logs
  • Understand ID engines (App-ID, User-ID, Device-ID) for advanced policy management
  • Safely enable applications for optimized resource allocation
Intended Audience

This course is designed for network security professionals, firewall administrators, and IT specialists who manage or will manage Palo Alto Networks Firewalls. It is also ideal for anyone looking to enhance their knowledge and skills in reading and understanding firewall security policy rules, such as auditors and testers.

Course Prerequisites

Students should be familiar with the Palo Alto Networks Firewall GUI and be able to perform firewall initialization and initial system setup. Knowledge of interface configuration is also required to ensure a smooth learning experience.

Course Playlist
Overview
Course Introduction3m
Security Policy
1. Understanding Security Policy44m
2. Managing Objects16m
3. Logging28m
ID Engines
4. App-ID36m
5. User-ID12m
6. Deploying User-ID38m
7. Introduction to Device-ID12m
Resources
Review Questions
Further Reading
Technology Lab
Lab Workbook
Lab Topology
Task 1 Solution Walkthrough
Task 2 Solution Walkthrough
Task 3 Solution Walkthrough
Task 4 Solution Walkthrough